Learning Goal: I’m working on a cyber security discussion question and need support to help me learn.
What items would you include in an organization’s IT Security Policy Manual that defines acceptable use of company owned computer systems? In your response, include the following considerations:
What are the risks to the organization if such a policy is not in place?
What are the advantages of planning for every possible scenario? What are the disadvantages of this approach?
What are the advantages of making the policy more generic? What are the disadvantages of this approach?
In preparing your response, include at least one source from professional or academic literature—such as articles from peer-reviewed journals and relevant textbooks. For this course, Wikipedia is not considered an academic or professional reference.