Topic
Pick two best practices for User Domain Policies and explain what they are and provide examples of what could go wrong in an organization if these best practices are not followed.
Instructions
1) APA format
2) References
3) Body Citations
4) No Plagiarism
5) 350 words
6) 2 responses (every 150 words)
Response#1(Venkatesh)
ccess Control Policy
Access control is an approach that guarantees users’ identity and that they are authorized to access the organizations’ data and information. Johnson and Merkow (2010) believe that the access control policy summarizes the controls on physical access to the information system and software to limit unauthorized access to sensitive data and computer networks.
The policy ensures that the users have only access to what they require to perform their daily activities. According to Peltier (2016), this will define clearly that they should do the work that they have been scheduled for. Any additional activities that are not authorized should be considered against the user domain policy.
2. Password Policy
Peltier (2016) defines a password policy as a set of rules and regulations that administrators develop to strengthen computer security by promoting the proper use of strong passwords. A password policy is mainly an official rule of a business that is taught as an aspect of security awareness training. Johnson and Merkow (2010) suggest that password policies enable users to establish the configuration, as well as the complexity of the appropriate passwords to apply in computer software.
Business leaders can either develop advanced policies or utilize the present policies to fulfill organizational needs and requirements. Johnson and Merkow (2010) suggest that this will ensure that the users have their login credentials and that they do not share them with anyone else. Also, it will maintain the security of the domain, preventing access to other user’s information.
If access control and password policies are not followed in an organization, then there could be no data or information security in the organization.
Reponse#2(Aditya)
Humans are considered as the weakest link in IT security and hence they should follow implemented security practices to minimize threats to the organizations. Two of those security practices are
Password practices – According to a study conducted by the Ponemon Institute, negligent employees are the number one reason for data breaches accounting to 24% (Ekran, 2020). Not having strong or unique passwords coupled with the increase in the Internet of Things (IoT) is a recipe for disaster. Password protection is also a security issue. If the employees carelessly leave their passwords on a keyboard by simply writing them on a sticky note can lead to cybersecurity incidents. Hence, employees should make sure to have strong passwords on every device they use inside the organization and should also store them securely.
Access control practices – Maintaining adequate physical security should be a top priority for every organization. Unauthorized physical access can lead to data theft and theft of property including hard drives or USB sticks. Hence, organizations should implement access control practices to keep employees from accessing areas they are not supposed to. Enforcing the use of smart cards, fobs, password-protected computers and networks are some of the forms of access control practices.
Our Advantages
Plagiarism Free Papers
All papers are written by the best professional writers to ensure 100% originality. We always provide plagiarism reports whenever we deliver completed papers.
Free Revisions
All papers by Grand Paper Writers are completed and submitted on time. This timely delivery of papers gives you time to go through the paper before the official deadline.
Title-page
As an additional service, we will provide a title page that precedes the contents of your paper. Here, you will provide your personal details.
Bibliography
We also ensure that we provide an extra page for the references or bibliographies following referencing rules.
Originality & Security
At Grandpaperwriters.com, we guarantee students for the provision of security and original work. All your personal information is handled with confidentiality and is not shared with third parties. Additionally, we ensure that we provide original content with accompanying plagiarism reports to show originality.
24/7 Customer Support
Our customer support team is always available 24/7 to provide instant responses to any queries raised by students.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
Our Services
Grandpaperwriters.com has the best professional essay writers for quality services.
Pricing
Here, a Grandpaperwriters.com, we do not compromise on the time of our clients. We always deliver all completed papers on or before the deadlines.
Communication
Admission Help & Client-Writer Contact
Grandpaperwriters.com provides an interactive portal where students can communicate directly to their writers.
Deadlines
Paper Submission
Here, a Grandpaperwriters.com, we do not compromise on the time of our clients. We always deliver all completed papers on or before the deadlines.
Reviews
Customer Feedback
Grandpaperwriters.com appreciates feedback from our clients to help us improve the delivery of essay writing services. As such, we are constantly changing our policies to ensure maximum customer and writer satisfaction.