How the technology can be used and for what purpose


Assignment: Managing and Protecting Data

Technology is not effective if people do not follow procedures. Policies designate how the technology can be used, by whom, and for what purpose. Through the policies, the technology can be appropriately applied to ensure business purposes and objectives are met. As the system administrator, you need to further develop your Network Architecture Security Plan Proposal for your organization.

In this section, describe how you will manage and protect your network. Describe policies for each of the following:

• User access to computer resources
• Security profiles
• Passwords
• E-mail
• Internet access
• Antivirus
• Backup
• System patches
• Remote access
• Intrusion detection

Be sure to update your table of contents before submission.

The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.

Request for Solution File

Ask an Expert for Answer!!
Other Subject: How the technology can be used and for what purpose
Reference No:- TGS02131322

Expected delivery within 24 Hours