Complete the following
Complete the following 5 things: 1. Ex. 10.1, p. 303 2. Ex. 10.2, p. 303 3. Ex. 10.3, p. 304 4. Project 10.1, p. 304 5. Case Study 10, p. 340 I will be looking for a lot of detail in these responses…as we get to the end of the semester, I am expecting your knowledge and understanding to have improved. I am looking for: • NO spelling/grammar issues • External sources cited. • Well, thought out answers. • Questions are answered completely and address all key points. • Individual work – FYI: everything gets run through SafeAssign. • NO AI is permitted during these assignments as per the syllabus. • Turned in on time. Exercise 10.1: User Policies Using the guidelines provided in this chapter (and other resources, as needed), create a document that defines user policies. The policies should clearly define acceptable and unacceptable use for all personnel. You may require some separate policies for administration, faculty, and students. Exercise 10.2: Using the guidelines provided in this chapter (and other resources, as needed), create a step-bystep IT security policy for implementing a new user account for a student. The policy should define what resources the student has access to, what she does not have access to, and for how long access is granted. Exercise 10.3: Leaving Student Policy Using the guidelines provided in this chapter (and other resources, as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on). You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not have access to. Project 10.1: Examining Policies Examine the following web resources that discuss security policies: EarthLink acceptable use policy: www.earthlink.net/about/policies/use/ SANS Institute policies: www.sans.org/resources/policies/ Key Elements of an Information Security Policy: Information Security Policy World Summarize the main theme of these policy recommendations. Pay particular attention to any area where these recommendations differ from or exceed the recommendations of this chapter. Choose which policy recommendation you believe is the most secure and state the reasons for your choice. Case Study 10 Juan Garcia is the network administrator for a small company that also maintains its own web server. He has taken the following precautions: All computers are patched, have antivirus software, and have unneeded services shut down. The network has a firewall with proxy server and IDS. The organization has a policy requiring passwords of ten characters in length, and they must be changed every 90 days. Consider the following questions: Has Juan done enough to secure the network? What other actions would you recommend he take?
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.