New England College Week 11 Database Security Certifications Discussion Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).
You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.
Reference :
https://us-lti.bbcollab.com/collab/ui/session/playback
Note : Please look at attached document (PPT) Chapter 10 Objectives
◼
◼
◼
◼
◼
Recognize the importance of security policies
Understand the various policies and the
rationale for them
Know what elements go into good policies
Create policies for network administration
Evaluate and improve existing policies
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
1
Introduction
◼
Technology by itself cannot solve all network
security problems.
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
2
Introduction (cont.)
◼
◼
◼
◼
Virus software won’t prevent a user from manually
opening an attachment and releasing a virus.
A technologically secured network is still vulnerable if
former employees (perhaps some unhappy with the
company) still have working passwords. Or if passwords
are simply put on Post-it notes on computer monitors.
A server is not secure if it is in a room that nearly
everyone in the company has access to.
Your network is not secure if end users are vulnerable to
social engineering.
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
3
What Is a Policy?
◼
A security policy is a document that defines how an
organization deals with some aspect of security. There
can be policies regarding end-user behavior, IT
response to incidents, or policies for specific issues and
incidents.
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
4
Defining User Policies
◼
◼
◼
◼
◼
◼
Passwords
Internet use
E-mail attachments
Installing/uninstalling software
Instant messaging
Desktop configuration
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
5
System Admin Policies
◼
◼
◼
◼
New Employees
Departing Employees
Change Control
Access Control
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
6
Other Issues
◼
◼
Bring Your Own Device
A major concern in the modern network
❑
◼
New Employees
Departing Employees
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
7
Change Management
◼
◼
◼
RFC
CAB
Follow-up
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
8
Software Development Policies
◼
◼
Security standards
Testing
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
9
Incident Response Policies
◼
◼
Handling viruses
Dealing with breaches
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
10
Data Classification
◼
◼
Public
Secure
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
11
BCP and DRP
◼
◼
◼
DRP
BCP
BIA
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
12
Fault Tolerance
◼
Backups
❑
❑
❑
◼
Full: All changes
Differential: All changes since last full backup
Incremental: All changes since last backup of any type
RAID
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
13
Relevant Laws & Regulations
◼
◼
◼
HIPAA
Sarbanes-Oxley
PCI
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
14
Summary
◼
◼
In this chapter, you learned the technology is not enough to ensure
a secure network. You must have clear and specific policies
detailing procedures on your network. Those policies must cover
employee computer resource use, new employees, outgoing
employees, access rights, how to respond to an emergency, and
even how secure code in applications and websites is.
User policies must cover all aspects of how the user is expected to
use company technology. In some cases, such as instant
messaging and web use, policies may be difficult to enforce, but that
does not change that they must still be in place. If your user policies
fail to cover a particular area of technology use, then you will have
difficulty taking any action against any employee who performs that
particular misuse.
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
15
Purchase answer to see full
attachment
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.