Rules Of Behavior

  The chief information security officer (CISO) reaches out to you again and complains about the interns who appear to be violating many security policies. They do not lock their workstations, download illegal music, connect their personal devices to the organization’s computers, spend too much time on social media, and even download pornography to the organization’s computers. The CISO asks you to address these violations by developing two-page security document (Rules of Behavior) stating at least 15 rules about what activities employees are not allowed to conduct on the network. See the Department of Justice RoB template as a sample. Additionally, write three supplementary paragraphs to discuss what types of training should occur in order to keep these violations from occurring in the future. How can you proactively aim for compliance with these behaviors? Specifically, the following critical elements must be addressed: Address violations committed by the interns. State at least 15 rules about network conduct. Propose future training possibilities with three supplementary paragraphs. Discuss how businesses can aim for compliance with behaviors.

Sample Solution

   

Rules of Behavior for Employees on the Company Network

Introduction

This document outlines the rules of behavior that all employees must follow when using the company network. These rules are in place to protect the company's information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

Violations Committed by Interns

The following violations have been committed by interns:

  • Not locking workstations
  • Downloading illegal music

Full Answer Section

     
  • Connecting personal devices to the company's computers
  • Spending too much time on social media
  • Downloading pornography to the company's computers

Network Conduct Rules

  1. All employees must lock their workstations when they leave their desks.
  2. Employees are not allowed to download any illegal software or content from the company network.
  3. Employees are not allowed to connect their personal devices to the company network without prior authorization from the IT department.
  4. Employees are not allowed to spend excessive amounts of time on social media while at work.
  5. Employees are not allowed to download any pornographic or offensive content to the company network.
  6. Employees are not allowed to share their passwords with anyone.
  7. Employees are not allowed to access or use any computer systems or data that they are not authorized to access.
  8. Employees are not allowed to attempt to hack into any computer systems or networks.
  9. Employees are not allowed to install any software on the company network without prior authorization from the IT department.
  10. Employees are not allowed to make any changes to the company's computer systems or networks without prior authorization from the IT department.
  11. Employees are not allowed to send or receive any emails that are spam, phishing, or otherwise malicious.
  12. Employees are not allowed to use the company network for personal gain.
  13. Employees are not allowed to violate any other company policies or procedures related to the use of the company network.

Future Training Possibilities

The following training should be provided to employees in order to keep them from violating the network conduct rules:

  • Security awareness training: This training should cover the basics of information security, such as how to create strong passwords, how to identify phishing emails, and how to protect data from unauthorized access.
  • Network security training: This training should cover the specific security policies and procedures that employees must follow when using the company network.
  • Social engineering training: This training should teach employees how to identify and avoid social engineering attacks, such as phishing attacks and baiting attacks.

How to Aim for Compliance

Businesses can aim for compliance with these behaviors by:

  • Communicating the rules and expectations to employees: Employees need to be aware of the network conduct rules and the consequences of violating them. This can be done through training programs, employee handbooks, and other communication channels.
  • Monitoring employee activity: Businesses can monitor employee activity on the network to identify any potential violations. This can be done using a variety of tools and technologies.
  • Enforcing the rules: Businesses need to enforce the network conduct rules consistently and fairly. This means disciplining employees who violate the rules, regardless of their position or seniority.

Conclusion

By following the rules of behavior outlined in this document, employees can help to protect the company's information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Businesses can also aim for compliance with these behaviors by communicating the rules and expectations to employees, monitoring employee activity, and enforcing the rules consistently and fairly.

Three Supplementary Paragraphs

Security Awareness Training

Security awareness training is essential for all employees, regardless of their role or position. This training should cover the basics of information security, such as how to create strong passwords, how to identify phishing emails, and how to protect data from unauthorized access.

Security awareness training can be delivered in a variety of formats, including online courses, in-person workshops, and interactive games. It is important to choose a training program that is engaging and effective.

Network Security Training

Network security training should be provided to all employees who have access to the company network. This training should cover the specific security policies and procedures that employees must follow when using the network.

Network security training can cover a variety of topics, such as how to use the company VPN, how to access sensitive data, and how to report suspicious activity. It is important to tailor the training to the specific needs of the organization.

Social Engineering Training

Social engineering attacks are becoming increasingly common, so it is important for employees to be aware of these threats. Social engineering training can teach employees how to identify and avoid social engineering attacks, such as phishing attacks and baiting attacks.

Social engineering training can be delivered in a variety of formats, including online courses, in-person workshops, and interactive simulations. It is important to choose a training program that is engaging and effective.

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS