Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

Write a research paper in APA format developing computer/internet security policy. Read the description for more info.

Write a research paper in APA format developing computer/internet security policy. Read the description for more info..

I’m working on a Computer Science question and need guidance to help me study.

You have been hired as the CSO (Chief Security Officer) for an organization.

Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.


What to turn in: Computer Use & Internet Security Policy that you create!

This should not be a copy of a policy that you’ve read.

Include at least 3 scholarly references in addition to the course textbook. The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook [Refer chapter 10 of the attached textbook]

Write a research paper in APA format developing computer/internet security policy. Read the description for more info.