blog




  • Essay / Acceptable Use Policy (AUP) and Security Audit - 729

    Acceptable Use Policy (AUP) and Security AuditIn the IT world, the Acceptable Use Policy (AUP) refers to the entire rules enforced by the manager of a particular computer network or website that helps restrict the ways in which the website or network can be used (Ciampa, 2012). AUP documents are normally drawn up for service providers to help reduce any potential legal action brought by a user subscribing to such services. Sanctions are usually imposed on a user of the service who ends up violating the AUP rules. However, regular security audits should be carried out on the websites as well as the networks involved to ensure that every user complies with the rules. Part 1: Acceptable use policy for computer systems, networks and data (AUP) A computer system includes: one or more computers, all of which are associated with common software or rather with storage space. This system could be connected to other computer devices. All these computers can operate independently as well as communicate with each other. On the other hand, a computer network is a telecommunications network of computers that allows networked computers to exchange data with each other. However, the Computer Systems and Network Acceptable Use Policy still applies here. All computer users are assigned a specific user ID and a specific password that allows them to access only information authorized within their authority. Additionally, the scope of AUP policies includes large businesses, schools, universities, Internet service providers, individuals, government agencies and certain commercial organizations. In addition, the person who...... middle of paper ......n passwordIs the security level indicated by the network administrator suitable for you? Yes/No If yes, then you are assured of the security of your own computer against hacking. If not, then disconnect from the computer network. Is the computer's firewall enabled? Yes/No If yes, then you are protected against hacking. If not, then enable the computer's firewall. Is the screen saver configured? Yes/No If yes, then the computer will help save on unnecessary electricity bills. If not, then the computer user must configure their own screensaver. Does the screen saver require a password to clear it? Yes/No If yes, then you are secure with your screen saver. If no, then set your screen saver password. Are all your computer passwords secure? Yes/No If yes, your computer can be used safely within the computer network. If not, secure all your computer passwords.