Network Security Policy 1.Complete the “ThinkingOutsidethe Box” assignment number 2 on page 371 of your textbook by researching what is needed to develop a sound network security policy. 2.Write a...

1 answer below »

Network Security Policy



1.Complete the “ThinkingOutsidethe Box” assignment number 2 on page 371 of your textbook by researching what is needed to develop a sound network security policy.


2.Write a minimum one-page paper in current APA format that charts all of the employee and department details listed in the project.


3.Write a minimum three-page paper in current APA format that provides a security policy for each department that includes any restrictions, resource usage, or reporting requirements that would be necessary to keep the network secure.



Page 371


2.You have forgotten your password, so you call the help desk and ask the representative to retrieve your password. After a few moments, the helpdesk representative tells you your forgotten password. What has just happened, and what is its significance?







Running head: TITLE OF ESSAY 1 TITLE OF ESSAY 3 Title of Essay Author’s Name Grantham University Abstract Abstracts are research tools that can help you readers determine if the scope of your article/essay will help them in their own research. In APA, abstracts are typically 150-250 words in length and provide an evaluative summary of the essay to follow. The personal opinion of the author is strictly prohibited in abstracts. Unlike a body paragraph, the first line of an abstract is not tabbed-in. For many student essays, especially in lower-numbers courses, an abstract will not be required; still, it is good to practice this skill. Title of Essay In APA style, the introduction of the essay should begin here, followed by the body paragraphs. APA is typically a more formal style than most students are accustomed to using in a writing course. For the purposes of this course, the level of formality should be based on the assignment. For example: APA asks that students always write in third person (avoiding words such as I, me, we, our(s), you, your(s), etc). Certain rhetorical modes, however, don’t cater well to third person (narrative and reflection writing are two such examples). In these situations, first person (I, me, we, our(s)) may be, and should be employed; second person (you, your(s)) should be avoided in all academic writing unless an essay is specifically designed to relay instructions (there are few assignments that will employ second person). Like any essay, students should make sure their essays are formatted with one inch margins, with their text exclusively in Times New Roman 12-point font, and students should double space their lines. This document can be downloaded and used as a template wherein students may simply replace names, titles, dates, and so on with their own information. The final page of this document will demonstrate a References page. If a student uses information from any source, that source must be identified within the text and listed on a References page. These citations should be listed in alphabetical order and, opposite to the way a normal paragraph works, the first line should be flush left and each following line should be tabbed in. Though there is really no substitute for a good APA Style Manual, students can refer to a citation generator such as www.citationmachine.net to ensure proper formatting. Any further questions should be directed to the instructor of the course. References Badley, G. (2009). A place from where to speak: The university and academic freedom. British Journal of Educational Studies, 57(2), 146-163. doi:10.1111/j.1467- 8527.2009.00429.x Baumanns, M., Biedenkopf, K., Cole, J. R., Kerrey, B., & Lee, B. (2009). The future of universities and the fate of free inquiry and academic freedom: Question and answer session. Social Research, 76(3), 867-886. Retrieved from EBSCOhost. Berthoff, A. E. (2009). Learning the uses of chaos. In S. Miller (Ed.), The Norton Book of Composition Studies (pp. 649). New York: W. W. Norton & Company. Carroll, L. (2000) The Annotated Alice: The Definitive Edition. M. Gardner (Ed.) NY: Norton. Elbow, P. (2000). Getting along without grades—and getting along with them too. Everyone Can Write: Essays Toward a Hopeful Theory of Writing and Teaching Writing. NY: Oxford University Press.

Answered Same DayOct 16, 2021

Answer To: Network Security Policy 1.Complete the “ThinkingOutsidethe Box” assignment number 2 on page 371 of...

Amit answered on Oct 22 2021
156 Votes
Passwords and their recovery
Title of the assignment:
Student’s name:
Student ID:
Professor’s name:
Course title:
Date: 10/22/2020
Abstract
The
passwords are considered as the most confidential items related to all aspects. Forgetting the passwords is not a good habit. The provided scenario shows that the forgotten password is being retrieved by the user with help of help desk. The help desks are developed to help the users for faced issues which may be related to technical aspects or non technical aspects. Retrieving the forgotten password with help desk shows the technical support for the user. The help desk officials are not so much technical persons. When the user is asking to retrieve his / her password, the, the help desk person can make its uses for performing unauthorized activities. In my view point it is highly unethical activity. By doing the distribution of forgotten password will be possible among the help desk person and any reputation loss to user can easily be caused by that person. In this case the user must change the password on immediate bases. By doing so, the confidentiality of password can be maintained and new password will be generated. It is also observed that help desk person is not asking for the user identification and just retrieving the required password and supplying the user, it is also unethical. The help desk person must ask the user to provide his / her identity for retrieving the password. The detailed analysis of this scenario is carried out in conducted work.
Table of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here