unit 4 assignment 1 1
Security Management
Implementing basic security management is an important task for system administrators, as security is important to today’s organizations. IT specialists are on the front lines of protecting a company’s systems. A system is only as strong as its weakest link; fortunately, IT administrators can perform simple tasks to ensure the safety of a company’s computer system.
For this assignment, create a presentation in which you explore the security tasks that systems administrators should be knowledgeable about.
Instructions
Create an 8–10 page PowerPoint presentation in which you discuss the following:
- Identify unique ethical, legal, and policy issues associated with the administration of systems and networks.
- Explain how to administer basic user and group security from within an operating system.
- Explain how to implement virus protection.
- Describe how to configure a network-based firewall and configure proxy settings.
Refer to the Security Management Scoring Guide to ensure that you meet the grading criteria for this assignment.
There also has to be a reference page at the end with a minimum of 3 references and the cover page slide
Security Management Scoring Guide
Due Date: End of Unit 4.
Percentage of Course Grade: 15%.
Security Management Scoring Guide Grading Rubric |
||||
Criteria |
Non-performance |
Basic |
Proficient |
Distinguished |
Identify unique ethical, legal, and policy issues associated with the administration of systems and networks. |
Does not identify unique ethical, legal, and policy issues associated with the administration of systems and networks. |
Lists potential ethical, legal, or policy issues associated with the administration of systems and networks, but does not include all three topics. |
Identifies unique ethical, legal, and policy issues associated with the administration of systems and networks. |
Describes unique ethical, legal, and policy issues associated with the administration of systems and networks. |
Explain how to administer basic user and group security. |
Does not explain how to administer basic user and group security from within an operating system. |
Identifies how to administer basic user and group security from within an operating system. |
Explains how to administer basic user and group security from within an operating system. |
Analyzes how to administer basic user and group security from within a specified operating system. |
Explain how to implement virus protection. |
Does not explain how to implement virus protection. |
Explains how to implement virus protection, but the explanation is incorrect. |
Explains how to implement virus protection. |
Explains how to implement virus protection, and details a specific process. |
Describe how to configure a network-based firewall. |
Does not describe how to configure a network-based firewall. |
Lists steps included in configuring a network-based firewall. |
Describes how to configure a network-based firewall. |
Describes how to configure a network-based firewall, and how to configure proxy settings. |
Communicate in a manner that is scholarly, professional, and consistent with expectations for members of professional communities. |
Does not communicate in a manner that is scholarly, professional, and consistent with expectations for members of professional communities. |
Communicates in a manner that is somewhat scholarly, professional, and consistent with expectations for members of professional communities. |
Communicates in a manner that is scholarly, professional, and consistent with expectations for members of professional communities. |
Communicates in a manner that is scholarly, professional, and consistent with expectations for members of professional communities; written communication is free of errors that detract from the overall message. |