Acceptable Use Policy (AUP) and Security Control In the computing world, the Acceptable Use Policy (AUP) refers to the set of rules enforced by the manager of a particular computer network or website which helps to limit how the website or network can be used (Ciampa, 2012). AUP documents are normally written for service providers in order to help reduce any potential legal action taken by a user who subscribes to such services. Penalties are usually imposed on the service user who ends up breaking the AUP rules. However, regular security checks must be performed on the websites and networks involved to ensure that every user complies with the rules. Part 1: Computer Systems, Network and Data Acceptable Use Policy (AUP) A computer system includes one or more computers, all associated with common software or rather with a storage space. Other computer peripherals may be connected to this system. All of these computers can function independently and have the ability to communicate with each other. On the other hand, a computer network is a computer telecommunications network that allows networked computers to exchange data with each other. However, the Acceptable Use of Computer Systems and Network Policy still applies in this case. All computer users are assigned a specific user ID and a specific password that allows them to access only the information permitted in their authority. Additionally, the scope of AUP policies includes large corporations, schools, universities, Internet service providers, individuals, government agencies, and some business organizations. Furthermore, the person with…… means of paper……n passwordIs the security level indicated by the network administrator acceptable to you? Yes/No If yes, are you confident about the safety of your computer from hacker attacks. If not, disconnect from the computer network. Is your computer's firewall enabled? Yes/No If yes, you are protected from hacker attacks. If not, enable your computer's firewall. Is the screen saver configured? Yes/No If yes, the computer will help you save on unnecessary electricity bills. If not, the computer user must configure their own screen saver. Does the screensaver require a password to delete it? Yes/No If yes, you are protected with the screen saver. If not, set up your screensaver password. Are all computer passwords protected? Yes/No If yes, your computer can be used safely within the computer network. If not, protect all passwords on your computer
tags