Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely

Question Description

Usingthe guidelines provided in this week’s chapter (and other resources asneeded), create a step-by-step IT security policy for handling useraccounts/rights for a student who is leaving prematurely (drops, isexpelled, and so on).

Youwill need to consider specialized student scenarios, such as a studentwho works as an assistant to a faculty member or as a lab assistant in acomputer lab and may have access to resources most students do not.

Write your answer using a WORD document.

Required Videos

VIDEO. System Admin Tools

Click HERE to watch or click embedded video below.

Required Readings

Read Chapter 10 of the Easttom text, Security Policies

text book : Easttom, Chuck. Computer Security Fundamentals, (Third Edition). Indianapolis: Pearson, 2016. ISBN-13: 978-0-7897-5746-3

Primary topics:

  • Recognizing the importance of security policies
  • Understanding the various policies and the rationale for them.
  • Knowing what elements go into good policies
  • Creating policies for network administration.

— PPT Attcahed .

Get your college paper done by experts

Do my question How much will it cost?

Place an order in 3 easy steps. Takes less than 5 mins.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *