Access Millions of academic & study documents

20200906004632it Security Policy

Content type
User Generated
Subject
Computer Science
School
New England College
Type
Homework
Showing Page:
1/4
Running head: IT SECURITY POLICY 1
IT Security Policy
Details
Name
Institutional Affiliation
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
IT SECURITY POLICY 2
Introduction
Higher learning institutions like universities have many computer account holders, who
may either be students, staff, management boards, etc. Each computer account contains private
information accessible only by the individual student who is the account holder and the
institution's management (Paul & Aithal, 2019). Therefore, the administration is obliged to
ensure every account's safety by establishing a stepwise information technology policy to
safeguard all the account users within the institution's database system.
Steps for the Information Technology Security Policy
1. Privatization of user account: The management of an institution can effectively and
efficiently enhance every user's account's maximum security by allowing only the holder
of the store to use it.
2. Centralization of account management: To avoid unauthorized creation and termination
of students' accounts, the control of the institution should centrally approve the opening,
operation, and termination of accounts where necessary.
3. No account holder should be allowed to authorize their access: For the safety of the
institution's data and crucial information, the entry of all account holders must be
facilitated and allowed by the administrator or the institution's management. This will
enhance the safety of every student's account, including those who are on suspension.
4. The organization's information technology security team should deny access to account
users if there is no need to log into the account (Flowerday & Tuyikeze, 2016).
5. User accounts can also be safely handled by disabling the accounts' access to change,
view, or deleting information when there is no need to do so.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
Running head: IT SECURITY POLICY 1 IT Security Policy Details Name Institutional Affiliation Date IT SECURITY POLICY 2 Introduction Higher learning institutions like universities have many computer account holders, who may either be students, staff, management boards, etc. Each computer account contains private information accessible only by the individual student who is the account holder and the institution's management (Paul & Aithal, 2019). Therefore, the administration is obliged to ensure every account's safety by establishing a stepwise information technology policy to safeguard all the account users within the institution's database system. Steps for the Information Technology Security Policy 1. Privatization of user account: The management of an institution can effectively and efficiently enhance every user's account's maximum security by allowing only the holder of the store to use it. 2. Centralization of account management: To avoid unauthorized creation and termination of students' accounts, the control of the institution should centrally approve the opening, operation, and termination of accounts where necessary. 3. No account holder should be allowed to authori ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents