1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fed [463]
3 years ago
15

Create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is e

xpelled, and so on).
You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.
Computers and Technology
1 answer:
Ivenika [448]3 years ago
7 0

Answer:

Step 1

IT security policies for handling user accounts or rights for a student

IT security is simply protecting computer systems from being robbed or damaged in terms of

  • Misdirection for service they produce  
  • Software's
  • Hardware and
  • information  

Step 2:

Account/Right is one of the security policies IT provides.Policies that can be written for handling user accounts includes

  • User account must reside within the system authorized by IT team
  • User account protection
  • User account responsibility
  • User account and their access must agree to condition of usage established by IT.

Policies for  students who are leaving prematurely:

Expiry and deletion of user account:

When a course is finished or when a particular student withdraws from the course then user account gets terminated or deleted automatically.Achieving this can be through changes in authorization or deleting the account itself if no privileges are on the account

Step 4

Responsibilities of user account

A working assistant for the faculties who is a student would be given extra privileges compared to a normal student.For these category of students while exiting from the university they should hand over the responsibility , user account and password to the authority as required.

The access to other servers within the intranet or other resources are terminated.

Step 5

Privilege user account:

When assistant who are students drop out of a course,they should temporarily handover their user account to the concerned office.Now when they rejoin the the faculty he or she has the ability to take up the responsibility for handling the user's account

Step 6

Protection of user account

Assistants who are students or  normal students ,while leaving at any time or for any reason should not relate their login ID's and password.IT polices do not request for user ID's under any circumstance.Hence it is he job of the student to maintain secrecy of their login ID and their password.  

Explanation:

The above answer is an outline of an IT policy in order gain an insight on it let first define the term IT policy

IT policy

An IT policy can be defined as a lay down rule or a course of action adopted by an IT organisation to guild their activities in order to arrive at a particular outcome.this policies are implemented as a procedure or a protocol.

Some of the function of an IT policy include

1 To make available an IT infrastructure that would help the user identify opportunities , improve performance and understand business environment.

2 To evolve and archive information as corporate resource and to offer infrastructure to ensure coherent access for user to complete, concise and timely information.

The above answer provides a student with the necessary information to be able to make use of the resource on the faculties network.and be guided on outcome of some situation and conditions  

You might be interested in
Convert to binary140
marshall27 [118]

00110001 00110100 00110000

5 0
3 years ago
Antivirus software products require that you update _____ on a regular basis
german
Operating System, as far as I know @[email protected]
5 0
3 years ago
Read 2 more answers
What is the management part of a dashboard?
Stolb23 [73]

Answer:

 The management dashboard is the visual and display the KPI ( Key performance indicator) and metrics for monitoring the specific process and department.

It is basically used for checking whether the organization achieve or meet its specific goals not as per the requirement of the particular department in the organization.

The main part of the management dashboard is that it provide the visibility and alignment in the particular organization so that it meets according to the requirements of the organization. The basic requirement in the organization are:

  • Business user
  • Organization needs
  • Information technology (IT) needs

7 0
3 years ago
The concepts of ________________, _________________, and _________________ for covert acts are pivotal to understanding state-on
DIA [1.3K]

The concepts of Power, anonymity and political utility for covert acts are pivotal to understanding state-on-state interactions within cyberspace.

<h3>What is Anonymity?</h3>
  • Anonymity describes cases where the interim person's identity is anonymous.
  • Some writers have argued that anonymity, though technically accurate, does not capture what is more centrally at stake in contexts of anonymity.
  • The essential concept here is that an individual is non-identifiable, unavailable, or untrackable.
  • Anonymity is seen as a technique, or a way of realizing, sure other values, such as solitude, or liberty.
  • Over the past few years, anonymity tools used on the dark web by offenders and harmful users have drastically changed the ability of law enforcement to use conventional surveillance Techni.

To learn more about Anonymity, refer to:

brainly.com/question/28115737

#SPJ4

3 0
1 year ago
In a non-formatted/standard template, if the number 25 is converted to text format, the
goldfiish [28.3K]
<h2>The alignment of the text will be "left" by default</h2>

Explanation:

  • In Excel or spreadsheet, if any number is entered, it will automatically be aligned to right because right alignment is preferable for the numbers.
  • In case of any alignment is mentioned in the cell in prior to entering text or if the type of data is changed after or before entering the text, then the text is aligned accordingly.
  • According to the given scenario, a number "25" is entered and it is converted to text. So a text format will preserve the alignment as entered. By default it will be "left" aligned.

3 0
3 years ago
Other questions:
  • A tornado may be approaching if you observe which of the following?
    15·1 answer
  • Write a short java method that takes an integer n and returns the sum of all the odd positive integers less than or equal to n.
    5·1 answer
  • Sabian que hay una violadora sexuar el nombre de usario es SASHENKAFASION me acaba de decir que hackio en donde vivo,mi nombre c
    5·1 answer
  • How Do you get Splatoon two for free
    6·2 answers
  • 1) which of the following is not a characteristic of valuable information?
    8·1 answer
  • Free 35 points!!!
    11·2 answers
  • which of these tools stick to the edge of an image, thus making it easy to select the shape of an image
    6·1 answer
  • Please answer me fast ​
    6·2 answers
  • Explain any two features of a computer​
    15·1 answer
  • Please help I will mark brainliest
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!