1 Viramar

Is3230 Unit 2 Assignment 2

Essay on Assignment Unit 302 Oct 13 Chris Pi

2645 WordsNov 15th, 201411 Pages

Learner Name: Chris Piggott

Assignment 302: Understanding and Using Inclusive Teaching and Learning Approaches in Education and Training
Assignment Overview

Introduction:
The assignment for Unit 302 asks you to demonstrate your understanding and use of inclusive teaching and learning approaches to meet the needs of learners. It includes how to create a learning environment that engages and motivates learners, and planning, delivery and evaluation of inclusive teaching and learning. It also requires that you deliver a microteaching session and to evaluate your own delivery practice.
The assignment is designed to ensure by completing all tasks, you will meet the learning…show more content…

Describe features of inclusive teaching and learning, explaining why it’s important to create an inclusive teaching and learning environment. (1.1 & 2.1)

In essence, inclusive teaching means teaching in ways that do not exclude learners, accidentally or intentionally, from opportunities to learn. By inclusive we mean valuing the contribution of learners regardless of their backgrounds and value systems. It is not about providing ‘remedial’ or ‘special’ measures for certain groups of learners.
Florian and Black-Hawkins (2010) describe their conceptualization of inclusive pedagogy:
Our conceptualization of inclusive pedagogy focuses on how to extend what is ordinarily available in the community of the classroom as a way of reducing the need to mark some learners as different. This is underpinned by a shift in pedagogical thinking from an approach that works for most learners existing alongside something ‘additional’ or ‘different’ for those (some) who experience difficulties, towards one that involves providing rich learning opportunities that are sufficiently made available for everyone, so that all learners are able to participate in classroom life.

Studies

Show More

Presentation on theme: "© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls."— Presentation transcript:

1 © ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls

2 © ITT Educational Services, Inc. All rights reserved.Page 2 IS3230 Access Security Class Agenda 10/15/15  Chapter 8  Learning Objectives  Lesson Presentation and Discussions.  Class project outline due  Lab Activities will be performed in class..  Assignments will be given in class.  Break Times. 10 Minutes break in every 1 Hour.  Note: All Assignment and labs due today.

3 © ITT Educational Services, Inc. All rights reserved.Page 3 IS3230 Access Security Learning Objective  Implement appropriate access controls for information systems within information technology (IT) infrastructures.

4 © ITT Educational Services, Inc. All rights reserved.Page 4 IS3230 Access Security Key Concepts  The three states of data  File system access control lists  User account type privilege management  Access control best practices  Organization-wide layered infrastructure access control

5 © ITT Educational Services, Inc. All rights reserved.Page 5 IS3230 Access Security EXPLORE: CONCEPTS

6 © ITT Educational Services, Inc. All rights reserved.Page 6 IS3230 Access Security The Three States of Data Stored on some device Archived records Data at Rest (DAR) Sending an e-mail Retrieving a Web page Data in Motion (DIM) Creating a new document Processing a payment Data in Process

7 © ITT Educational Services, Inc. All rights reserved.Page 7 IS3230 Access Security DAR  Discussion:  As Students to give example of  Data at rest  Data in Motion  Data in Process.

8 © ITT Educational Services, Inc. All rights reserved.Page 8 IS3230 Access Security Securing DAR  Use of access Control mechanisms  Data Encryption.  Back ups  Physical Security

9 © ITT Educational Services, Inc. All rights reserved.Page 9 IS3230 Access Security  Use encryption to protect stored data: Elements in databases Files on network and shared drives Files on portable or movable drives, Universal serial bus (USB), and flash drives Files and shared drives accessible from the Internet Personal computers (PCs), laptop hard drives, and full disk encryption Protecting DAR

10 © ITT Educational Services, Inc. All rights reserved.Page 10 IS3230 Access Security DIM Gateway Network A Gateway Network B Direct Connection Remote virtual private network (VPN) Connection

11 © ITT Educational Services, Inc. All rights reserved.Page 11 IS3230 Access Security Protecting, DIM,  Vulnerable as it travels  Less risky than DAR  Attacker will have to get access to physical connection.  Boarder protection are needed –Firewalls and IDS

12 © ITT Educational Services, Inc. All rights reserved.Page 12 IS3230 Access Security Securing DIM  Encryption mechanisms to secure communication channel  SLL  HTTPS  VPN

13 © ITT Educational Services, Inc. All rights reserved.Page 13 IS3230 Access Security Difficult to protect since it is being operated on by the central processing unit (CPU) Protecting DIP

14 © ITT Educational Services, Inc. All rights reserved.Page 14 IS3230 Access Security Object level Security  Object is an item or group of items or group of information.  As in object oriented programming.  Security rules can be set on objects to secure data at rest of in motion  Example Firewalls and Web content filters

15 © ITT Educational Services, Inc. All rights reserved.Page 15 IS3230 Access Security File System Access Controls  File system access controls will include logging of user activities on the: Files Applications Systems Access Controls at Different Levels in a System

16 © ITT Educational Services, Inc. All rights reserved.Page 16 IS3230 Access Security  Trust-Based Peer to Peer (P2P)  Workgroup  Role-Based Access  Group-Based Files Access Types of File System Access Controls

17 © ITT Educational Services, Inc. All rights reserved.Page 17 IS3230 Access Security Access Control list  Security policies assigned to objects  Access control entities  Access denied, Access allowed, System audit.

18 © ITT Educational Services, Inc. All rights reserved.Page 18 IS3230 Access Security  Microsoft (MS) Windows versus UNIX  File system controls in MS Windows and UNIX are different, but used to accomplish the same objective–control access to data assets  Windows file access rights are inherited Types of File System Access Controls (Continued)

19 © ITT Educational Services, Inc. All rights reserved.Page 19 IS3230 Access Security Basic Access control rights in Windows.  Use in both Widows workstations and Servers for files and folders  Full Control  Modify  Read and execute  List Folder content  Read  Write

20 © ITT Educational Services, Inc. All rights reserved.Page 20 IS3230 Access Security Advanced Rights for file  Full Control  Traverse Folder  Read Attribute  Create files/Write data  Write Attribute  Create folder/ Append data  Delete  Read Permission  Change permission  Take ownership

21 © ITT Educational Services, Inc. All rights reserved.Page 21 IS3230 Access Security Windows Administrator Rights  A domain Administer – Full control of all computers in a Domain  Supper Administrator- Build in Secret administrator.

22 © ITT Educational Services, Inc. All rights reserved.Page 22 IS3230 Access Security EXPLORE: PROCESSES

23 © ITT Educational Services, Inc. All rights reserved.Page 23 IS3230 Access Security UNIX and Linux  Simplify ACL is based file permission system  Access rights are not inherited.  Rights in UNIX-Read, Write and Execute.  Root is a special class user in a UNIX or Linux  Also known as Super user  Supper user do (sudo) – allow user have privilege as a super user.

24 © ITT Educational Services, Inc. All rights reserved.Page 24 IS3230 Access Security Layered Protection Through IT Infrastructure

25 © ITT Educational Services, Inc. All rights reserved.Page 25 IS3230 Access Security Layered Protection Through IT Infrastructure (Continued) DMZ 2 DMZ 1 Dual DMZ Configuration

26 © ITT Educational Services, Inc. All rights reserved.Page 26 IS3230 Access Security EXPLORE: ROLES

27 © ITT Educational Services, Inc. All rights reserved.Page 27 IS3230 Access Security Roles and Responsibilities RoleResponsibilities System Owner  Owns System  Authorizes access  Performs non-technical access control review Network Administrator  Managing host security, file permissions, backup and disaster recovery plans, file system integrity, and adding and deleting users  Troubleshoot networks, systems, and applications to identify and correct malfunctions and other operational difficulties System Administrator  Grants access to system, applications, and data  Provides special access as required  Creates groups and assigns users and privileges  Provides backup and recovery capabilities of systems, applications, and data

28 © ITT Educational Services, Inc. All rights reserved.Page 28 IS3230 Access Security Roles and Responsibilities (Continued) RoleResponsibilities Application Owner  Grants access to applications that manipulate data  Maintains integrity of applications and processes Data Owner  Maintains data integrity  Authorizes distribution to internal and external parties User  Uses systems, applications, and data to perform functions  Creates file  Assigns data classification

29 © ITT Educational Services, Inc. All rights reserved.Page 29 IS3230 Access Security Summary  Three states of data  Protecting DIM and DAR  File system access controls  Layered protection  Roles and responsibilities

30 © ITT Educational Services, Inc. All rights reserved.Page 30 IS3230 Access Security Unit 6 Lab Activities  Lab # 6: Enhance Security Controls Leveraging Group Policy Objects  Complete the lab activities in class

31 © ITT Educational Services, Inc. All rights reserved.Page 31 IS3230 Access Security Unit 6 Assignments  Unit 6 Assignment: Aligning Account Types and Privileges  A copy of the assignment will be given in class.  Reading assignment: Read Chapters 9

Leave a Comment

(0 Comments)

Your email address will not be published. Required fields are marked *