SlideShare a Scribd company logo
1 of 7
<Project Name> Version: <1.0>
Error! Unknown document property name.
Summary Report Module <Insert Module #>
Summary Report – Module 4
Version 1
Prepared By: Jude akassap
Date: 8/28/22
<Project Name> Training Plan Version: <1.0>
Error! Unknown document property name.
Revision Date: Error! Unknown document property name.
Page 2 of 10
NOT DONE - CDC_UP_Training_Plan_Template.docVERSION
HISTORY
Version #
Implemented
By
Revision
Date
Approved
By
Approval
Date
Reason
1.0
Jude Akassap
8/28/22
Jay M.
8/31/22
Document Creation
TABLE OF CONTENTS
1Introduction5
1.1Purpose5
2Executive Summary5
3Detailed Summary5
3.1LAN Security/Password Policy5
3.2Antivirus5
3.3Acceptable Use5
4Recommendations5
5SuggEstED aCTIONS5
Appendix A: Approval6
APPENDIX B: REFERENCES7
APPENDIX C: KEY TERMS8
Introduction
Purpose
This
Summary Report provides a summary of end users
security policies and recommendations for amelioration
Executive Summary
In this report, the end user security policy is examined, and
areas where new policies or modifications would be beneficial
are noted.Detailed Summary
LAN Security/Password Policy
While the LAN Security policy section does mention some
policy parameters regarding password security, certain aspects
are left entirely up to the IT Officers discretion. Password
policy guidelines such as the complexity, length, and frequency
of use should be detailed for increased security. Many
organizations follow a password standard such as NIST
Antivirus
According to the 10.1 Detailed Policy Requirements section,
BYOD devices must have antivirus software, however company-
owned laptops and other devices are not obliged to have
antivirus software. All company-owned devices should come
with antivirus software installed, and only IT administrators
should be allowed to turn it off. Any software installation
should be subject to prior authorization and IT administrative
rights. By enabling antivirus and carefully examining software
before it is loaded, end device security will be much improved.
Acceptable Use
There is no definition of acceptable use of an organization
resource. Implementing firewall rules to ban specific websites
and website categories that are regarded inappropriate for the
workplace is a good idea. Policies that outline acceptable and
undesirable workplace browsing activity should be made
available to employees.
Recommendations
This report finds there are several critical issues with the
current security policyand recommends the above actions be
implemented to increase the overallsecurity of the
organization.SuggEstED aCTIONS
Following these recommendations, new policies ought to be
developed and included in the upcoming version of the end user
information security policy.
Appendix A: Approval
The undersigned acknowledge they have reviewed the
and agree with the approach it presents. Changes to this
will be coordinated with and approved by the
undersigned or their designated representatives.
Signature:
Date:
Print Name:
Jude Akassap
Title:
Role:
Signature:
Date:
Print Name:
Title:
Role:
Signature:
Date:
Print Name:
Title:
Role:
APPENDIX B: REFERENCES
[Insert the name, version number, description, and physical
location of any documents referenced in this document. Add
rows to the table as necessary. This is where you would want to
reference your Risk Register and any other documents that you
need to. For the purposes of this class, please include
references to course material or outside sources that you are
using in your work.]
The following table summarizes the documents referenced in
this document.
Document Name and Version
Description
Location
<Document Name and Version Number>
[Provide description of the document]
<URL or Network path where document is located>
APPENDIX C: KEY TERMS
[Insert terms and definitions used in this document. Add rows
to the table as necessary. Keep in mind that you are typically
writing a summary report for someone who is not familiar with
information technology. Be sure to define any terms here that
might need to be explained.]
The following table provides definitions for terms relevant to
this document.
Term
Definition
[Insert Term]
[Provide definition of the term used in this document.]
[Insert Term]
[Provide definition of the term used in this document.]
[Insert Term]
[Provide definition of the term used in this document.]
1
Revision Date: Error! Unknown document property name.
Page
7 of 8
image1.png

More Related Content

Similar to Project NameVersion 1.0 Error! Unknown do.docx

Risk Management Plan Project NameLast UpdatedOverviewPro.docx
Risk Management Plan Project NameLast UpdatedOverviewPro.docxRisk Management Plan Project NameLast UpdatedOverviewPro.docx
Risk Management Plan Project NameLast UpdatedOverviewPro.docxhealdkathaleen
 
How to Write a Test Plan .pdf
How to Write a Test Plan .pdfHow to Write a Test Plan .pdf
How to Write a Test Plan .pdfSudhanshiBakre1
 
Ray Business Technologies Process Methodology
Ray Business Technologies Process MethodologyRay Business Technologies Process Methodology
Ray Business Technologies Process Methodologyray biztech
 
Software development plan template
Software development plan templateSoftware development plan template
Software development plan templateRina Wijaya
 
Softwaredevelopmentplantemplate 170323125907
Softwaredevelopmentplantemplate 170323125907Softwaredevelopmentplantemplate 170323125907
Softwaredevelopmentplantemplate 170323125907ahmady
 
IEEE PSRC - Quality Assurance for Protection and Control Design
IEEE PSRC -  Quality Assurance for Protection and Control DesignIEEE PSRC -  Quality Assurance for Protection and Control Design
IEEE PSRC - Quality Assurance for Protection and Control DesignJose J. Rodriguez Alvarez, MEM
 
Project #1-Note all projects must be in seperate microsoft word.docx
Project #1-Note all projects must be in seperate microsoft word.docxProject #1-Note all projects must be in seperate microsoft word.docx
Project #1-Note all projects must be in seperate microsoft word.docxdenneymargareta
 
Criteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docxCriteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docxwillcoxjanay
 
Project Plan template
Project Plan templateProject Plan template
Project Plan templateDemand Metric
 
Software requirements specification_for_Projects
Software requirements specification_for_ProjectsSoftware requirements specification_for_Projects
Software requirements specification_for_Projectsnazzf
 
Project plan preparation guidelines
Project plan preparation guidelinesProject plan preparation guidelines
Project plan preparation guidelinesKapila Kapila
 
complete any required actions as described in the highlighted are.docx
complete any required actions as described in the highlighted are.docxcomplete any required actions as described in the highlighted are.docx
complete any required actions as described in the highlighted are.docxmccormicknadine86
 
D.Q1Information System and Enterprise Systems· Identify.docx
D.Q1Information System and Enterprise Systems· Identify.docxD.Q1Information System and Enterprise Systems· Identify.docx
D.Q1Information System and Enterprise Systems· Identify.docxtheodorelove43763
 
Test Documentation Based On Ieee829 155261
Test Documentation Based On Ieee829 155261Test Documentation Based On Ieee829 155261
Test Documentation Based On Ieee829 155261tonynavy
 
EXECUTION PLAN REVISION HISTORYVersion #Implemented byRe
EXECUTION PLAN REVISION HISTORYVersion #Implemented byReEXECUTION PLAN REVISION HISTORYVersion #Implemented byRe
EXECUTION PLAN REVISION HISTORYVersion #Implemented byReBetseyCalderon89
 
Customerlogo hereProject Name Project CharterCompanylog
Customerlogo hereProject Name Project CharterCompanylogCustomerlogo hereProject Name Project CharterCompanylog
Customerlogo hereProject Name Project CharterCompanylogOllieShoresna
 

Similar to Project NameVersion 1.0 Error! Unknown do.docx (20)

Risk Management Plan Project NameLast UpdatedOverviewPro.docx
Risk Management Plan Project NameLast UpdatedOverviewPro.docxRisk Management Plan Project NameLast UpdatedOverviewPro.docx
Risk Management Plan Project NameLast UpdatedOverviewPro.docx
 
How to Write a Test Plan .pdf
How to Write a Test Plan .pdfHow to Write a Test Plan .pdf
How to Write a Test Plan .pdf
 
Ray Business Technologies Process Methodology
Ray Business Technologies Process MethodologyRay Business Technologies Process Methodology
Ray Business Technologies Process Methodology
 
Software development plan template
Software development plan templateSoftware development plan template
Software development plan template
 
Softwaredevelopmentplantemplate 170323125907
Softwaredevelopmentplantemplate 170323125907Softwaredevelopmentplantemplate 170323125907
Softwaredevelopmentplantemplate 170323125907
 
IEEE PSRC - Quality Assurance for Protection and Control Design
IEEE PSRC -  Quality Assurance for Protection and Control DesignIEEE PSRC -  Quality Assurance for Protection and Control Design
IEEE PSRC - Quality Assurance for Protection and Control Design
 
Project #1-Note all projects must be in seperate microsoft word.docx
Project #1-Note all projects must be in seperate microsoft word.docxProject #1-Note all projects must be in seperate microsoft word.docx
Project #1-Note all projects must be in seperate microsoft word.docx
 
Criteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docxCriteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docx
 
Marking report
Marking reportMarking report
Marking report
 
Project Plan template
Project Plan templateProject Plan template
Project Plan template
 
Software requirements specification_for_Projects
Software requirements specification_for_ProjectsSoftware requirements specification_for_Projects
Software requirements specification_for_Projects
 
Project plan preparation guidelines
Project plan preparation guidelinesProject plan preparation guidelines
Project plan preparation guidelines
 
CTFL chapter 05
CTFL chapter 05CTFL chapter 05
CTFL chapter 05
 
complete any required actions as described in the highlighted are.docx
complete any required actions as described in the highlighted are.docxcomplete any required actions as described in the highlighted are.docx
complete any required actions as described in the highlighted are.docx
 
D.Q1Information System and Enterprise Systems· Identify.docx
D.Q1Information System and Enterprise Systems· Identify.docxD.Q1Information System and Enterprise Systems· Identify.docx
D.Q1Information System and Enterprise Systems· Identify.docx
 
Test Documentation Based On Ieee829 155261
Test Documentation Based On Ieee829 155261Test Documentation Based On Ieee829 155261
Test Documentation Based On Ieee829 155261
 
EXECUTION PLAN REVISION HISTORYVersion #Implemented byRe
EXECUTION PLAN REVISION HISTORYVersion #Implemented byReEXECUTION PLAN REVISION HISTORYVersion #Implemented byRe
EXECUTION PLAN REVISION HISTORYVersion #Implemented byRe
 
Ieee829mtp
Ieee829mtpIeee829mtp
Ieee829mtp
 
Customerlogo hereProject Name Project CharterCompanylog
Customerlogo hereProject Name Project CharterCompanylogCustomerlogo hereProject Name Project CharterCompanylog
Customerlogo hereProject Name Project CharterCompanylog
 
Software Quality Assurance Model for Software Excellence with Its Requirements
Software Quality Assurance Model for Software Excellence with Its RequirementsSoftware Quality Assurance Model for Software Excellence with Its Requirements
Software Quality Assurance Model for Software Excellence with Its Requirements
 

More from Abhinav816839

Clinical Reasoning Case Study Total Parenteral NutritionName ____.docx
Clinical Reasoning Case Study Total Parenteral NutritionName ____.docxClinical Reasoning Case Study Total Parenteral NutritionName ____.docx
Clinical Reasoning Case Study Total Parenteral NutritionName ____.docxAbhinav816839
 
Correctional Health Care AssignmentCourse Objective for Assignme.docx
Correctional Health Care AssignmentCourse Objective for Assignme.docxCorrectional Health Care AssignmentCourse Objective for Assignme.docx
Correctional Health Care AssignmentCourse Objective for Assignme.docxAbhinav816839
 
Class Response 1 Making or implementing policies should ultima.docx
Class Response 1 Making or implementing policies should ultima.docxClass Response 1 Making or implementing policies should ultima.docx
Class Response 1 Making or implementing policies should ultima.docxAbhinav816839
 
Chapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docx
Chapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docxChapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docx
Chapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docxAbhinav816839
 
Chapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docx
Chapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docxChapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docx
Chapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docxAbhinav816839
 
CS547 Wireless Networking and Security Exam 1 Questio.docx
CS547 Wireless Networking and Security Exam 1  Questio.docxCS547 Wireless Networking and Security Exam 1  Questio.docx
CS547 Wireless Networking and Security Exam 1 Questio.docxAbhinav816839
 
Communicating professionally and ethically is an essential ski.docx
Communicating professionally and ethically is an essential ski.docxCommunicating professionally and ethically is an essential ski.docx
Communicating professionally and ethically is an essential ski.docxAbhinav816839
 
Case Study The HouseCallCompany.com Abstract The case.docx
Case Study The HouseCallCompany.com  Abstract The case.docxCase Study The HouseCallCompany.com  Abstract The case.docx
Case Study The HouseCallCompany.com Abstract The case.docxAbhinav816839
 
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docxCHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docxAbhinav816839
 
BiopsychologySensation and PerceptionInstructionsTake a mom.docx
BiopsychologySensation and PerceptionInstructionsTake a mom.docxBiopsychologySensation and PerceptionInstructionsTake a mom.docx
BiopsychologySensation and PerceptionInstructionsTake a mom.docxAbhinav816839
 
Chapter 2Historical Perspectives on Case ManagementChapter In.docx
Chapter 2Historical Perspectives on Case ManagementChapter In.docxChapter 2Historical Perspectives on Case ManagementChapter In.docx
Chapter 2Historical Perspectives on Case ManagementChapter In.docxAbhinav816839
 
Compare and Contrast Systems Development Life Cycle (SDLC Mo.docx
Compare and Contrast Systems Development Life Cycle (SDLC Mo.docxCompare and Contrast Systems Development Life Cycle (SDLC Mo.docx
Compare and Contrast Systems Development Life Cycle (SDLC Mo.docxAbhinav816839
 
C H A P T E R F O U R PROBLEMS OF COMMUNICATIONCri.docx
C H A P T E R  F O U R  PROBLEMS OF COMMUNICATIONCri.docxC H A P T E R  F O U R  PROBLEMS OF COMMUNICATIONCri.docx
C H A P T E R F O U R PROBLEMS OF COMMUNICATIONCri.docxAbhinav816839
 
By Day 6 of Week Due 917Respond to at least two of your c.docx
By Day 6 of Week Due 917Respond to at least two of your c.docxBy Day 6 of Week Due 917Respond to at least two of your c.docx
By Day 6 of Week Due 917Respond to at least two of your c.docxAbhinav816839
 
ASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name .docx
ASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name                .docxASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name                .docx
ASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name .docxAbhinav816839
 
3 pages excluding the title and reference page.Describe how Ph.docx
3 pages excluding the title and reference page.Describe how Ph.docx3 pages excluding the title and reference page.Describe how Ph.docx
3 pages excluding the title and reference page.Describe how Ph.docxAbhinav816839
 
91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx
91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx
91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docxAbhinav816839
 
All details are posted in the documentPlease use this topics for.docx
All details are posted in the documentPlease use this topics for.docxAll details are posted in the documentPlease use this topics for.docx
All details are posted in the documentPlease use this topics for.docxAbhinav816839
 
1, Describe the mind as a stream of consciousness, and what it revea.docx
1, Describe the mind as a stream of consciousness, and what it revea.docx1, Describe the mind as a stream of consciousness, and what it revea.docx
1, Describe the mind as a stream of consciousness, and what it revea.docxAbhinav816839
 
2Some of the ways that students are diverse in todays schools .docx
2Some of the ways that students are diverse in todays schools .docx2Some of the ways that students are diverse in todays schools .docx
2Some of the ways that students are diverse in todays schools .docxAbhinav816839
 

More from Abhinav816839 (20)

Clinical Reasoning Case Study Total Parenteral NutritionName ____.docx
Clinical Reasoning Case Study Total Parenteral NutritionName ____.docxClinical Reasoning Case Study Total Parenteral NutritionName ____.docx
Clinical Reasoning Case Study Total Parenteral NutritionName ____.docx
 
Correctional Health Care AssignmentCourse Objective for Assignme.docx
Correctional Health Care AssignmentCourse Objective for Assignme.docxCorrectional Health Care AssignmentCourse Objective for Assignme.docx
Correctional Health Care AssignmentCourse Objective for Assignme.docx
 
Class Response 1 Making or implementing policies should ultima.docx
Class Response 1 Making or implementing policies should ultima.docxClass Response 1 Making or implementing policies should ultima.docx
Class Response 1 Making or implementing policies should ultima.docx
 
Chapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docx
Chapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docxChapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docx
Chapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docx
 
Chapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docx
Chapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docxChapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docx
Chapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docx
 
CS547 Wireless Networking and Security Exam 1 Questio.docx
CS547 Wireless Networking and Security Exam 1  Questio.docxCS547 Wireless Networking and Security Exam 1  Questio.docx
CS547 Wireless Networking and Security Exam 1 Questio.docx
 
Communicating professionally and ethically is an essential ski.docx
Communicating professionally and ethically is an essential ski.docxCommunicating professionally and ethically is an essential ski.docx
Communicating professionally and ethically is an essential ski.docx
 
Case Study The HouseCallCompany.com Abstract The case.docx
Case Study The HouseCallCompany.com  Abstract The case.docxCase Study The HouseCallCompany.com  Abstract The case.docx
Case Study The HouseCallCompany.com Abstract The case.docx
 
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docxCHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
 
BiopsychologySensation and PerceptionInstructionsTake a mom.docx
BiopsychologySensation and PerceptionInstructionsTake a mom.docxBiopsychologySensation and PerceptionInstructionsTake a mom.docx
BiopsychologySensation and PerceptionInstructionsTake a mom.docx
 
Chapter 2Historical Perspectives on Case ManagementChapter In.docx
Chapter 2Historical Perspectives on Case ManagementChapter In.docxChapter 2Historical Perspectives on Case ManagementChapter In.docx
Chapter 2Historical Perspectives on Case ManagementChapter In.docx
 
Compare and Contrast Systems Development Life Cycle (SDLC Mo.docx
Compare and Contrast Systems Development Life Cycle (SDLC Mo.docxCompare and Contrast Systems Development Life Cycle (SDLC Mo.docx
Compare and Contrast Systems Development Life Cycle (SDLC Mo.docx
 
C H A P T E R F O U R PROBLEMS OF COMMUNICATIONCri.docx
C H A P T E R  F O U R  PROBLEMS OF COMMUNICATIONCri.docxC H A P T E R  F O U R  PROBLEMS OF COMMUNICATIONCri.docx
C H A P T E R F O U R PROBLEMS OF COMMUNICATIONCri.docx
 
By Day 6 of Week Due 917Respond to at least two of your c.docx
By Day 6 of Week Due 917Respond to at least two of your c.docxBy Day 6 of Week Due 917Respond to at least two of your c.docx
By Day 6 of Week Due 917Respond to at least two of your c.docx
 
ASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name .docx
ASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name                .docxASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name                .docx
ASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name .docx
 
3 pages excluding the title and reference page.Describe how Ph.docx
3 pages excluding the title and reference page.Describe how Ph.docx3 pages excluding the title and reference page.Describe how Ph.docx
3 pages excluding the title and reference page.Describe how Ph.docx
 
91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx
91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx
91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx
 
All details are posted in the documentPlease use this topics for.docx
All details are posted in the documentPlease use this topics for.docxAll details are posted in the documentPlease use this topics for.docx
All details are posted in the documentPlease use this topics for.docx
 
1, Describe the mind as a stream of consciousness, and what it revea.docx
1, Describe the mind as a stream of consciousness, and what it revea.docx1, Describe the mind as a stream of consciousness, and what it revea.docx
1, Describe the mind as a stream of consciousness, and what it revea.docx
 
2Some of the ways that students are diverse in todays schools .docx
2Some of the ways that students are diverse in todays schools .docx2Some of the ways that students are diverse in todays schools .docx
2Some of the ways that students are diverse in todays schools .docx
 

Recently uploaded

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 

Recently uploaded (20)

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 

Project NameVersion 1.0 Error! Unknown do.docx

  • 1. <Project Name> Version: <1.0> Error! Unknown document property name. Summary Report Module <Insert Module #> Summary Report – Module 4 Version 1 Prepared By: Jude akassap Date: 8/28/22 <Project Name> Training Plan Version: <1.0> Error! Unknown document property name. Revision Date: Error! Unknown document property name. Page 2 of 10 NOT DONE - CDC_UP_Training_Plan_Template.docVERSION HISTORY Version # Implemented By Revision Date Approved By
  • 2. Approval Date Reason 1.0 Jude Akassap 8/28/22 Jay M. 8/31/22 Document Creation TABLE OF CONTENTS 1Introduction5 1.1Purpose5 2Executive Summary5 3Detailed Summary5 3.1LAN Security/Password Policy5
  • 3. 3.2Antivirus5 3.3Acceptable Use5 4Recommendations5 5SuggEstED aCTIONS5 Appendix A: Approval6 APPENDIX B: REFERENCES7 APPENDIX C: KEY TERMS8 Introduction Purpose This Summary Report provides a summary of end users security policies and recommendations for amelioration Executive Summary In this report, the end user security policy is examined, and areas where new policies or modifications would be beneficial are noted.Detailed Summary LAN Security/Password Policy While the LAN Security policy section does mention some policy parameters regarding password security, certain aspects are left entirely up to the IT Officers discretion. Password policy guidelines such as the complexity, length, and frequency of use should be detailed for increased security. Many organizations follow a password standard such as NIST Antivirus According to the 10.1 Detailed Policy Requirements section, BYOD devices must have antivirus software, however company- owned laptops and other devices are not obliged to have antivirus software. All company-owned devices should come
  • 4. with antivirus software installed, and only IT administrators should be allowed to turn it off. Any software installation should be subject to prior authorization and IT administrative rights. By enabling antivirus and carefully examining software before it is loaded, end device security will be much improved. Acceptable Use There is no definition of acceptable use of an organization resource. Implementing firewall rules to ban specific websites and website categories that are regarded inappropriate for the workplace is a good idea. Policies that outline acceptable and undesirable workplace browsing activity should be made available to employees. Recommendations This report finds there are several critical issues with the current security policyand recommends the above actions be implemented to increase the overallsecurity of the organization.SuggEstED aCTIONS Following these recommendations, new policies ought to be developed and included in the upcoming version of the end user information security policy. Appendix A: Approval The undersigned acknowledge they have reviewed the and agree with the approach it presents. Changes to this will be coordinated with and approved by the undersigned or their designated representatives. Signature: Date:
  • 5. Print Name: Jude Akassap Title: Role: Signature: Date: Print Name: Title: Role: Signature: Date: Print Name:
  • 6. Title: Role: APPENDIX B: REFERENCES [Insert the name, version number, description, and physical location of any documents referenced in this document. Add rows to the table as necessary. This is where you would want to reference your Risk Register and any other documents that you need to. For the purposes of this class, please include references to course material or outside sources that you are using in your work.] The following table summarizes the documents referenced in this document. Document Name and Version Description Location <Document Name and Version Number> [Provide description of the document] <URL or Network path where document is located> APPENDIX C: KEY TERMS [Insert terms and definitions used in this document. Add rows to the table as necessary. Keep in mind that you are typically
  • 7. writing a summary report for someone who is not familiar with information technology. Be sure to define any terms here that might need to be explained.] The following table provides definitions for terms relevant to this document. Term Definition [Insert Term] [Provide definition of the term used in this document.] [Insert Term] [Provide definition of the term used in this document.] [Insert Term] [Provide definition of the term used in this document.] 1 Revision Date: Error! Unknown document property name. Page 7 of 8 image1.png