Question: Complete and submit screen captures from the lab and write policies for logical and physical access control. Collapse All Introduction By successfully completing this assessment,
Complete and submit screen captures from the lab and write policies for logical and physical access control.
Collapse All
Introduction
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency : Apply general information assurance and security concepts.
Write a Logical Access Control policy that is appropriate for the Course Security scenario.
Competency : Design mechanisms that control unauthorized access to private information.
Provide required screenshots that document lab completion.
Justify an instance where an administrator may need to login to a server or workstation with an account different from their standard operating account.
Competency : Interpret how information security concepts and practices are impacted by regulations and laws.
Write a Physical Access Control policy for HIPAA compliance that is appropriate for the Course Security scenario.
Overview
It is critical for an organization to protect its information resources in a compliant and assured manner. One of the first steps in this process is understanding what you need to protect and then you can determine who needs what access to particular resources. Using Active Directory and applying access controls to resources in that type of environment is one common way to secure these resources.
For this assessment, you will complete and submit screen captures from the lab and write policies for logical and physical access control.
Preparation
Do the following:
Complete the lab and resource activities for this assessment.
Review the Course Security Scenario DOCX Download Course Security Scenario DOCXfor context when writing your security policies.
Instructions
Security Planning: Logical and Physical Access Control
Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, or details that you might add that add depth, texture, or provide a foundation for your policies. Your goal is to create effective policies that represent modern systems assurance security practices and planning.
Logical Access Control pages
Physical Access Control pages
Consider the following scoring guide criteria as you complete your assessment:
Provide required screenshots that document lab completion.
Write a Logical Access Control policy that is appropriate for the Course Security scenario.
Write a Physical Access Control policy for HIPAA compliance that is appropriate for the Course Security scenario.
Justify an instance where an administrator may need to login to a server or workstation with an account different from their standard operating account.
Provide required screenshots that document lab completion.
Distinguished
Provides required screenshots that document full and correct lab completion.
Proficient
Provides required screenshots that document lab completion.
Basic
Provides insufficient screenshots to document lab completion.
Non Performance
Does not provide screenshots that document attempts at lab work
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
