Managing Information Security

The project must be a Word document that is 4-5 pages (double-spaced) on a cybersecurity topic of your choice.  I will run it through SafeAssign and Turnitin so make sure it is your own work.  If I get any assignments that have a 25% similarity rate or higher, it will get a zero.  Write your own work!!

2.

Select any article or link from the Internet site listed below. Summarize what you have read in 3-4 paragraphs using your own words. Submit a one-page WORD formatted document as an attachment.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Website: www.darkwebnews.com

3.

Managing Information Security

Creating Company E-mail and WIFI / Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview

2. Purpose

3. Scope

4. Policy

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

so , it is nine discussions one project six assignments five replies four exams two people each zero courses with one profs four groups and finally four questions