Professional Documents
Culture Documents
NOTE: Unit 9 has two Assignments: Assignment 1 and Assignment 2. Each will be submitted to their
individual Dropbox.
Unit 9, Assignment 1
Course outcome:
IT286-5: Explore social engineering, security administration, disaster recovery and incident response
Instructions:
NOTE: You will have two parts to Assignment 1 that will be submitted as one file through the Assignment 1
Dropbox.
Requirements:
Part 1 of this assignment includes short essay, descriptive tables and screen captures demonstrating an
understanding of the topics. Any resource used including the textbook should be properly cited.
Documents should be submitted using APA Style (double-spaced with a title page and a reference page).
Essays should be separated into sections by the Assignment Part number and the question number.
Assignment 1, Part 1
Source: Metnick, K & Simon W. (2002). The art of deception: Controlling the human element of security. New
York, NY: Wiley and Sons.
2. Access control is the goal of physical security. Create a table that outlines four types of physical access
control.
Physical Control Description Example
3. Create a table to list and define the six control types shown in the textbook.
Control Type Definition Example
4. In a short essay explain why a network administrator needs to be concerned with the HVAC (heating,
ventilation and air conditioning) and fire suppression systems? Name two policies you would implement
concerning fire in the IT area.
Assignment 1, Part 2
a. Select the Start button. In the Search box, type Create a System Repair Disk.
b. Select the program from the pop-up menu and a dialog box appears listing the drives on your machine.
Choose a drive, insert a blank CD or DVD in the drive, and click Create Disk. Take a screen capture of the
dialog box.
The bootable disk will be created. Be sure to label it and store it in a safe place.
2.Data Policy
A wise network administrator will implement a strict data policy. Data policy for disk wiping (also called
sanitation) is the permanent removal or destruction of the data stored on a device. Disk disposal is the process
of destroying the entire data device. The device can be a memory chip or a permanent storage device such as
a thumb drive, flash drive, CD/DVD, hard disk or other storage medium. If the device is to be retained, then
sanitation software must be used to permanently overwrite the data.
Research disk wiping/sanitation software and make a recommendation based on the products features. Take
a screen capture of the websites list of features.
Examples:
- SDelete from Microsoft deletes files and directories or it can be used to cleanse the free space on a logical
disk.
Copyright Kaplan University
Assignment 1 Grading Rubric
Course: IT286 Unit: 9 Points: 30
Points Points
Assignment Requirements Possible Earned