A college student logs onto a college computer for the first time. Which security policy category should be presented to the student?
- acceptable use policies
- identification and authentication policies
- incident handling policies
- network maintenance policies
The acceptable use policies section of a security policy commonly identifies network resources and usages that are acceptable to the organization. They might also state the ramifications that can occur if this security policy is violated.