glass
pen
clip
papers
heaphones

This week we take a detailed look at what information must go into a security policy, including…

This week we take a detailed look at what information must go into a security policy, including…

This week we take a detailed look at what information must go into a security policy, including risk assessment procedures, audit logging info and additional recommendations for IDPS. What should and shouldn’t be allowed in an acceptable use policy?  Note that this can change depending on the company or organization involved. For example, an art design company may allow employees to review or seek wallpapers for inspiration on graphic design projects, while a security contractor would most definitely disallow such activity. Share your thoughts on this. Use what you’ve learned to create a mock risk assessment of a practice network that you design from the ground up. Outline what assets exist on the network, and what threats exist against those assets. Finally, post the evaluation of your mock network and the risk of the observed threats.