Preview

Defining an Excceptable Use Policy

Satisfactory Essays
Open Document
Open Document
411 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Defining an Excceptable Use Policy
CNG-132
Defining and Acceptable Use Policy

Acceptable Use Policy
An Acceptable Use Policy (AUP), acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager of a network, website, service, or large computer system that restrict the ways in which the network, website or system may be used. AUP documents are written for corporations, businesses, universities, schools, internet service providers, and website owners, often to reduce the potential for legal action that may be taken by a user, and often with little prospect of enforcement.
The acceptable use policy (AUP), To fully explain the acceptable use policy would mean to start from the beginning, the user domain. The user domain is the employee or people within an organization who is granted access to the information system for the organization. There are roles and tasks, responsibility, and accountability that go into an acceptable use policy for the user domain. Within the user domain is the access of LAN to WAN, web surfing, and internet. LAN to WAN is the activities between and firewall LAN to WANs, routers, intrusion, detection, and workstations. Web surfing determines what a user can do on company time with company resources. Internet is when the user has access to the internet what types of controls should the organization have on the certain internet sites being accessed. Although they seem to be alike they are their own entity. The LAN to WAN acceptable use Policy will go hand in hand with the roles and tasks parts of the user domain. Users would be given access to certain systems, applications, and data depending on their access rights. The AUP is like a rulebook that employees need to follow when using an organization’s IT assets and if they are violated it could be grounds for termination. The AUP will set grounds on employees to understand that they are responsible for any and all actions on an organization’s IT assets. In particular to organizations

You May Also Find These Documents Helpful

  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    3. An AUP is part of a layered approach to security, and it supports confidentiality. What else supports confidentiality?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The user domain contains the employees that will be accessing resources in the network. Users access systems, applications, and data within the rights and privileges defined by the acceptable use policy. The AUP must be followed at all time or the user may be terminated. There are threats ranging from lack of awareness to blackmail and extortion. All employees are responsible for their own actions when using the network. The users will all be expected to read and abide by the acceptable use policy. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The User Domain is the most important because the user can easily create a problem within the network, therefore can be considered the weakest link. The user domain defines the people who access an organizations network and IT infrastructure. In the user domain you will find an acceptable use policy, also known as an AUP. An AUP defines what a user can and cannot do within the organization. Some of the don’ts include but are not limited to malicious emails to and from other co-workers, breaking security policies by entering co-workers workstations, inappropriate web browsing that can lead to viruses, as well as uploading and downloading music,…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    You Decide week 5

    • 831 Words
    • 3 Pages

    Good day MS Kim, I would like to explain the available options of Access Control Lists what will do and what types of ACLs there are. Complex ACLs can be tricky but will better for security for the network. There are three different types of ACLs, Dynamic ACL, Reflexive ACL, and Time Based ACL. Each ACL is unique to the type of network we have. Dynamic are also called lock-and-key ACLs which only allow IP traffic only. Also the lock-and-key authenticates the user and permits limited access through the firewall router for a host for a time. Time Based ACLs are a specific time that traffic is allowed on the network. When the device determines that an ACL applies to a packet, it tests the packet against the rules. The first matching rule determines whether the packet is permitted or denied. If there is no match, the device applies a default rule. The device processes packets that are permitted and drops packets that are denied. “ACLs protect networks and specific hosts we would be able to specify certain days and hours of which the user will have access to the network. With this type of ACL there is more control over permitting or denying access to resources. Reflexive ACL allows outbound traffic from the network and limits the inbound traffic. This allows greater control over what traffic is on the network and able to expend the control list. Also, with Reflexive when ACL, an unknown IP address is trying to gain access, it will put the IP address in a temporary ACL group and will await replies from the network and the network will automatically remove the IP address when the session is over. It is probably in the best interest for our network to concentrate on Reflexive ACLs for these reasons;…

    • 831 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate…

    • 272 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    . What are the three fundamental elements of an effective access control solution for information…

    • 321 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    File sharing P2P, access web sites that are prohibited, purposely do things not supposed to according to the AUP, and spam coworkers.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A policy is a file or document that guides the service providers with principles on their how the ways to put their work into practice when working with service users. E.g. behavioural policy…

    • 1090 Words
    • 5 Pages
    Good Essays
  • Good Essays

    By requiring all data elements be met in order to qualify for incentive dollars, it will allow for EMR systems to build out towards year three…

    • 834 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Manegerial Policy

    • 1960 Words
    • 8 Pages

    1a) Costco’s CEO stated that the vision for Costco was to give customers the best possible value for their purchase while remaining ethical.…

    • 1960 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Protection Policy

    • 646 Words
    • 3 Pages

    Although the 'frontier' period of Australian history can be viewed in the terms of war, there were also many white settlers who were appalled at the treatment of the Indigenous people and wanted to help them. Some of those who tried to help were government officials, others were Christian missionaries. These people truly believed that the Aboriginal people needed their help and without it they would die out. Their somewhat misguided attempts to help the Indigenous people are known as 'paternalism'. Paternalism means looking after someone and taking care of their interests because they cannot do it themselves. Instead of hunting down Aboriginal people and murdering them, government policy changed to treat them as if they were children who had to be protected.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    An effective e-mail and Web use policy for a company would comprise of a detailed description of what employees are allowed and prohibited from doing while at work. This policy should allow employees at least 30 minutes a day for personal use. The company can also provide certain computers designated for personal use that their employees can have access to so that when off company time they can use these computers. This may prevent the company from being vulnerable to viruses and hackers because they can be connected to different networks/servers.. The policy can also allow employees to use the internet and e-mail for personal use when on lunch, break or off company time. It is important for the firm to make the work place comfortable and prevent it from feeling like they have no rights. This is why I feel the firm should try to accommodate personal e-mail and internet usage because some employees have very little time and emergencies may arise where they need to use these…

    • 334 Words
    • 1 Page
    Satisfactory Essays