Procedure Guide to Access Control Essay

Published: 2020-01-28 03:40:07
370 words
2 pages
printer Print
essay essay

Category: Security

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

GET MY ESSAY
¢Explain the need for designing procedures for simple tasks such as creating or modifying access controls

Access controls is an important part of security in any business setting. This insures the protection of sensitive materials from being access from unauthorized users as well as keeping in-house materials in-house and not distributed to unauthorized personnel. o When setting procedures up for creating or modifying access controls you have to take in account the type of personnel that will be implementing the procedures. You may have to use simplified methods to allow the users easy access to correct, add or delete information. At the same time the procedure need to be complex enough that unauthorized users cannot get in and change information on their own. Proper procedures insure that a system is not compromised or destroyed based on a simple mistake or miss management of access.

¢List the steps to satisfy each of the requirements in the assignments instructions:

1.Status or setting prior to change : Start menu, Right click computer, select manage This will allow you to see what is currently in place and also bring you to the place you need to be in order to make any changes

2.Reason For Change: The reason for change could be as simple as a new user needs to be added to a particular group to allow them access to certain information so that they are able to do their job

3.Change to implement: Start, Admin. Tools, Active direct. Users and computers, right click users, add user, follow prompts to add user, right click group, click add users, follow prompts to add user to group

4.Scope of the change: Log out of admin. Log into user , test access of group information and add and change capabilities

5.Impact of change: Impact of change either adds access or denies access but over impact is no change.

6.Status or setting after the change :  You back through the same way you access information as the admin and check the information you entered.

7.Process to evaluate the change: Again you can view through admin. Or you can log out and view by going throught the users credentials to check and make sure that access and denies was implemented correctly.

Warning! This essay is not original. Get 100% unique essay within 45 seconds!

GET UNIQUE ESSAY

We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read