1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fed [463]
3 years ago
15

Create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is e

xpelled, and so on).
You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.
Computers and Technology
1 answer:
Ivenika [448]3 years ago
7 0

Answer:

Step 1

IT security policies for handling user accounts or rights for a student

IT security is simply protecting computer systems from being robbed or damaged in terms of

  • Misdirection for service they produce  
  • Software's
  • Hardware and
  • information  

Step 2:

Account/Right is one of the security policies IT provides.Policies that can be written for handling user accounts includes

  • User account must reside within the system authorized by IT team
  • User account protection
  • User account responsibility
  • User account and their access must agree to condition of usage established by IT.

Policies for  students who are leaving prematurely:

Expiry and deletion of user account:

When a course is finished or when a particular student withdraws from the course then user account gets terminated or deleted automatically.Achieving this can be through changes in authorization or deleting the account itself if no privileges are on the account

Step 4

Responsibilities of user account

A working assistant for the faculties who is a student would be given extra privileges compared to a normal student.For these category of students while exiting from the university they should hand over the responsibility , user account and password to the authority as required.

The access to other servers within the intranet or other resources are terminated.

Step 5

Privilege user account:

When assistant who are students drop out of a course,they should temporarily handover their user account to the concerned office.Now when they rejoin the the faculty he or she has the ability to take up the responsibility for handling the user's account

Step 6

Protection of user account

Assistants who are students or  normal students ,while leaving at any time or for any reason should not relate their login ID's and password.IT polices do not request for user ID's under any circumstance.Hence it is he job of the student to maintain secrecy of their login ID and their password.  

Explanation:

The above answer is an outline of an IT policy in order gain an insight on it let first define the term IT policy

IT policy

An IT policy can be defined as a lay down rule or a course of action adopted by an IT organisation to guild their activities in order to arrive at a particular outcome.this policies are implemented as a procedure or a protocol.

Some of the function of an IT policy include

1 To make available an IT infrastructure that would help the user identify opportunities , improve performance and understand business environment.

2 To evolve and archive information as corporate resource and to offer infrastructure to ensure coherent access for user to complete, concise and timely information.

The above answer provides a student with the necessary information to be able to make use of the resource on the faculties network.and be guided on outcome of some situation and conditions  

You might be interested in
In which career does the level of education vary the most?
Ksenya-84 [330]
Journalism
all the best
3 0
3 years ago
Read 2 more answers
Which of the following best describes compounds.
Lemur [1.5K]
A. They can only be separate chemically
4 0
3 years ago
3.14 LAB: Input and formatted output: Caffeine levels A half-life is the amount of time it takes for a substance or entity to fa
nata0808 [166]

Answer:

#include <iostream>

#include <iomanip>

using namespace std;

int main()

{

double caffeineMg;

cin>>caffeineMg;

cout<<"After 6 hours: "<<fixed<<setprecision(2)<<caffeineMg/2.0<<" mg\n";

cout<<"After 12 hours: "<<fixed<<setprecision(2)<<caffeineMg/4.0<<" mg\n";

cout<<"After 24 hours: "<<fixed<<setprecision(2)<<caffeineMg/8.0<<" mg\n";

return 0;

}

Explanation:

  • Declare a variable for caffeine and take the input from user.  
  • Print the results by dividing the caffeine by relevant Half Life.
  • Use setprecision function to display the result up to 2 decimal places.
8 0
3 years ago
The two internal networks are using the same internal network. Does this work? Why or Why not?
lana [24]

Answer:yes

Explanation:

They are the same network

3 0
3 years ago
Which of the following best explains why property rights are necessary in a
11Alexandr11 [23.1K]

Answer:

A. Property rights allow consumers and producers to make free

choices.

Explanation:

If the consumers and the producers have the properties, then only they can say that well this is free for you, or in other words, can make the free choices. And by no means market forces only work when everyone owns some property, as some also cannot have the property, and hence work hard to earn some property, and thus the Market force does work. And the laws have nothing to do with the free market or the non-free market. And as we saw above, the competition can exist if someone owns the property, and others do not. Hence, the correct answer is A.

5 0
3 years ago
Other questions:
  • What if you have been asked to opt or design expert system or virtual reality using artificial intelligence for your daily/routi
    9·1 answer
  • If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure stat
    7·1 answer
  • What makes smartphones so fragile?
    7·1 answer
  • A technician is dispatch to troubleshoot a user's computer.
    12·1 answer
  • Given a int variable named callsReceived and another int variable named operatorsOnCall write the necessary code to read values
    13·1 answer
  • "You have installed a point-to-point connection using wireless bridges and Omni directional antennas between two buildings. The
    8·1 answer
  • Organizing speech ideas according to physical space, direction, or location calls for a _____ organizational pattern.
    11·1 answer
  • All of the following are true of using the database approach to managing data except Group of answer choices Decentralized manag
    6·1 answer
  • What year did apple computer introduce the first ipod?.
    8·1 answer
  • Why did industrial revolution begin Britain?​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!