Create a step-by-step IT security policy for handling user accounts/rights for a student
Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).
You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.
Write your answer using a WORD document.
REQUIRED VIDEOS
VIDEO. System Admin Tools
Click HERE to watch or click embedded video below.
REQUIRED READINGS
Read Chapter 10 of the Easttom text, Security Policies
text book : Easttom, Chuck. Computer Security Fundamentals, (Third Edition). Indianapolis: Pearson, 2016. ISBN-13: 978-0-7897-5746-3
Primary topics:
Recognizing the importance of security policies
Understanding the various policies and the rationale for them.
Knowing what elements go into good policies
Creating policies for network administration.
Answer preview to create a step-by-step IT security policy for handling user accounts/rights for a student
APA
415 words