Acceptable Use Policy (AUP) and Security Audit

729 Words2 Pages

Acceptable Use Policy (AUP) and Security Audit
In the computing world, the Acceptable Use Policy (AUP) refers to the set of rules that are applied by the manager of a particular computer network or website that helps to restrict the ways in which the website or network can be used (Ciampa, 2012). The AUP documents are normally written for the service providers in order to help reduce any potential legal action taken by a user subscribing to such services. Sanctions are usually imposed on a service user who ends up breaking the AUP rules. However, regular security audits need to be done on the websites as well as the networks involved in order to ensure that every user complies with the rules.
Part 1: Computer systems, network and data Acceptable Use Policy (AUP)
A computer system comprises of one or several computers of which all of them are associated with the common software or rather one storage space. This system could have other computer peripherals connected to them. All of these computers can operate independently as well as the ability of communicating with each other.
On the other hand, a computer network is a telecommunication network of computers that enables the networked computers to exchange data between each other. However, the Acceptable Use Policy of the computer systems and network still apply here. All the computer users are assigned a specific user ID as well as a specific password that enables them to access only the information that is allowed within their authority.
Furthermore, the scope to who the AUP policies apply to includes the large corporations company, schools, universities, internet service providers, individuals, government agencies as well as some business organizations. Moreover, the person w...

... middle of paper ...

...n password
Is the security level listed by the network administrator acceptable with you? Yes/ No If yes, then you are assured of your own computer safety from hacking

If no, then disconnect yourself from the computer network
Is the computer Firewall enabled? Yes/ No If yes, then you are secured from hacking

If no, then enable the computer Firewall
Is the screen saver configured? Yes/ No If yes, then the computer will help to save on the unnecessary power bills

If no, then the computer user needs to configure his own screen saver
Does the screen saver require a password to clear it? Yes/ No If yes, then you are secured with your screen saver

If no, then configure your screen saver password
Are all of the computer passwords secured? Yes/ No If yes, then your computer is safe to be used within the computer network

If no, then secure all of your computer passwords

More about Acceptable Use Policy (AUP) and Security Audit

Open Document