Best Practice

Best Practice - Best Practice Usage Policy Statements Root...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Best Practice Usage Policy Statements: Root access is necessary for the security student to understand security principles, practices, and implementations. The security lab provides students and researchers (“users”) with an isolated and secure laboratory facility for educational information technology security research. Users may use these facilities for class assignments, research, the preparation of assignments and the development of skills in using an IT security network. The resources of the IT Security lab include computers and network infrastructure of wireless communications, routers, and switches sufficient to simulate the Internet. 1. Students administer the IT Security Lab under IT faculty supervision. The Security Team approves all policies and procedures. 2. Users agree to strictly follow instruction received from the IT Security Lab Administrator(s) on lab usage. 3. Only software purchased or approved by the university, and installed by the Administrators, remains permanently on university equipment. 4.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/05/2009 for the course IT IS taught by Professor Arther during the Three '09 term at Queensland Tech.

Page1 / 2

Best Practice - Best Practice Usage Policy Statements Root...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online