{"id":11480,"date":"2022-06-15T11:52:04","date_gmt":"2022-06-15T11:52:04","guid":{"rendered":"https:\/\/highclasswriters.com\/blog\/?p=11480"},"modified":"2022-06-15T11:52:06","modified_gmt":"2022-06-15T11:52:06","slug":"security-planning-acceptable-use-and-workstation-security-policies","status":"publish","type":"post","link":"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/","title":{"rendered":"Security Planning: Acceptable Use and Workstation Security Policies"},"content":{"rendered":"\n<p>Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, or details that you might add that add depth, texture, or provide a foundation for your policies. Your goal is to create effective policies that represent modern systems assurance security practices and planning.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Acceptable Use (2 pages).<\/li><li>Workstation Security for a regulated health care environment (1\u20132 pages).<\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\">Suggested Resources<\/h4>\n\n\n\n<p>The resources provided here are optional and support the assignment. They provide helpful information about the topics. You may use other resources of your choice to prepare for this assisgnment; however, you will need to ensure that they are appropriate, credible, and valid.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Beyond Trust. (2017).&nbsp;Sample vulnerability management policy [PDF]. Retrieved from https:\/\/www.beyondtrust.com\/wp-content\/uploads\/wp-sample-vulnerability-management-policy.pdf?1446594949<ul><li>This is a sample of a vulnerability management policy.<\/li><\/ul><\/li><li>United States Postal Service. (2017).&nbsp;Patch management process. Retrieved from https:\/\/about.usps.com\/doing-business\/it-policies-standards\/Patch-Management-Process.htm<ul><li>This is a real-world example of a patch management process and policy.<\/li><\/ul><\/li><li>Breeden II, J. (2017).&nbsp;What is vulnerability management?&nbsp;Retrieved from https:\/\/www.csoonline.com\/article\/3238080\/vulnerabilities\/what-is-vulnerability-management-processes-and-software-for-prioritizing-threats.html<ul><li>This is an article explaining the details of vulnerability management.<\/li><\/ul><\/li><li>Kim, D., &amp; Solomon, M. G. (2018).&nbsp;<em>Fundamentals of information systems security<\/em>&nbsp;(3rd ed.). Burlington, MA: Jones &amp; Bartlett.<ul><li>Chapter 3, &#8220;Malicious Attacks, Threats, and Vulnerabilities,&#8221;&nbsp;pages 72\u2013110.<\/li><\/ul><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-11480","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Planning: Acceptable Use and Workstation Security Policies - Highclasswriters<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Planning: Acceptable Use and Workstation Security Policies - Highclasswriters\" \/>\n<meta property=\"og:description\" content=\"Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/\" \/>\n<meta property=\"og:site_name\" content=\"Highclasswriters\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-15T11:52:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-15T11:52:06+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/\",\"url\":\"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/\",\"name\":\"Security Planning: Acceptable Use and Workstation Security Policies - Highclasswriters\",\"isPartOf\":{\"@id\":\"https:\/\/highclasswriters.com\/blog\/#website\"},\"datePublished\":\"2022-06-15T11:52:04+00:00\",\"dateModified\":\"2022-06-15T11:52:06+00:00\",\"author\":{\"@id\":\"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/06412d8249aafcb0c75ea9958c98aaae\"},\"breadcrumb\":{\"@id\":\"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/highclasswriters.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Planning: Acceptable Use and Workstation Security Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/#website\",\"url\":\"https:\/\/highclasswriters.com\/blog\/\",\"name\":\"Highclasswriters\",\"description\":\"Essay Writing Service\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/highclasswriters.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/06412d8249aafcb0c75ea9958c98aaae\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/99ccb26aea1053c4c33c76cde1eee45f1ec58485d03e72c412d111c386e42174?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/99ccb26aea1053c4c33c76cde1eee45f1ec58485d03e72c412d111c386e42174?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/highclasswriters.com\/blog\"],\"url\":\"https:\/\/highclasswriters.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Planning: Acceptable Use and Workstation Security Policies - Highclasswriters","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/","og_locale":"en_US","og_type":"article","og_title":"Security Planning: Acceptable Use and Workstation Security Policies - Highclasswriters","og_description":"Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, [&hellip;]","og_url":"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/","og_site_name":"Highclasswriters","article_published_time":"2022-06-15T11:52:04+00:00","article_modified_time":"2022-06-15T11:52:06+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/","url":"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/","name":"Security Planning: Acceptable Use and Workstation Security Policies - Highclasswriters","isPartOf":{"@id":"https:\/\/highclasswriters.com\/blog\/#website"},"datePublished":"2022-06-15T11:52:04+00:00","dateModified":"2022-06-15T11:52:06+00:00","author":{"@id":"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/06412d8249aafcb0c75ea9958c98aaae"},"breadcrumb":{"@id":"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/highclasswriters.com\/blog\/security-planning-acceptable-use-and-workstation-security-policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/highclasswriters.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Planning: Acceptable Use and Workstation Security Policies"}]},{"@type":"WebSite","@id":"https:\/\/highclasswriters.com\/blog\/#website","url":"https:\/\/highclasswriters.com\/blog\/","name":"Highclasswriters","description":"Essay Writing Service","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/highclasswriters.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/06412d8249aafcb0c75ea9958c98aaae","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/highclasswriters.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/99ccb26aea1053c4c33c76cde1eee45f1ec58485d03e72c412d111c386e42174?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/99ccb26aea1053c4c33c76cde1eee45f1ec58485d03e72c412d111c386e42174?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/highclasswriters.com\/blog"],"url":"https:\/\/highclasswriters.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/posts\/11480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/comments?post=11480"}],"version-history":[{"count":1,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/posts\/11480\/revisions"}],"predecessor-version":[{"id":11481,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/posts\/11480\/revisions\/11481"}],"wp:attachment":[{"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/media?parent=11480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/categories?post=11480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/highclasswriters.com\/blog\/wp-json\/wp\/v2\/tags?post=11480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}