Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Create a PowerPoint presentation for new systems administrators in which you int

ID: 3815791 • Letter: C

Question

Create a PowerPoint presentation for new systems administrators in which you introduce security topics critical to their roles.

In your PowerPoint, include the following:

Identify unique ethical, legal, and policy issues associated with the administration of systems and networks.

Explain how to administer basic user and group security from within an operating system.

Explain how to implement virus protection (most important).

Describe how to configure a network-based firewall and to configure proxy settings.

Explanation / Answer

The system admin should have to manage user and groups account

The admin must set the permissions for the system users

Admin must be responsible for the restriction process and unauthorization process

System have the privileges for dynamic roles allocation of user rights

The admin must maintain online backup and offline backup in regular period of time.

The admin must be a trusted agent dealing with all the important data in the organization

The admin should not misuse the rights.

The admin should not give any misuse able permissions to employees

Effort should be taken to safe gaurd all the data in the organizations

Critical measure should been planned by the admin in case of any disaster.

Adding of new user to group is the job for the admin

he should provide the gateway to access the data through a login page where user id and password is created.

He should also check the roles for the user whether that is person is allowed to access that data or not.

The password should be in encrypted format so that the other cant easy access that data .

To implement virus protection mostly in organizations linux will be used and server will be mostly in linux based os will be used this prevents 70 percent of the virus problem

The rights to give usb plug in devices should be monitored carefully

Antivirus programs and malware programs can be install to detect the treat before it affect on the system

The network consist of a external host and in between is the firewall from the firewall the packet filtering happens and if the packet are authenticated the process continues to the webserver where is access the data from the data base .

From browser choose internet options and click on lan setting select the proxy setting and give the ip address as you wish and port number and the network will be running on the proxy what you have given after the everything restarts.