Labs 5 and Lab 6

Creating a Security Awareness Policy (3e)
Security Policies and Implementation Issues, Third Edition – Lab 05

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Student: Email:

Laljibhai Valiya vlalji1@gmail.com

Time on Task: Progress:

0%

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Report Generated: Saturday, February 5, 2022 at 2:12 PM

Guided Exercises

Part 1: Research Security Awareness Policies

2. For each sample security awareness training policy that you reviewed in the step above,
discuss the policy’s main components. You should focus on the need for a security
awareness program and its key elements.

Incomplete

Part 2: Create a Security Awareness Policy

Policy Statement
Define your policy verbiage.

Incomplete

Purpose/Objectives
Define the policy’s purpose as well as its objectives.

Incomplete

Scope
Define whom this policy covers and its scope. What elements, IT assets, or organization-owned

assets are within this policy’s scope?

Incomplete

Page 1 of 3

Free Hand

Creating a Security Awareness Policy (3e)
Security Policies and Implementation Issues, Third Edition – Lab 05

Standards
Does the policy statement point to any hardware, software, or configuration standards? If so, list them

here and explain the relationship of this policy to these standards.

Incomplete

Procedures
Explain how you intend to implement this policy for the entire organization.

Incomplete

Guidelines
Explain any roadblocks or implementation issues that you must overcome in this section and how you

will surmount them per defined guidelines. Any disputes or gaps in the definition and separation of
duties responsibility may need to be addressed in this section.

Incomplete

Page 2 of 3

Creating a Security Awareness Policy (3e)
Security Policies and Implementation Issues, Third Edition – Lab 05

Challenge Exercise

Identify three security awareness training software providers.

Incomplete

Identify 10 questions that you would include in your RFI.

Incomplete

Powered by TCPDF (www.tcpdf.org)

Page 3 of 3

http://www.tcpdf.org

Creating a Remote Access Policy (3e)
Security Policies and Implementation Issues, Third Edition – Lab 06

Student: Email:

Laljibhai Valiya vlalji1@gmail.com

Time on Task: Progress:

0%

Report Generated: Saturday, February 5, 2022 at 2:13 PM

Guided Exercises

Part 1: Research Remote Access Policies

4. Write a brief summary of the information during your research. In your summary, focus on the
key elements of the remote access policy. You should also identify any unique elements of
remote access policies for higher education and healthcare institutions. Be sure to provide
links to the remote access policies you identified in steps 2 and 3.

Incomplete

Part 2: Create a Remote Access Policy

2. Identify a security control or countermeasure to mitigate each risk and threat identified in the
Remote Access Domain. These security controls or countermeasures will become the basis of
the scope of the Remote Access Domain policy definition to help mitigate the risks and threats
commonly found within the Remote Access Domain.

Incomplete

Policy Statement
Define your policy verbiage.

Incomplete

Purpose/Objectives
Define the policy’s purpose as well as its objectives and policy definitions

Incomplete

Page 1 of 3

Free Hand

Creating a Remote Access Policy (3e)
Security Policies and Implementation Issues, Third Edition – Lab 06

Scope
Define whom this policy covers and its scope. What elements, IT assets, or organization-owned

assets are within this policy’s scope?

Incomplete

Standards
Does the policy statement point to any hardware, software, or configuration standards? If so, list them

here and explain the relationship of this policy to these standards. In this case, Remote Access
Domain standards should be referenced, such as encryption standards and VPN standards; make any

necessary assumptions.

Incomplete

Procedures
Explain how you intend to implement this policy for the entire organization.

Incomplete

Guidelines
Explain any roadblocks or implementation issues that you must overcome in this section and how you

will surmount them per defined guidelines. Any disputes or gaps in the definition and separation of
duties responsibility may need to be addressed in this section.

Incomplete

Page 2 of 3

Creating a Remote Access Policy (3e)
Security Policies and Implementation Issues, Third Edition – Lab 06

Challenge Exercise

Use the internet to find information about remote access policies and home network protection, and
then use this information to create a training document for remote employees.

Incomplete

Powered by TCPDF (www.tcpdf.org)

Page 3 of 3

http://www.tcpdf.org

Order a unique copy of this paper

600 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
Top Academic Writers Ready to Help
with Your Research Proposal

Order your essay today and save 25% with the discount code GREEN