Home » Downloads » Create a step-by-step IT security policy for handling user accounts/rights for a student

Create a step-by-step IT security policy for handling user accounts/rights for a student

Create a step-by-step IT security policy for handling user accounts/rights for a student

Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Write your answer using a WORD document.

REQUIRED VIDEOS

VIDEO. System Admin Tools

Click HERE to watch or click embedded video below.

REQUIRED READINGS

Read Chapter 10 of the Easttom text, Security Policies

text book : Easttom, Chuck. Computer Security Fundamentals, (Third Edition). Indianapolis: Pearson, 2016. ISBN-13: 978-0-7897-5746-3

Primary topics:

Recognizing the importance of security policies

Understanding the various policies and the rationale for them.

Knowing what elements go into good policies

Creating policies for network administration.

easttom_ppt_10_final

Answer preview to create a step-by-step IT security policy for handling user accounts/rights for a student

Create a step-by-step IT security policy for handling user accounts/rights for a student
APA

415 words

Get instant access to the full solution from yourhomeworksolutions by clicking the purchase button below