SlideShare a Scribd company logo
<Project Name> Version: <1.0>
Error! Unknown document property name.
Summary Report Module <Insert Module #>
Summary Report – Module 4
Version 1
Prepared By: Jude akassap
Date: 8/28/22
<Project Name> Training Plan Version: <1.0>
Error! Unknown document property name.
Revision Date: Error! Unknown document property name.
Page 2 of 10
NOT DONE - CDC_UP_Training_Plan_Template.docVERSION
HISTORY
Version #
Implemented
By
Revision
Date
Approved
By
Approval
Date
Reason
1.0
Jude Akassap
8/28/22
Jay M.
8/31/22
Document Creation
TABLE OF CONTENTS
1Introduction5
1.1Purpose5
2Executive Summary5
3Detailed Summary5
3.1LAN Security/Password Policy5
3.2Antivirus5
3.3Acceptable Use5
4Recommendations5
5SuggEstED aCTIONS5
Appendix A: Approval6
APPENDIX B: REFERENCES7
APPENDIX C: KEY TERMS8
Introduction
Purpose
This
Summary Report provides a summary of end users
security policies and recommendations for amelioration
Executive Summary
In this report, the end user security policy is examined, and
areas where new policies or modifications would be beneficial
are noted.Detailed Summary
LAN Security/Password Policy
While the LAN Security policy section does mention some
policy parameters regarding password security, certain aspects
are left entirely up to the IT Officers discretion. Password
policy guidelines such as the complexity, length, and frequency
of use should be detailed for increased security. Many
organizations follow a password standard such as NIST
Antivirus
According to the 10.1 Detailed Policy Requirements section,
BYOD devices must have antivirus software, however company-
owned laptops and other devices are not obliged to have
antivirus software. All company-owned devices should come
with antivirus software installed, and only IT administrators
should be allowed to turn it off. Any software installation
should be subject to prior authorization and IT administrative
rights. By enabling antivirus and carefully examining software
before it is loaded, end device security will be much improved.
Acceptable Use
There is no definition of acceptable use of an organization
resource. Implementing firewall rules to ban specific websites
and website categories that are regarded inappropriate for the
workplace is a good idea. Policies that outline acceptable and
undesirable workplace browsing activity should be made
available to employees.
Recommendations
This report finds there are several critical issues with the
current security policyand recommends the above actions be
implemented to increase the overallsecurity of the
organization.SuggEstED aCTIONS
Following these recommendations, new policies ought to be
developed and included in the upcoming version of the end user
information security policy.
Appendix A: Approval
The undersigned acknowledge they have reviewed the
and agree with the approach it presents. Changes to this
will be coordinated with and approved by the
undersigned or their designated representatives.
Signature:
Date:
Print Name:
Jude Akassap
Title:
Role:
Signature:
Date:
Print Name:
Title:
Role:
Signature:
Date:
Print Name:
Title:
Role:
APPENDIX B: REFERENCES
[Insert the name, version number, description, and physical
location of any documents referenced in this document. Add
rows to the table as necessary. This is where you would want to
reference your Risk Register and any other documents that you
need to. For the purposes of this class, please include
references to course material or outside sources that you are
using in your work.]
The following table summarizes the documents referenced in
this document.
Document Name and Version
Description
Location
<Document Name and Version Number>
[Provide description of the document]
<URL or Network path where document is located>
APPENDIX C: KEY TERMS
[Insert terms and definitions used in this document. Add rows
to the table as necessary. Keep in mind that you are typically
writing a summary report for someone who is not familiar with
information technology. Be sure to define any terms here that
might need to be explained.]
The following table provides definitions for terms relevant to
this document.
Term
Definition
[Insert Term]
[Provide definition of the term used in this document.]
[Insert Term]
[Provide definition of the term used in this document.]
[Insert Term]
[Provide definition of the term used in this document.]
1
Revision Date: Error! Unknown document property name.
Page
7 of 8
image1.png

More Related Content

Similar to Project NameVersion 1.0 Error! Unknown do.docx

Risk Management Plan Project NameLast UpdatedOverviewPro.docx
Risk Management Plan Project NameLast UpdatedOverviewPro.docxRisk Management Plan Project NameLast UpdatedOverviewPro.docx
Risk Management Plan Project NameLast UpdatedOverviewPro.docx
healdkathaleen
 
How to Write a Test Plan .pdf
How to Write a Test Plan .pdfHow to Write a Test Plan .pdf
How to Write a Test Plan .pdf
SudhanshiBakre1
 
Ray Business Technologies Process Methodology
Ray Business Technologies Process MethodologyRay Business Technologies Process Methodology
Ray Business Technologies Process Methodology
ray biztech
 
Software development plan template
Software development plan templateSoftware development plan template
Software development plan template
Rina Wijaya
 
Softwaredevelopmentplantemplate 170323125907
Softwaredevelopmentplantemplate 170323125907Softwaredevelopmentplantemplate 170323125907
Softwaredevelopmentplantemplate 170323125907
ahmady
 
IEEE PSRC - Quality Assurance for Protection and Control Design
IEEE PSRC -  Quality Assurance for Protection and Control DesignIEEE PSRC -  Quality Assurance for Protection and Control Design
IEEE PSRC - Quality Assurance for Protection and Control Design
Jose J. Rodriguez Alvarez, MEM
 
Project #1-Note all projects must be in seperate microsoft word.docx
Project #1-Note all projects must be in seperate microsoft word.docxProject #1-Note all projects must be in seperate microsoft word.docx
Project #1-Note all projects must be in seperate microsoft word.docx
denneymargareta
 
Criteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docxCriteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docx
willcoxjanay
 
Marking report
Marking reportMarking report
Marking report
Aeron Shrestha
 
Project Plan template
Project Plan templateProject Plan template
Project Plan template
Demand Metric
 
Software requirements specification_for_Projects
Software requirements specification_for_ProjectsSoftware requirements specification_for_Projects
Software requirements specification_for_Projects
nazzf
 
Project plan preparation guidelines
Project plan preparation guidelinesProject plan preparation guidelines
Project plan preparation guidelines
Kapila Kapila
 
CTFL chapter 05
CTFL chapter 05CTFL chapter 05
CTFL chapter 05
Davis Thomas
 
complete any required actions as described in the highlighted are.docx
complete any required actions as described in the highlighted are.docxcomplete any required actions as described in the highlighted are.docx
complete any required actions as described in the highlighted are.docx
mccormicknadine86
 
D.Q1Information System and Enterprise Systems· Identify.docx
D.Q1Information System and Enterprise Systems· Identify.docxD.Q1Information System and Enterprise Systems· Identify.docx
D.Q1Information System and Enterprise Systems· Identify.docx
theodorelove43763
 
Test Documentation Based On Ieee829 155261
Test Documentation Based On Ieee829 155261Test Documentation Based On Ieee829 155261
Test Documentation Based On Ieee829 155261
tonynavy
 
EXECUTION PLAN REVISION HISTORYVersion #Implemented byRe
EXECUTION PLAN REVISION HISTORYVersion #Implemented byReEXECUTION PLAN REVISION HISTORYVersion #Implemented byRe
EXECUTION PLAN REVISION HISTORYVersion #Implemented byRe
BetseyCalderon89
 
Ieee829mtp
Ieee829mtpIeee829mtp
Ieee829mtp
sephalika
 
Customerlogo hereProject Name Project CharterCompanylog
Customerlogo hereProject Name Project CharterCompanylogCustomerlogo hereProject Name Project CharterCompanylog
Customerlogo hereProject Name Project CharterCompanylog
OllieShoresna
 
Software Quality Assurance Model for Software Excellence with Its Requirements
Software Quality Assurance Model for Software Excellence with Its RequirementsSoftware Quality Assurance Model for Software Excellence with Its Requirements
Software Quality Assurance Model for Software Excellence with Its Requirements
United International Journal for Research & Technology
 

Similar to Project NameVersion 1.0 Error! Unknown do.docx (20)

Risk Management Plan Project NameLast UpdatedOverviewPro.docx
Risk Management Plan Project NameLast UpdatedOverviewPro.docxRisk Management Plan Project NameLast UpdatedOverviewPro.docx
Risk Management Plan Project NameLast UpdatedOverviewPro.docx
 
How to Write a Test Plan .pdf
How to Write a Test Plan .pdfHow to Write a Test Plan .pdf
How to Write a Test Plan .pdf
 
Ray Business Technologies Process Methodology
Ray Business Technologies Process MethodologyRay Business Technologies Process Methodology
Ray Business Technologies Process Methodology
 
Software development plan template
Software development plan templateSoftware development plan template
Software development plan template
 
Softwaredevelopmentplantemplate 170323125907
Softwaredevelopmentplantemplate 170323125907Softwaredevelopmentplantemplate 170323125907
Softwaredevelopmentplantemplate 170323125907
 
IEEE PSRC - Quality Assurance for Protection and Control Design
IEEE PSRC -  Quality Assurance for Protection and Control DesignIEEE PSRC -  Quality Assurance for Protection and Control Design
IEEE PSRC - Quality Assurance for Protection and Control Design
 
Project #1-Note all projects must be in seperate microsoft word.docx
Project #1-Note all projects must be in seperate microsoft word.docxProject #1-Note all projects must be in seperate microsoft word.docx
Project #1-Note all projects must be in seperate microsoft word.docx
 
Criteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docxCriteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docx
 
Marking report
Marking reportMarking report
Marking report
 
Project Plan template
Project Plan templateProject Plan template
Project Plan template
 
Software requirements specification_for_Projects
Software requirements specification_for_ProjectsSoftware requirements specification_for_Projects
Software requirements specification_for_Projects
 
Project plan preparation guidelines
Project plan preparation guidelinesProject plan preparation guidelines
Project plan preparation guidelines
 
CTFL chapter 05
CTFL chapter 05CTFL chapter 05
CTFL chapter 05
 
complete any required actions as described in the highlighted are.docx
complete any required actions as described in the highlighted are.docxcomplete any required actions as described in the highlighted are.docx
complete any required actions as described in the highlighted are.docx
 
D.Q1Information System and Enterprise Systems· Identify.docx
D.Q1Information System and Enterprise Systems· Identify.docxD.Q1Information System and Enterprise Systems· Identify.docx
D.Q1Information System and Enterprise Systems· Identify.docx
 
Test Documentation Based On Ieee829 155261
Test Documentation Based On Ieee829 155261Test Documentation Based On Ieee829 155261
Test Documentation Based On Ieee829 155261
 
EXECUTION PLAN REVISION HISTORYVersion #Implemented byRe
EXECUTION PLAN REVISION HISTORYVersion #Implemented byReEXECUTION PLAN REVISION HISTORYVersion #Implemented byRe
EXECUTION PLAN REVISION HISTORYVersion #Implemented byRe
 
Ieee829mtp
Ieee829mtpIeee829mtp
Ieee829mtp
 
Customerlogo hereProject Name Project CharterCompanylog
Customerlogo hereProject Name Project CharterCompanylogCustomerlogo hereProject Name Project CharterCompanylog
Customerlogo hereProject Name Project CharterCompanylog
 
Software Quality Assurance Model for Software Excellence with Its Requirements
Software Quality Assurance Model for Software Excellence with Its RequirementsSoftware Quality Assurance Model for Software Excellence with Its Requirements
Software Quality Assurance Model for Software Excellence with Its Requirements
 

More from Abhinav816839

Clinical Reasoning Case Study Total Parenteral NutritionName ____.docx
Clinical Reasoning Case Study Total Parenteral NutritionName ____.docxClinical Reasoning Case Study Total Parenteral NutritionName ____.docx
Clinical Reasoning Case Study Total Parenteral NutritionName ____.docx
Abhinav816839
 
Correctional Health Care AssignmentCourse Objective for Assignme.docx
Correctional Health Care AssignmentCourse Objective for Assignme.docxCorrectional Health Care AssignmentCourse Objective for Assignme.docx
Correctional Health Care AssignmentCourse Objective for Assignme.docx
Abhinav816839
 
Class Response 1 Making or implementing policies should ultima.docx
Class Response 1 Making or implementing policies should ultima.docxClass Response 1 Making or implementing policies should ultima.docx
Class Response 1 Making or implementing policies should ultima.docx
Abhinav816839
 
Chapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docx
Chapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docxChapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docx
Chapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docx
Abhinav816839
 
Chapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docx
Chapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docxChapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docx
Chapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docx
Abhinav816839
 
CS547 Wireless Networking and Security Exam 1 Questio.docx
CS547 Wireless Networking and Security Exam 1  Questio.docxCS547 Wireless Networking and Security Exam 1  Questio.docx
CS547 Wireless Networking and Security Exam 1 Questio.docx
Abhinav816839
 
Communicating professionally and ethically is an essential ski.docx
Communicating professionally and ethically is an essential ski.docxCommunicating professionally and ethically is an essential ski.docx
Communicating professionally and ethically is an essential ski.docx
Abhinav816839
 
Case Study The HouseCallCompany.com Abstract The case.docx
Case Study The HouseCallCompany.com  Abstract The case.docxCase Study The HouseCallCompany.com  Abstract The case.docx
Case Study The HouseCallCompany.com Abstract The case.docx
Abhinav816839
 
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docxCHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
Abhinav816839
 
BiopsychologySensation and PerceptionInstructionsTake a mom.docx
BiopsychologySensation and PerceptionInstructionsTake a mom.docxBiopsychologySensation and PerceptionInstructionsTake a mom.docx
BiopsychologySensation and PerceptionInstructionsTake a mom.docx
Abhinav816839
 
Chapter 2Historical Perspectives on Case ManagementChapter In.docx
Chapter 2Historical Perspectives on Case ManagementChapter In.docxChapter 2Historical Perspectives on Case ManagementChapter In.docx
Chapter 2Historical Perspectives on Case ManagementChapter In.docx
Abhinav816839
 
Compare and Contrast Systems Development Life Cycle (SDLC Mo.docx
Compare and Contrast Systems Development Life Cycle (SDLC Mo.docxCompare and Contrast Systems Development Life Cycle (SDLC Mo.docx
Compare and Contrast Systems Development Life Cycle (SDLC Mo.docx
Abhinav816839
 
C H A P T E R F O U R PROBLEMS OF COMMUNICATIONCri.docx
C H A P T E R  F O U R  PROBLEMS OF COMMUNICATIONCri.docxC H A P T E R  F O U R  PROBLEMS OF COMMUNICATIONCri.docx
C H A P T E R F O U R PROBLEMS OF COMMUNICATIONCri.docx
Abhinav816839
 
By Day 6 of Week Due 917Respond to at least two of your c.docx
By Day 6 of Week Due 917Respond to at least two of your c.docxBy Day 6 of Week Due 917Respond to at least two of your c.docx
By Day 6 of Week Due 917Respond to at least two of your c.docx
Abhinav816839
 
ASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name .docx
ASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name                .docxASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name                .docx
ASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name .docx
Abhinav816839
 
3 pages excluding the title and reference page.Describe how Ph.docx
3 pages excluding the title and reference page.Describe how Ph.docx3 pages excluding the title and reference page.Describe how Ph.docx
3 pages excluding the title and reference page.Describe how Ph.docx
Abhinav816839
 
91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx
91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx
91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx
Abhinav816839
 
All details are posted in the documentPlease use this topics for.docx
All details are posted in the documentPlease use this topics for.docxAll details are posted in the documentPlease use this topics for.docx
All details are posted in the documentPlease use this topics for.docx
Abhinav816839
 
1, Describe the mind as a stream of consciousness, and what it revea.docx
1, Describe the mind as a stream of consciousness, and what it revea.docx1, Describe the mind as a stream of consciousness, and what it revea.docx
1, Describe the mind as a stream of consciousness, and what it revea.docx
Abhinav816839
 
2Some of the ways that students are diverse in todays schools .docx
2Some of the ways that students are diverse in todays schools .docx2Some of the ways that students are diverse in todays schools .docx
2Some of the ways that students are diverse in todays schools .docx
Abhinav816839
 

More from Abhinav816839 (20)

Clinical Reasoning Case Study Total Parenteral NutritionName ____.docx
Clinical Reasoning Case Study Total Parenteral NutritionName ____.docxClinical Reasoning Case Study Total Parenteral NutritionName ____.docx
Clinical Reasoning Case Study Total Parenteral NutritionName ____.docx
 
Correctional Health Care AssignmentCourse Objective for Assignme.docx
Correctional Health Care AssignmentCourse Objective for Assignme.docxCorrectional Health Care AssignmentCourse Objective for Assignme.docx
Correctional Health Care AssignmentCourse Objective for Assignme.docx
 
Class Response 1 Making or implementing policies should ultima.docx
Class Response 1 Making or implementing policies should ultima.docxClass Response 1 Making or implementing policies should ultima.docx
Class Response 1 Making or implementing policies should ultima.docx
 
Chapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docx
Chapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docxChapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docx
Chapter 3 - Evaluation Rubric Criteria Does Not Meet 0.01 .docx
 
Chapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docx
Chapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docxChapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docx
Chapter 4 (Sexual Assault)Points Possible 20Deliverable Len.docx
 
CS547 Wireless Networking and Security Exam 1 Questio.docx
CS547 Wireless Networking and Security Exam 1  Questio.docxCS547 Wireless Networking and Security Exam 1  Questio.docx
CS547 Wireless Networking and Security Exam 1 Questio.docx
 
Communicating professionally and ethically is an essential ski.docx
Communicating professionally and ethically is an essential ski.docxCommunicating professionally and ethically is an essential ski.docx
Communicating professionally and ethically is an essential ski.docx
 
Case Study The HouseCallCompany.com Abstract The case.docx
Case Study The HouseCallCompany.com  Abstract The case.docxCase Study The HouseCallCompany.com  Abstract The case.docx
Case Study The HouseCallCompany.com Abstract The case.docx
 
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docxCHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
CHAPTER 5Risk Response and MitigationIn this chapter, you will.docx
 
BiopsychologySensation and PerceptionInstructionsTake a mom.docx
BiopsychologySensation and PerceptionInstructionsTake a mom.docxBiopsychologySensation and PerceptionInstructionsTake a mom.docx
BiopsychologySensation and PerceptionInstructionsTake a mom.docx
 
Chapter 2Historical Perspectives on Case ManagementChapter In.docx
Chapter 2Historical Perspectives on Case ManagementChapter In.docxChapter 2Historical Perspectives on Case ManagementChapter In.docx
Chapter 2Historical Perspectives on Case ManagementChapter In.docx
 
Compare and Contrast Systems Development Life Cycle (SDLC Mo.docx
Compare and Contrast Systems Development Life Cycle (SDLC Mo.docxCompare and Contrast Systems Development Life Cycle (SDLC Mo.docx
Compare and Contrast Systems Development Life Cycle (SDLC Mo.docx
 
C H A P T E R F O U R PROBLEMS OF COMMUNICATIONCri.docx
C H A P T E R  F O U R  PROBLEMS OF COMMUNICATIONCri.docxC H A P T E R  F O U R  PROBLEMS OF COMMUNICATIONCri.docx
C H A P T E R F O U R PROBLEMS OF COMMUNICATIONCri.docx
 
By Day 6 of Week Due 917Respond to at least two of your c.docx
By Day 6 of Week Due 917Respond to at least two of your c.docxBy Day 6 of Week Due 917Respond to at least two of your c.docx
By Day 6 of Week Due 917Respond to at least two of your c.docx
 
ASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name .docx
ASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name                .docxASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name                .docx
ASSIGNMENT 3 (CHAPTERS 8-9) QUESTIONS Name .docx
 
3 pages excluding the title and reference page.Describe how Ph.docx
3 pages excluding the title and reference page.Describe how Ph.docx3 pages excluding the title and reference page.Describe how Ph.docx
3 pages excluding the title and reference page.Describe how Ph.docx
 
91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx
91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx
91422, 1134 AM Printhttpscontent.uagc.eduprintMcNe.docx
 
All details are posted in the documentPlease use this topics for.docx
All details are posted in the documentPlease use this topics for.docxAll details are posted in the documentPlease use this topics for.docx
All details are posted in the documentPlease use this topics for.docx
 
1, Describe the mind as a stream of consciousness, and what it revea.docx
1, Describe the mind as a stream of consciousness, and what it revea.docx1, Describe the mind as a stream of consciousness, and what it revea.docx
1, Describe the mind as a stream of consciousness, and what it revea.docx
 
2Some of the ways that students are diverse in todays schools .docx
2Some of the ways that students are diverse in todays schools .docx2Some of the ways that students are diverse in todays schools .docx
2Some of the ways that students are diverse in todays schools .docx
 

Recently uploaded

Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 

Recently uploaded (20)

Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 

Project NameVersion 1.0 Error! Unknown do.docx

  • 1. <Project Name> Version: <1.0> Error! Unknown document property name. Summary Report Module <Insert Module #> Summary Report – Module 4 Version 1 Prepared By: Jude akassap Date: 8/28/22 <Project Name> Training Plan Version: <1.0> Error! Unknown document property name. Revision Date: Error! Unknown document property name. Page 2 of 10 NOT DONE - CDC_UP_Training_Plan_Template.docVERSION HISTORY Version # Implemented By Revision Date Approved By
  • 2. Approval Date Reason 1.0 Jude Akassap 8/28/22 Jay M. 8/31/22 Document Creation TABLE OF CONTENTS 1Introduction5 1.1Purpose5 2Executive Summary5 3Detailed Summary5 3.1LAN Security/Password Policy5
  • 3. 3.2Antivirus5 3.3Acceptable Use5 4Recommendations5 5SuggEstED aCTIONS5 Appendix A: Approval6 APPENDIX B: REFERENCES7 APPENDIX C: KEY TERMS8 Introduction Purpose This Summary Report provides a summary of end users security policies and recommendations for amelioration Executive Summary In this report, the end user security policy is examined, and areas where new policies or modifications would be beneficial are noted.Detailed Summary LAN Security/Password Policy While the LAN Security policy section does mention some policy parameters regarding password security, certain aspects are left entirely up to the IT Officers discretion. Password policy guidelines such as the complexity, length, and frequency of use should be detailed for increased security. Many organizations follow a password standard such as NIST Antivirus According to the 10.1 Detailed Policy Requirements section, BYOD devices must have antivirus software, however company- owned laptops and other devices are not obliged to have antivirus software. All company-owned devices should come
  • 4. with antivirus software installed, and only IT administrators should be allowed to turn it off. Any software installation should be subject to prior authorization and IT administrative rights. By enabling antivirus and carefully examining software before it is loaded, end device security will be much improved. Acceptable Use There is no definition of acceptable use of an organization resource. Implementing firewall rules to ban specific websites and website categories that are regarded inappropriate for the workplace is a good idea. Policies that outline acceptable and undesirable workplace browsing activity should be made available to employees. Recommendations This report finds there are several critical issues with the current security policyand recommends the above actions be implemented to increase the overallsecurity of the organization.SuggEstED aCTIONS Following these recommendations, new policies ought to be developed and included in the upcoming version of the end user information security policy. Appendix A: Approval The undersigned acknowledge they have reviewed the and agree with the approach it presents. Changes to this will be coordinated with and approved by the undersigned or their designated representatives. Signature: Date:
  • 5. Print Name: Jude Akassap Title: Role: Signature: Date: Print Name: Title: Role: Signature: Date: Print Name:
  • 6. Title: Role: APPENDIX B: REFERENCES [Insert the name, version number, description, and physical location of any documents referenced in this document. Add rows to the table as necessary. This is where you would want to reference your Risk Register and any other documents that you need to. For the purposes of this class, please include references to course material or outside sources that you are using in your work.] The following table summarizes the documents referenced in this document. Document Name and Version Description Location <Document Name and Version Number> [Provide description of the document] <URL or Network path where document is located> APPENDIX C: KEY TERMS [Insert terms and definitions used in this document. Add rows to the table as necessary. Keep in mind that you are typically
  • 7. writing a summary report for someone who is not familiar with information technology. Be sure to define any terms here that might need to be explained.] The following table provides definitions for terms relevant to this document. Term Definition [Insert Term] [Provide definition of the term used in this document.] [Insert Term] [Provide definition of the term used in this document.] [Insert Term] [Provide definition of the term used in this document.] 1 Revision Date: Error! Unknown document property name. Page 7 of 8 image1.png