In this lab, you will be exploring security configurations. You will demonstrate methods of backup and restore, secure a workstation using local security policy settings, manage client security to ensure Confidentiality, Integrity, and Availability (CIA), and utilize built-in security tools to protect workstations.
To complete this assignment, do the following:
You must submit the completed document in each module’s Hands-On Lab. Any other document is not acceptable and will have a negative impact on your Hands-On Lab grade.
Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.
Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:
Jstudent_exampleproblem_101504
An organization’s security policy combines several different elements into one master document, which is the Security Policy. One of these sub-policies is a Software Installation Policy, which defines the requirements around installation of third-party software on company-owned devices. For this assignment, you will develop a Software Installation Policy.
This assignment addresses the transferable skills of digital fluency and information literacy. You will demonstrate your ability to:
To complete this assignment, do the following: