attached “ aenergy data security policy ,” “ aenergy employer security policy ,” W r i t i n g

attached “ aenergy data security policy ,” “ aenergy employer security policy ,” W r i t i n g

Evaluate the effectiveness of AEnergy Company’s security policies (see the attached “AEnergy Data Security Policy,” “AEnergy Employer Security Policy,” and “AEnergyy Accounting Security Policy”) regarding ethical issues. Requirement: look over the 3 security policies and talk about how good/bad they are regarding ethical issues.

1. Discuss two potential unethical uses of the company technology and/or data by internal users. Requirement: point out 2 potential unethical uses by internal users.

2. Discuss two potential unethical uses of the company technology and/or data by external parties. Requirement: point out 2 potential unethical uses by external parties.

B. Evaluate the effectiveness of AEnergy Company’s security policies (see the attached “AEnergy Data Security Policy,” “AEnergy Employer Security Policy,” and “AEnergy Accounting Security Policy”) regarding security threats. Requirement: look over the 3 security policies and talk about how good/bad they are regarding security threats.

1. Discuss two potential security threats to the company technology and/or data from internal users. Requirement: point out 2 potential security threats from internal users.

2. Discuss two potential security threats to the company technology and/or data from external parties. Requirement: point out 2 potential security threats from external parties.

C. Create updated company policies that outline expectations related to use of company technologies by internal users and issues with external parties. Requirement: outline new policies for the expectations toward the use of company technology by internal users and issues with external parties.

1. Explain how your changes would mitigate the unethical uses discussed in parts A1 and A2. Requirement: Address how the new policies mitigate the issues from A1 and A2.

2. Explain how your changes would mitigate the security threats discussed in parts B1 and B2. Requirement: Address how the new policies mitigate the issues from B1 and B2.

This task cannot be completed without the use of the information in the provided attached documents. This task needs to clearly address each requirement.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount