Exercises
EXERCISE 2.1: Creating Standards, Guidelines, and Procedures
The University System has a policy that states, “All students must comply with their campus attendance standard.”
You are tasked with developing a standard that documents the mandatory requirements (for example, how many classes can be missed without penalty). Include at least four requirements.
Create a guideline to help students adhere to the standard you created.
Create a procedure for requesting exemptions to the policy.
EXERCISE 2.2: Writing Policy Statements
Who would be the target audience for a policy related to campus elections?
Keeping in mind the target audience, compose a policy statement related to campus elections.
Compose an enforcement clause.
EXERCISE 2.3: Writing a Policy Introduction
Write an introduction to the policy you created in Exercise 2.2.
Generally an introduction is signed by an authority. Who would be the appropriate party to sign the introduction?
Write an exception clause.
EXERCISE 2.4: Writing Policy Definitions
The purpose of policy definitions is to clarify ambiguous terms. If you were writing a policy for an on-campus student audience, what criteria would you use to determine which terms should have definitions?
What are some examples of terms you would define?
EXERCISE 2.5: Understanding Baselines
The goal of this exercise is to understand what baselines are, why they are important, and the different types of baselines.
Read articles or watch tutorials on the importance of baselines in IT security.
Reflect on how baselines can contribute to uniformity and security in various IT environments.
Explore different tools and methodologies for baseline management across platforms such as Windows, Linux, and network devices.
Create a detailed security baseline for a chosen IT environment. Choose an IT environment that you are familiar with or interested in, such as Windows desktops, Linux servers, or network routers.
Document the standard configurations for the system.
Define appropriate security policies including password policies and security protocols. List approved software and version numbers. Outline procedures for regular updates and patches.
Compare your baseline with existing standards or best practices found in your research to evaluate its completeness and robustness.