RESPOND TO THIS DISCUSSION POST BASED ON THE TOPIC “A security policy is developed by senior management to assign certain responsibilities and mandate certain requirements, which are usually aligned with the agency’s mission.
A new policy was just created to prohibit peer-to-peer software downloads, as they are illegal and may bring malicious content to the workplace. You, the security officer, noticed that employees resisted the policy and chose to continue downloading peer-to-peer software. In an initial post, explain how you would handle this situation. What would you do to enforce the policy?
When responding to your classmates, discuss what might occur if senior management did not have a security policy or procedures in place. Use specific examples to support your thinking.” (TWO (2) PARAGRAPHS WITH REFERENCES ON EACH OF THEM SEPARATELY, NOT TOGETHER)
Please view article here http://web.archive.org/web/20150110053317/http:/www.pmi.org/~/media/PDF/Knowledge%20Center/PM%20Network%20Requirements%20Article.aspx
1. From the technical perspective, it looks like you hit all the potential security points. I pose that when looking at the policy to enforce your measures, where and how much flexibility is given down the “chain of command” could have a major impact. When you talk about Symantec Endpoint Protection and the enforcement rules, would that need to be codified at the Corporate Management Policy level? Or, a more general policy giving the IT Management the latitude to craft the actual enforcement?
PLEASE READ THIS.IT IS VERY IMPORTANT
Allow your discussion posts to be detailed and capable of sharing knowledge, ideas and points. You must discuss the topic using your own words first. Using your own words indicate you understand the topic of discussions. Secondly, you must cite your sources in-text. This is necessary to justify your points. Sources from several sources showed good research abilities. Lastly, you must provide references at the bottom of your post. A discussion post without justification with sources does not show proper research abilities. A terse and not detailed discussions represent post that would not provide enough sharing of knowledge or proper understanding of the topic. DO NOT just copy and paste a sentence from online with citation at the end as your own discussion. I have not asked for definitions, I asked for discussions and will not buy this. You must show understanding of the discussion topic by using your own words to describe the topic and then justify that with sources.
www.citationmachine.net to format references into the APA style if necessary. Extremely important. Intext citations is very essential and highly needed as well.
use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method (citation should be relevant and current). Page-length requirements:2 PAPARAGRAPHS FOR EACH PROMPT ANSWER. Make sure you cite if you take a piece of someone’s work, very important and your reference should relate to your writing (don’t cite a reference because it relates to the course and not this very paper) at least 2 current and relevant academic references. No heavy paraphrasing of others work.