Describe the issue-specific security policy (ISSP) and list three issues it may cover.

What will be an ideal response?


The issue-specific security policy (ISSP), which requires frequent updates, addresses specific areas of technology, stating the organization's position on each issue. Here are some of the issues it may cover:
·      Use of company-owned networks and the Internet
·      Use of telecommunications technologies (fax and phone)
·      Use of e-mail
·      Specific minimum configurations of computers to defend against worms and viruses
·      Prohibitions against hacking or testing organization security controls
·      Home use of company-owned computer equipment
·      Use of personal equipment on company networks
·      Use of photocopy equipment

Computer Science & Information Technology

You might also like to view...

Which of the following is not included in a function’s activation record?

a. The return address of its caller function. b. Parameter values received from its caller. c. Local variables it has declared. d. The name of the function.

Computer Science & Information Technology

Analyze the following code.

``` int[] list = new int[5]; list = new int[6]; ``` a. The code has compile errors because the variable list cannot be changed once it is assigned. b. The code has runtime errors because the variable list cannot be changed once it is assigned. c. The code can compile and run fine. The second line assigns a new array to list. d. The code has compile errors because you cannot assign a different size array to list.

Computer Science & Information Technology

Write short essay responses to these questions:

(a) Give me one example of a task for which you would not write a program and give me another example of a task for which you would write a program. (b) What’s the difference between an array, a matrix, and a tree? Give an example where we have used each to represent some data of interest to us. (c) What is dot notation and when do you use it? (d) Why is red a bad color to use for chromakey? (e) What’s the difference between a function and a method? (f) Why is a tree a better representation than an array for files on a disk? Why do you have many directories on your disk, and not just one gigantic one? (g) What are some advantages that vector-based graphics have over bitmap graphical representations (like JPEG, BMP, GIF)?

Computer Science & Information Technology

The ____ command creates a layer group and places the selected layers in it.

a. Create Cluster b. New Group from Layers c. Aggregate Layers d. New Layer Group

Computer Science & Information Technology