Internet Acceptable Usage Policy AFIT.pptx

AwajiIyahamAtteng 13 views 12 slides Jul 05, 2024
Slide 1
Slide 1 of 12
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12

About This Presentation

This is a sample slideshow that explains the Air Force Institute of Technology's (AFIT) Acceptable Use Policy (AUP) for internet access in its Cyber Security Department. It covers what users can and cannot do online, from educational purposes to what is prohibited


Slide Content

v Acceptable Internet Usage Policy Airforce Institute of Technology Cyber Security Department

1 POLICY INTRO 2 POLICY VALUE 3 AUTHORITY AND APPROVAL 4 POLICY OBJECTIVES, SCOPE AND USAGE 5 USER AND ADMIN DUTIES 6 ADHERENCE,EXECUTION AND SUPPORT STRUCTURE TABLE OF CONTENT GROUP 1 (AFIT CYS DEPT) CYBER SECURITY DEPARTMENT CYB 408: INFORMATION SECURITY RISK ANALYSIS AND MANAGEMENT

Introduction 1 This Internet Usage Policy Handbook outlines the guidelines and expectations for internet usage within the Department of Cybersecurity at Air Force Institute of Technology. It is designed to ensure that all students, staff, and faculty members use the internet responsibly, ethically, and legally. Its goal is to ensure responsible, ethical, and legal use of internet resources by students, staff, and faculty. This policy applies to all internet usage within the department , whether accessed on campus or remotely, and includes both school-provided and personal devices. This policy applies to all members of the Department of Cybersecurity at Air Force Institute of Technology, including but not limited to: Students, Staff, Faculty members, Contractors and Vendors and Visitors

Importance of The Policy 2 The internet is an invaluable tool for education and research, providing access to a vast array of information and resources. However, it also poses potential risks, such as security threats, privacy breaches, and the potential for misuse. An effective Internet Usage Policy is crucial in the cyber security department for the following reasons: For protecting users and their data by establishing clear guidelines, maintain network integrity It helps ensure academic integrity by preventing the usage of the department resources for plagiarism and misuse of intellectual property It promotes productivity and minimizes by ensuring that the internet is used as defined under its acceptable/unacceptable uses section It ensures that the Cyber Security Department adhere to laws like NDPR and GDPR, keeping it network in line with proposed laws, standards and frameworks It helps foster an ethical environment that prevents security incidents as well promotes ethical behavior and respect for others opinion/right

` Authority and Approval 3 This Internet usage policy is established under authority by the Head of Cybersecurity Department, with endorsement by the school administration, and input from the following stakeholders ( i ) students (ii) faculty members and staff (iii) legal Its Drafting, Review, Consultation, Approval and Amendment is to be governed by an appointed IT Governance Committee based on approval by the Head of Department (HOD) and School administration. Any amendments made or initiated by the IT Governance committee based on feedback, review or resolution are to be approved by School Administration through the Head of Department (HOD)

` Objectives of the Policy 4 The Internet Usage Policy of the Department of Cybersecurity at Air Force Institute of Technology is designed to establish clear guidelines and expectations for the responsible use of the internet by students, staff, and faculty members. The primary objectives of this policy are: Ensure Departmental Network Security Promote Responsible Use Protect Users Privacy Support Academic Integrity Comply with Legal and Regulatory Requirements Enhance Productivity Facilitate Incident Management

` Scope of the Policy 5 Entities Environments Assets Students Staffs Faculty Members Contractors and Vendors On- Campus areas such as laboratories, offices, classrooms and any facility belonging to the Department of Cyber Security Off-Campus involves remote access to the Department’s network using a VPN on your phone or laptop Physical Assets used in the provisioning, propagation and support of the internet throughout the department. Information Assets created towards the usage and maintenance of the internet within the department. Human Resources Assets engaged in the provisioning, management and maintenance of the department internet facilities This internet usage policy applies to the various entities, environments and assets as stated in the handbook, including but not limited to students, staff, visitors, on-campus, off-campus, external connections with the use of VPN

Acceptable Use of The Internet 6 This internet usage policy outlines the acceptable uses of internet and network resources of the Department of Cybersecurity. It defines activities allowed, encouraged and supported to ensure that the internet is used in a productive, ethical, and lawful manner. Usage for academic based purposes such accessing coursework, scholarly materials , collaborate classroom activities, and submit academic projects or assignments. Usage for research-based purposes such as data collection, academic article retrieval, project collaboration, and publication For professional and personal development purposes towards your career path, this covers the use of the internet resources for online courses, certifications, networking and webinars.

Unacceptable Use of The Internet 7 This internet usage policy outlines the unacceptable uses of internet and network resources of the Department of Cybersecurity. It defines activities prohibited and discouraged to ensure the security, integrity and productivity of the department’s digital environment. Usage for non-academic based purposes during class hours such as browsing non-educational sites, playing online games, accessing social medial platforms or shopping online is prohibited. Consumption of high bandwidth for non-educational purposes such as download large media content, games and pirated content, which results in disruption of the learning environment and negative impact of the network performance. Excessive consumption of non-educational content which interferes with academic activities or work responsibilities Unauthorized exploitation and access, impersonation and malicious usage of the department's internet resource

Roles and Responsibilities 8 This internet usage policy defines the responsibilities of individuals responsible for the usage and management of the Cyber Security Department Internet and Network Facilities. User Responsibilities Management Responsibilities Ethical and Legal Use: Users must be honest and avoid copyright infringement, plagiarism, or unauthorized activities that could harm the department or university. Respecting Others: Users must respect the privacy and rights of others when communicating online and avoid using the internet for personal gain or political purposes. Security: Users are responsible for keeping their login credentials secure and using strong passwords. They should also back up their data and take measures to protect the department's network when accessing it remotely. Training and Awareness: Management is responsible for educating users about the policy and best practices. This includes training sessions, awareness campaigns, user guides, and regular assessments to ensure user understanding. Policy Maintenance: Management plays a crucial role in keeping the policy relevant and effective. This involves periodic reviews to adapt to evolving threats, legal changes, and technology, along with incorporating stakeholder input and communicating updates to users. They are also responsible for monitoring compliance and addressing any violations.

Compliance and Enforcement 9 In order to ensure adherence to this internet usage policy, various actions, rules and controls will be implemented as defined in the policy with penalties attached if defaulted. Compliance Enforcement Penalties To ensure compliance, there will be a continuous monitoring and logging of network traffic and activities Provision of multiple incident reporting channels for students and employees to report any security incidents they may encounter. Implementation of Access Control on the network for user authentication, authorization based on role, and device registration to ensure only authorized users access specific resources. Usage of encryption mechanisms and standards to protect both network communication and data transmission. Provision of limited and monitored network access through VPN for guests. Penalties for violations can include limited suspension or terminated access to IT resources. Disconnection of devices from the network. Escalation of violation to police authorities for potential criminal or civil prosecution.

By Watching This Slideshow 10 You’ve Been Familiarized with the Terms of Acceptable Internet Usage Policy of The Cyber Security Department, Airforce Institute of Technology Thanks!