Security Policy Elements

  1. Who should be the person(s) responsible for each piece of networking equipment in the classroom (for example, routers, switches, and wireless access points).
  2. List the person(s) responsible for the computers that are used in the classroom.
  3. List the person(s) responsible for assigning permissions to use the network resources.
  4. Which types or subject-area Internet websites should users have permission to access from the IT lab?
  5. Which types or subject-area Internet websites should users not be able to access from the IT lab?
  6. What actions by users could damage the network or computers?
  7. Should anyone, other than the network administrator, be allowed to attach computer or devices to the network? Why or why not?