# CTE Resource Center - Verso - Computer Network Software Operations Task 1235584614

CTE Resource Center - Verso

Virginia’s CTE Resource Center

Implement a network security plan.

Definition

Implementation should include explaining and enforcing well-documented usage policies that ensure network security, including
  • Internet security software
  • virus protection software
  • protocol control
  • access points
  • acceptable use policies.

Related Standards of Learning

English

11.2

The student will examine how values and points of view are included or excluded and how media influences beliefs and behaviors.
  1. Describe possible cause and effect relationships between mass media coverage and public opinion trends.
  2. Create media messages with a specific point of view.
  3. Evaluate media sources for relationships between intent and content.
  4. Analyze the impact of selected media formats on meaning.
  5. Determine the author’s purpose and intended effect on the audience for media messages.
  6. Manage, analyze, and synthesize multiple streams of simultaneous information.
  7. Demonstrate ethical use of the Internet when evaluating or producing creative or informational media messages.

11.5

The student will read, interpret, analyze, and evaluate a variety of nonfiction texts including employment documents and technical writing.
  1. Apply information from texts to clarify understanding of concepts.
  2. Read and correctly interpret an application for employment, workplace documents, or an application for college admission.
  3. Analyze technical writing for clarity.
  4. Paraphrase and synthesize ideas within and between texts.
  5. Draw conclusions and make inferences on explicit and implied information using textual support.
  6. Analyze multiple texts addressing the same topic to determine how authors reach similar or different conclusions.
  7. Analyze false premises, claims, counterclaims, and other evidence in persuasive writing.
  8. Recognize and analyze use of ambiguity, contradiction, paradox, irony, sarcasm, overstatement, and understatement in text.
  9. Generate and respond logically to literal, inferential, evaluative, synthesizing, and critical thinking questions about the text(s).

12.2

The student will examine how values and points of view are included or excluded and how media influences beliefs and behaviors.
  1. Describe possible cause and effect relationships between mass media coverage and public opinion trends.
  2. Evaluate media sources for relationships between intent and factual content.
  3. Evaluate the motives (e.g., social, commercial, political) behind media presentation(s).
  4. Examine how values and viewpoints are included or excluded and how the media can influence beliefs, behaviors, and interpretations.
  5. Evaluate sources including advertisements, editorials, political cartoons, and feature stories for relationships between intent and factual content.
  6. Manage, analyze, and synthesize multiple streams of simultaneous information.
  7. Demonstrate ethical use of the Internet when evaluating or producing creative or informational media messages.

12.5

The student will read, interpret, analyze, and evaluate a variety of nonfiction texts.
  1. Use critical thinking to generate and respond logically to literal, inferential, and evaluative questions about the text(s).
  2. Identify and synthesize resources to make decisions, complete tasks, and solve specific problems.
  3. Analyze multiple texts addressing the same topic to determine how authors reach similar or different conclusions.
  4. Recognize and analyze use of ambiguity, contradiction, paradox, irony, overstatement, and understatement in text.
  5. Analyze false premises claims, counterclaims, and other evidence in persuasive writing.

Other Related Standards

FBLA Competitive Events and Activities Areas

Network Design

 

Networking Concepts

 

Microsoft Imagine Academy Resources

[4.083] Windows Server 2008 Active Directory: Administration of Active Directory—Lesson 6

NBEA Achievement Standards for Information Technology

Design and implement a security plan for an information system, including communications systems.

 

Design and implement security, privacy, and risk management policies and procedures for information technology.

 

Design hardware and software network security solutions (e.g., VPN, SSL, firewall).

 

Develop and implement data retention and destruction schedules.

 

Develop and implement disaster prevention and recovery policies and procedures.

 

Implement hardware and software network security solutions (e.g., VPN, SSL, firewall).

 

Implement procedures used to recover information from failures and security breaches (e.g., malware, viral infection).