New England College Week 11 Database Security Certifications Discussion Using the guidelines provided in this week’s chapter (and other resources as needed

New England College Week 11 Database Security Certifications Discussion Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

Don't use plagiarized sources. Get Your Custom Essay on
New England College Week 11 Database Security Certifications Discussion Using the guidelines provided in this week’s chapter (and other resources as needed
Just from $13/Page
Order Essay

Reference :

https://us-lti.bbcollab.com/collab/ui/session/playback

Note : Please look at attached document (PPT) Chapter 10 Objectives





Recognize the importance of security policies
Understand the various policies and the
rationale for them
Know what elements go into good policies
Create policies for network administration
Evaluate and improve existing policies
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
1
Introduction

Technology by itself cannot solve all network
security problems.
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
2
Introduction (cont.)




Virus software won’t prevent a user from manually
opening an attachment and releasing a virus.
A technologically secured network is still vulnerable if
former employees (perhaps some unhappy with the
company) still have working passwords. Or if passwords
are simply put on Post-it notes on computer monitors.
A server is not secure if it is in a room that nearly
everyone in the company has access to.
Your network is not secure if end users are vulnerable to
social engineering.
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
3
What Is a Policy?

A security policy is a document that defines how an
organization deals with some aspect of security. There
can be policies regarding end-user behavior, IT
response to incidents, or policies for specific issues and
incidents.
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
4
Defining User Policies






Passwords
Internet use
E-mail attachments
Installing/uninstalling software
Instant messaging
Desktop configuration
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
5
System Admin Policies




New Employees
Departing Employees
Change Control
Access Control
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
6
Other Issues


Bring Your Own Device
A major concern in the modern network


New Employees
Departing Employees
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
7
Change Management



RFC
CAB
Follow-up
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
8
Software Development Policies


Security standards
Testing
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
9
Incident Response Policies


Handling viruses
Dealing with breaches
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
10
Data Classification


Public
Secure
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
11
BCP and DRP



DRP
BCP
BIA
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
12
Fault Tolerance

Backups




Full: All changes
Differential: All changes since last full backup
Incremental: All changes since last backup of any type
RAID
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
13
Relevant Laws & Regulations



HIPAA
Sarbanes-Oxley
PCI
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
14
Summary


In this chapter, you learned the technology is not enough to ensure
a secure network. You must have clear and specific policies
detailing procedures on your network. Those policies must cover
employee computer resource use, new employees, outgoing
employees, access rights, how to respond to an emergency, and
even how secure code in applications and websites is.
User policies must cover all aspects of how the user is expected to
use company technology. In some cases, such as instant
messaging and web use, policies may be difficult to enforce, but that
does not change that they must still be in place. If your user policies
fail to cover a particular area of technology use, then you will have
difficulty taking any action against any employee who performs that
particular misuse.
© 2016 Pearson, Inc.
Chapter 10 Computer Security Policies
15

Purchase answer to see full
attachment

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.