Security Management

QUALITYWRITERS.ORG is the ideal place for homework help. If you are looking for affordable, custom-written, high-quality and non-plagiarized papers, your student life just became easier with us. Click the button below to place your order.


Order a Similar Paper Order a Different Paper

  • Create an 8–10-page PowerPoint presentation for new systems administrators in which you introduce security topics critical to their roles.In your PowerPoint, include the following:
    • Identify unique ethical, legal, and policy issues associated with the administration of systems and networks.
    • Explain how to administer basic user and group security from within an operating system.
    • Explain how to implement virus protection.
    • Describe how to configure a network-based firewall and to configure proxy settings.
    • Apply the assessment’s assigned lab concepts and activities.
Security Management Scoring Guide Grading Rubric
Criteria Non-performance Basic Proficient Distinguished
Identify unique ethical, legal, and policy issues associated with the administration of systems and networks.
Does not identify unique ethical, legal, and policy issues associated with the administration of systems and networks. Lists potential ethical, legal, or policy issues associated with the administration of systems and networks but does not include all three topics. Identifies unique ethical, legal, and policy issues associated with the administration of systems and networks. Describes unique ethical, legal, and policy issues associated with the administration of systems and networks.
Explain how to administer basic user and group security.
Does not explain how to administer basic user and group security from within an operating system. Identifies how to administer basic user and group security from within an operating system. Explains how to administer basic user and group security from within an operating system. Explains how to administer basic user and group security from within a specified operating system.
Explain how to implement virus protection.
Does not explain how to implement virus protection. Explains how to implement virus protection, but the explanation is incorrect. Explains how to implement virus protection. Explains how to implement virus protection; explanation details a specific process.
Describe how to configure a network-based firewall.
Does not describe how to configure a network-based firewall and to configure proxy settings. Lists steps included in configuring a network-based firewall. Describes how to configure a network-based firewall. Describes how to configure a network-based firewall and how to configure proxy settings.
Apply the assessment’s assigned lab concepts and activities.
Does not apply the assessment’s assigned lab concepts and activities. Discusses the assessment’s assigned lab concepts and activities but does not apply them to the activity. Applies the assessment’s assigned lab concepts and activities. Applies the assessment’s assigned lab concepts and activities; application shows strong understanding of the concepts.
Communicate in a manner that is scholarly, professional, and consistent with expectations for members of professional communities.
Does not communicate in a manner that is scholarly, professional, and consistent with expectations for members of professional communities. Communicates in an inconsistent scholarly and professional manner for members of professional communities. Communicates in a manner that is scholarly, professional, and consistent with expectations for members of professional communities. Communicates in a manner that is scholarly, professional, and consistent with expectations for members of professional communities; written communication is free of errors that detract from the overall message.
Writerbay.net

Got stuck with a writing task? We can help! Use our paper writing service to score better grades and meet your deadlines.

Get 15% discount for your first order


Order a Similar Paper Order a Different Paper
Writerbay.net