Acceptable Use of Network Policy Report for Farmers 4 Farmers
VerifiedAdded on 2022/09/15
|9
|1581
|28
Report
AI Summary
This report provides a comprehensive analysis of an acceptable network use policy designed for Farmers 4 Farmers, focusing on information security. It begins with an executive summary highlighting the importance of network policies in securing web-based interfaces, especially with the increasing threat of cyberattacks. The introduction establishes the significance of information security, its three core targets (confidentiality, integrity, and availability), and its relationship to cybersecurity, network, and application security. The report then details key procedures within the information security policy, including remote access considerations, data breach prevention strategies (stopping, damage evaluation, notification, and security audits), password management, and the handling of portable media. The conclusion emphasizes the importance of adhering to the outlined security policies to protect against data breaches. References from various sources are included to support the guidelines and recommendations provided in the report.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: ACCEPTABLE USE OF NETWORK POLICY
ACCEPTABLE USE OF NETWORK POLICY
Name of the Student
Name of the University
Author Note
ACCEPTABLE USE OF NETWORK POLICY
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1ACCEPTABLE USE OF NETWORK POLICY
Table of Contents
Introduction................................................................................................................................4
Information security policy........................................................................................................4
Conclusion..................................................................................................................................7
References..................................................................................................................................9
Table of Contents
Introduction................................................................................................................................4
Information security policy........................................................................................................4
Conclusion..................................................................................................................................7
References..................................................................................................................................9

iACCEPATBLE USE OF NETOWRK POLICY
Executive summary
Networks policies play a vital role for a web based interface. Now-a-days, number of hackers
is increasing rapidly. That is why, for securing a web based interface, network policies are
very important. In this case, Farmers 4 Farmers has deployed a highly secured network for
their Brisbane office and the delivery trucks. For maintain the privacy of the client’s and sales
data, the network policy should be implemented by the company. In this report, the
acceptable network policy for the highly secured network of the company is discussed.
Executive summary
Networks policies play a vital role for a web based interface. Now-a-days, number of hackers
is increasing rapidly. That is why, for securing a web based interface, network policies are
very important. In this case, Farmers 4 Farmers has deployed a highly secured network for
their Brisbane office and the delivery trucks. For maintain the privacy of the client’s and sales
data, the network policy should be implemented by the company. In this report, the
acceptable network policy for the highly secured network of the company is discussed.

4ACCEPTABLE USE OF NETWORK POLICY
Introduction
Information security is nothing but a strategy of preventing some unauthorized access,
use, disruption and disclosure of information. It has three targets- confidentiality, integrity
and availability (Balas and Balas 2020). It is a specific part under the umbrella of cyber
security. Network and application security are the sister practices of information security.
They are mainly focusing on the network as well as application code respectively.
In this report, an acceptable network policy is described for the Farmer 4 Farmer, so
that they can make all data of their consumers and sales in a secured format.
Information security policy
Following are some procedures of the information security policy for Farmers 4
Farmers.
Remote access
In Farmers 4 Farmers, the staffs are encouraged to use check their emails and
officials accounts regarding the sales information after their official shift time. It may
create security related issues for the company (Wiley, McCormac and Calic 2020).
Usually, remote workers do not any privilege of the physical and organisational
network security provisions. Company authority must provide them some instructions
to cover data breaches. There are five steps by which the data breach can be prevented
by the company. These are as follows:
Stopping the data breach
If the company notices the breach, then it is very important to contain
data breach as soon as possible and it is totally dependent on the nature of the
Introduction
Information security is nothing but a strategy of preventing some unauthorized access,
use, disruption and disclosure of information. It has three targets- confidentiality, integrity
and availability (Balas and Balas 2020). It is a specific part under the umbrella of cyber
security. Network and application security are the sister practices of information security.
They are mainly focusing on the network as well as application code respectively.
In this report, an acceptable network policy is described for the Farmer 4 Farmer, so
that they can make all data of their consumers and sales in a secured format.
Information security policy
Following are some procedures of the information security policy for Farmers 4
Farmers.
Remote access
In Farmers 4 Farmers, the staffs are encouraged to use check their emails and
officials accounts regarding the sales information after their official shift time. It may
create security related issues for the company (Wiley, McCormac and Calic 2020).
Usually, remote workers do not any privilege of the physical and organisational
network security provisions. Company authority must provide them some instructions
to cover data breaches. There are five steps by which the data breach can be prevented
by the company. These are as follows:
Stopping the data breach
If the company notices the breach, then it is very important to contain
data breach as soon as possible and it is totally dependent on the nature of the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

5ACCEPTABLE USE OF NETWORK POLICY
attack that the Farmers 4 Farmers faces while the data breach occurs.
Company authority should isolate that system which already attacked by an
attacker. It is totally depend on the nature of the attack that the Farmers 4
Farmers face. Company authority should isolate that system which already
attacked by an attacker. It helps the company to spread the breach to their
highly secure network. At that time, they need to check which employee’s
account is hacked. Once identified, they should isolate that account on an
urgent basis (Tariq et al. 2020). Network of the company is highly
complicated. For that reason, more than one layers of the network will help the
company to isolate the attack in a faster rate. Once it is detected, then it is very
important to remove that threat for preventing any further damage of their
network.
Evaluation of the damage
Once the attack has been prevented then the next stage is to perform
the investigation as well as assessing the damage caused to the company.
Fordoing this, it is very important to identify how the attack is performed. It is
also very crucial to investigate the affected systems so that malware is can be
detected by the company (Roth et al. 2020). At the time of investigation,
following information must be collected by the authority of Farmers 4
Farmers.
What was the attack vector?
How much sensitive was the breached data?
What are types of affected data?
attack that the Farmers 4 Farmers faces while the data breach occurs.
Company authority should isolate that system which already attacked by an
attacker. It is totally depend on the nature of the attack that the Farmers 4
Farmers face. Company authority should isolate that system which already
attacked by an attacker. It helps the company to spread the breach to their
highly secure network. At that time, they need to check which employee’s
account is hacked. Once identified, they should isolate that account on an
urgent basis (Tariq et al. 2020). Network of the company is highly
complicated. For that reason, more than one layers of the network will help the
company to isolate the attack in a faster rate. Once it is detected, then it is very
important to remove that threat for preventing any further damage of their
network.
Evaluation of the damage
Once the attack has been prevented then the next stage is to perform
the investigation as well as assessing the damage caused to the company.
Fordoing this, it is very important to identify how the attack is performed. It is
also very crucial to investigate the affected systems so that malware is can be
detected by the company (Roth et al. 2020). At the time of investigation,
following information must be collected by the authority of Farmers 4
Farmers.
What was the attack vector?
How much sensitive was the breached data?
What are types of affected data?

6ACCEPTABLE USE OF NETWORK POLICY
Are those data containing any highly sensitive information (such as
client details, sales data and many others)?
Does the restore operation perform on the breached data?
Notify the affected staffs
At the time of investigation, Farmers 4 Farmers should discover the
details of all affected employees. After that investigation, the next stage is to
provide the notification to the authorities and any individual staffs who may be
affected by this attack (Ogbanufe 2020). It is the most efficient way.
Notification can be distributed with the help of some email, phone calls and
many others.
Security audit
They should perform a security audit which helps them assess the
current network security condition of the company (Logan 2020). It helps to
prepare the future recovery plan.
Creation of passwords
Every staffs of Farmers 4 Farmers have a password for accessing a secured
network. But, hacked passwords are most common reasons for the data breach of the
company (Kim and Choi 2020). It helps the company to spread the breach to their
highly secure network. At that time, they need to check which employee’s account is
hacked. Network of the company is highly complicated.
Are those data containing any highly sensitive information (such as
client details, sales data and many others)?
Does the restore operation perform on the breached data?
Notify the affected staffs
At the time of investigation, Farmers 4 Farmers should discover the
details of all affected employees. After that investigation, the next stage is to
provide the notification to the authorities and any individual staffs who may be
affected by this attack (Ogbanufe 2020). It is the most efficient way.
Notification can be distributed with the help of some email, phone calls and
many others.
Security audit
They should perform a security audit which helps them assess the
current network security condition of the company (Logan 2020). It helps to
prepare the future recovery plan.
Creation of passwords
Every staffs of Farmers 4 Farmers have a password for accessing a secured
network. But, hacked passwords are most common reasons for the data breach of the
company (Kim and Choi 2020). It helps the company to spread the breach to their
highly secure network. At that time, they need to check which employee’s account is
hacked. Network of the company is highly complicated.

7ACCEPTABLE USE OF NETWORK POLICY
Once it is detected, then it is very important to remove that threat for preventing any
further damage of their network. Methods of elimination of the attack vary depending
on the type of attack. It can be performed by blacklisting the Internet Protocol
address from the epicentre of the attack.
Management of passwords
Once the attack has been prevented then the next stage is to perform the
investigation as well as assessing the damage caused to the company. For doing this,
it is very important to identify how the attack is performed. It is also very crucial to
investigate the affected systems so that malware is can be detected by the company
(Roth et al. 2020). At the time of investigation, following information must be
collected by the authority of Farmers 4 Farmers.
Portable media
Black hat hackers have the capability to hack the systems of the company by
injecting malware on some removable gadgets and then plug in into the computer of
the company (da Veiga et al. 2020). Company can disallow all kinds of removable
gadgets inside the office premises. Company should suggest their staffs to use their
official email or any well-known cloud platforms for exchanging the information.
Once it is detected, then it is very important to remove that threat for preventing any
further damage of their network. Methods of elimination of the attack vary depending
on the type of attack. It can be performed by blacklisting the Internet Protocol
address from the epicentre of the attack.
Management of passwords
Once the attack has been prevented then the next stage is to perform the
investigation as well as assessing the damage caused to the company. For doing this,
it is very important to identify how the attack is performed. It is also very crucial to
investigate the affected systems so that malware is can be detected by the company
(Roth et al. 2020). At the time of investigation, following information must be
collected by the authority of Farmers 4 Farmers.
Portable media
Black hat hackers have the capability to hack the systems of the company by
injecting malware on some removable gadgets and then plug in into the computer of
the company (da Veiga et al. 2020). Company can disallow all kinds of removable
gadgets inside the office premises. Company should suggest their staffs to use their
official email or any well-known cloud platforms for exchanging the information.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8ACCEPTABLE USE OF NETWORK POLICY
Conclusion
Information security policy should not be taken lightly by the employees of Farmers 4
Farmers. With the continuation of the new highly secured network, the level of safety and
security need to ensure for continuing their business. The information in this report is
highlighted for the information security policy of the Farmers 4 Farmers and focus for
possible safety measures that the policy may highlight. Many threats are detected for their
networks. Suggestion for security access processes with regularly taking the back-up of the
data, maintaining the system integrity and many others. Staffs of the company must obey this
security policy so that they can protect data breach very efficiently.
Conclusion
Information security policy should not be taken lightly by the employees of Farmers 4
Farmers. With the continuation of the new highly secured network, the level of safety and
security need to ensure for continuing their business. The information in this report is
highlighted for the information security policy of the Farmers 4 Farmers and focus for
possible safety measures that the policy may highlight. Many threats are detected for their
networks. Suggestion for security access processes with regularly taking the back-up of the
data, maintaining the system integrity and many others. Staffs of the company must obey this
security policy so that they can protect data breach very efficiently.

9ACCEPTABLE USE OF NETWORK POLICY
References
da Veiga, A., Astakhova, L.V., Botha, A. and Herselman, M., 2020. Defining organisational
information security culture–Perspectives from academia and industry. Computers &
Security, p.101713.
Erforth, B., 2020. Contemporary French Security Policy in Africa. Springer International
Publishing.
Kim, S. and Choi, M., 2020. Educational requirement analysis for information security
professionals in Korea. Journal of Information Systems Education, 13(3), p.11.
Logan, P.Y., 2020. Crafting an undergraduate information security emphasis within
information technology. Journal of Information Systems Education, 13(3), p.3.
Ogbanufe, O., 2020, January. “Information Security Is Not Really My Job”: Exploring
Information Security Role Identity in End-Users. In Proceedings of the 53rd Hawaii
International Conference on System Sciences.
Roth, S., Barron, T., Calzavara, S., Nikiforakis, N. and Stock, B., 2020. Complex Security
Policy? A Longitudinal Analysis of Deployed Content Security Policies.
Tariq, M.I., Ahmed, S., Memon, N.A., Tayyaba, S., Ashraf, M.W., Nazir, M., Hussain, A.,
Balas, V.E. and Balas, M.M., 2020. Prioritization of Information Security Controls through
Fuzzy AHP for Cloud Computing Networks and Wireless Sensor Networks. Sensors, 20(5),
p.1310.
Wiley, A., McCormac, A. and Calic, D., 2020. More than the individual: Examining the
relationship between culture and Information Security Awareness. Computers & Security, 88,
p.10164
References
da Veiga, A., Astakhova, L.V., Botha, A. and Herselman, M., 2020. Defining organisational
information security culture–Perspectives from academia and industry. Computers &
Security, p.101713.
Erforth, B., 2020. Contemporary French Security Policy in Africa. Springer International
Publishing.
Kim, S. and Choi, M., 2020. Educational requirement analysis for information security
professionals in Korea. Journal of Information Systems Education, 13(3), p.11.
Logan, P.Y., 2020. Crafting an undergraduate information security emphasis within
information technology. Journal of Information Systems Education, 13(3), p.3.
Ogbanufe, O., 2020, January. “Information Security Is Not Really My Job”: Exploring
Information Security Role Identity in End-Users. In Proceedings of the 53rd Hawaii
International Conference on System Sciences.
Roth, S., Barron, T., Calzavara, S., Nikiforakis, N. and Stock, B., 2020. Complex Security
Policy? A Longitudinal Analysis of Deployed Content Security Policies.
Tariq, M.I., Ahmed, S., Memon, N.A., Tayyaba, S., Ashraf, M.W., Nazir, M., Hussain, A.,
Balas, V.E. and Balas, M.M., 2020. Prioritization of Information Security Controls through
Fuzzy AHP for Cloud Computing Networks and Wireless Sensor Networks. Sensors, 20(5),
p.1310.
Wiley, A., McCormac, A. and Calic, D., 2020. More than the individual: Examining the
relationship between culture and Information Security Awareness. Computers & Security, 88,
p.10164
1 out of 9

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.