Access Millions of academic & study documents

Fourty Nine

Content type
User Generated
Subject
Computer Science
School
Arkansas Baptist College
Type
Homework
Showing Page:
1/5
Running Head: USER ACCOUNTS 1
User Accounts
Institutional Affiliation
Name
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
USER ACCOUNTS 2
User Accounts
STEP BY STEP SOLUTION
Step one
IT security policies for handling user accounts
IT security involves establishing the safety of computers by establishing measures that help
ensure this. There are different steps involved in establishing this. The first step involves;
Information
Software
Hardware
Misdirection for the services provided.
Step Two
It is essential to note that IT policies provide for the security of user accounts. Some of the
processes and user accounts involved in this include;
User account protection
Expiry and deletion of user account
User accounts must reside within the system authorized by the IT department
User accounts must agree to the terms and conditions of the IT department
Step 3
IT policies for students who is leaving as a result of expulsion from the institution.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
1 Running Head: USER ACCOUNTS User Accounts Institutional Affiliation Name Date USER ACCOUNTS 2 User Accounts STEP BY STEP SOLUTION Step one IT security policies for handling user accounts IT security involves establishing the safety of computers by establishing measures that help ensure this. There are different steps involved in establishing this. The first step involves; • Information • Software • Hardware • Misdirection for the services provided. Step Two It is essential to note that IT policies provide for the security of user accounts. Some of the processes and user accounts involved in this include; • User account protection • Expiry and deletion of user account • User accounts must reside within the system authorized by the IT department • User accounts must agree to the terms and conditions of the IT department Step 3 IT policies for students who is leaving as a result of expulsion from the institution. USER ACCOUNTS 3 It is necessary to ensure the protection of a user account whose student is leaving prematurely. This can be done by changing authorization and allocating the user account to someone else in the institution or deleting the account permanently. This is aimed at protecting the institution from access from unauthorized personnel. Step 4 User account responsibilities. Students working for the faculty by occupying the position of assistants have special privileges when it comes to their user accounts. They are requi ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents