Warning: Trying to access array offset on value of type bool in /home/topgsnkq/timelyhomework.com/wp-content/themes/enfold/framework/php/function-set-avia-frontend.php on line 570
Security Management
- Create an 8–10-page PowerPoint presentation for new systems administrators in which you introduce security topics critical to their roles.In your PowerPoint, include the following:
- Identify unique ethical, legal, and policy issues associated with the administration of systems and networks.
- Explain how to administer basic user and group security from within an operating system.
- Explain how to implement virus protection.
- Describe how to configure a network-based firewall and to configure proxy settings.
- Apply the assessment’s assigned lab concepts and activities.
Criteria | Non-performance | Basic | Proficient | Distinguished |
---|---|---|---|---|
Identify unique ethical, legal, and policy issues associated with the administration of systems and networks. |
Does not identify unique ethical, legal, and policy issues associated with the administration of systems and networks. | Lists potential ethical, legal, or policy issues associated with the administration of systems and networks but does not include all three topics. | Identifies unique ethical, legal, and policy issues associated with the administration of systems and networks. | Describes unique ethical, legal, and policy issues associated with the administration of systems and networks. |
Explain how to administer basic user and group security. |
Does not explain how to administer basic user and group security from within an operating system. | Identifies how to administer basic user and group security from within an operating system. | Explains how to administer basic user and group security from within an operating system. | Explains how to administer basic user and group security from within a specified operating system. |
Explain how to implement virus protection. |
Does not explain how to implement virus protection. | Explains how to implement virus protection, but the explanation is incorrect. | Explains how to implement virus protection. | Explains how to implement virus protection; explanation details a specific process. |
Describe how to configure a network-based firewall. |
Does not describe how to configure a network-based firewall and to configure proxy settings. | Lists steps included in configuring a network-based firewall. | Describes how to configure a network-based firewall. | Describes how to configure a network-based firewall and how to configure proxy settings. |
Apply the assessment’s assigned lab concepts and activities. |
Does not apply the assessment’s assigned lab concepts and activities. | Discusses the assessment’s assigned lab concepts and activities but does not apply them to the activity. | Applies the assessment’s assigned lab concepts and activities. | Applies the assessment’s assigned lab concepts and activities; application shows strong understanding of the concepts. |
Communicate in a manner that is scholarly, professional, and consistent with expectations for members of professional communities. |
Does not communicate in a manner that is scholarly, professional, and consistent with expectations for members of professional communities. | Communicates in an inconsistent scholarly and professional manner for members of professional communities. | Communicates in a manner that is scholarly, professional, and consistent with expectations for members of professional communities. | Communicates in a manner that is scholarly, professional, and consistent with expectations for members of professional communities; written communication is free of errors that detract from the overall message. |