------------------------------------------------- Week 1 Laboratory Part 1: Craft an Organization-Wide Security Management Policy for Acceptable Use Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Define the scope of an acceptable use policy as it relates to the User Domain * Identify the key elements of acceptable use within an organization as part of an overall security management framework * Align an acceptable
Words: 639 - Pages: 3
Assessment Worksheet Obtaining Personally Identifiable Information through Internet Research Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored a variety of search engines and social networking Web
Words: 435 - Pages: 2
------------------------------------------------- Week 1 Laboratory How to Identify Threats & Vulnerabilities in an IT Infrastructure Learning Objectives and Outcomes Upon completing this lab, students will be able to: * Identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure. * Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure * Given a scenario, prioritize
Words: 546 - Pages: 3
OpenLGU - Software Requirements Specification for ASSESSMENT REPORT Version 1.4 Prepared by Group Name: 204 Maria Kristina Dina Hazel Gatmaitan 2008-34358 2009-61185 mkristinadina@gmail.com hazelgatmaitan4science@gmail.com Lab Section: Lab Instructor: Date: AB-5L Andrel Del Rosario January 11, 2012, Wednesday Software Requirements Specification for Assessment Page ii Contents IN THIS TEMPLATE YOU WILL FIND TEXT BOUNDED BY THE “” SYMBOLS. THIS TEXT APPEARS IN ITALICS AND IS INTENDED
Words: 2799 - Pages: 12
Lab #4 – Assessment Worksheet Configure Group Policy Objects and Microsoft Baseline Security Analyzer (MBSA) Course Name & Number: NT2580 Student Name: Bryan Villa Instructor Name: Mr. Kravitz Lab Due Date: May 17, 2013 Lab #3 Assessment Questions & Answers 1. Define why change control management is relevant to security operations in an organization? Allows for testing and documentation of changes before they sent to management for review and implementation. 2. What type of access
Words: 326 - Pages: 2
Simulation Design Template- Sherman “Red” Yoder-Simulation #3 Date: File Name: Sherman “Red” Yoder Discipline: Nursing Student Level: Expected Simulation Run Time: 20 minutes Guided Reflection Time: 20 minutes Location: Simulation lab Location for Reflection: classroom Admission Date:Today’s Date: Brief Description of ClientName: Sherman “Red” YoderGender: Male Age: 80 Race: CaucasianWeight: 109 kg 240 poundsHeight: 183cm 72 inchesReligion:
Words: 1834 - Pages: 8
Classify Data for Access Control Requirements Lab Assessment Questions & Answers 1. What is the Data Classification Method used in the Military and Government Agencies that line up with the corporate data classification method defined earlier in this lab? Explain. Secret- This is the second-highest classification. Information is classified Secret when its release would cause "serious damage" to national security. Most information that is classified is held at the secret sensitivity
Words: 1377 - Pages: 6
perfect for you. To do this job you will need to have an enquiring mind which will help you solve problems in a lab. You have to have a good awareness of heath and safety because you will be working in a lab. If you want to become a laboratory technician you have to have 4 GCSEs including maths, English and science. Some employers ma y want you to have an A level grade or a degree. As a lab technician, you will be in, measuring levels of pollution, diagnosing diseases, and developing new products
Words: 589 - Pages: 3
Assessment Worksheet Installing a Core Linux Operating System on a Server IS3440 - Linux Security Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview The foundation of host-based security starts with the installation
Words: 503 - Pages: 3
SALE OR DISTRIBUTION Lab #7 - Assessment Worksheet Using Encryption to Enhance Confidentiality and Integrity Course Name and Number: _____________________________________________________ john schenberger Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you learned how cryptography
Words: 285 - Pages: 2