Security Management

  • Create an 8–10-page PowerPoint presentation for new systems administrators in which you introduce security topics critical to their roles.In your PowerPoint, include the following:
    • Identify unique ethical, legal, and policy issues associated with the administration of systems and networks.
    • Explain how to administer basic user and group security from within an operating system.
    • Explain how to implement virus protection.
    • Describe how to configure a network-based firewall and to configure proxy settings.
    • Apply the assessment’s assigned lab concepts and activities.
Security Management Scoring Guide Grading Rubric
Criteria Non-performance Basic Proficient Distinguished
Identify unique ethical, legal, and policy issues associated with the administration of systems and networks.
Does not identify unique ethical, legal, and policy issues associated with the administration of systems and networks. Lists potential ethical, legal, or policy issues associated with the administration of systems and networks but does not include all three topics. Identifies unique ethical, legal, and policy issues associated with the administration of systems and networks. Describes unique ethical, legal, and policy issues associated with the administration of systems and networks.
Explain how to administer basic user and group security.
Does not explain how to administer basic user and group security from within an operating system. Identifies how to administer basic user and group security from within an operating system. Explains how to administer basic user and group security from within an operating system. Explains how to administer basic user and group security from within a specified operating system.
Explain how to implement virus protection.
Does not explain how to implement virus protection. Explains how to implement virus protection, but the explanation is incorrect. Explains how to implement virus protection. Explains how to implement virus protection; explanation details a specific process.
Describe how to configure a network-based firewall.
Does not describe how to configure a network-based firewall and to configure proxy settings. Lists steps included in configuring a network-based firewall. Describes how to configure a network-based firewall. Describes how to configure a network-based firewall and how to configure proxy settings.
Apply the assessment’s assigned lab concepts and activities.
Does not apply the assessment’s assigned lab concepts and activities. Discusses the assessment’s assigned lab concepts and activities but does not apply them to the activity. Applies the assessment’s assigned lab concepts and activities. Applies the assessment’s assigned lab concepts and activities; application shows strong understanding of the concepts.
Communicate in a manner that is scholarly, professional, and consistent with expectations for members of professional communities.
Does not communicate in a manner that is scholarly, professional, and consistent with expectations for members of professional communities. Communicates in an inconsistent scholarly and professional manner for members of professional communities. Communicates in a manner that is scholarly, professional, and consistent with expectations for members of professional communities. Communicates in a manner that is scholarly, professional, and consistent with expectations for members of professional communities; written communication is free of errors that detract from the overall message.