SlideShare a Scribd company logo
1 of 22
Policy and
Procedures of
the users
account
• Presentation by :
Hani Allehyani
Ahmed Alluhaybi
OVERVIEW
1 of 21
 Introduction
 Definition
 What are kind of police?
• Basic Principles :
• General Principles :
 Questions
Introduction
2 of 21
 These policies regulate the direct and indirect use of
Technology resources across most companies in the
world.
 The success of any information security program lies in
policy development
Definition
3 of 21
The basic principles by which a company is guided.
What are kind of polices?
4 of 21
• There are two kinds of policies
• Basic Principles :
• General Principles :
Basic Principles
5 of 21
• Every user should have one identity
Connect all users description by ID that has 10 number to
make easy to research
Basic Principles
6 of 21
• Every user account should be used only by the person who
issued to him
Not allow to any user give to another user his username and
password so If the user Account is misused, the person to
whom the account was issued must take sole responsibility for
those actions
Basic Principles
7 of 21
User account or email addresses shall not affect
after account retirement and after 12 month
If the user account retire you will lose it after 12 month. There are two main
reasons for this policy . Firstly, it is a requirement for our organization membership.
Secondly, experience has shown that re-using an account it means still receives
lots of private newsletters and messages.
Basic Principles
8 of 21
All accounts must adhere to the principle of
least privilege
The level of access to resources granted to all users Account
should be commensurate with the privileges required by the owner
to do his job
Basic Principles
9 of 21 2
In our organization the password is required
to at least meet the following:
• At least 8 characters long
• Contain at least one upper case letter and at least one lower case letter
• Contain at least one number or punctuation character
• Not be a dictionary word
• Be less than 12 months old
General Principles
10 of 21
semi-user accounts
There are some cases in which two users have
the same name
Mohammed Abdullah Allehyani
M a allehyani or lehyani1
continue
General Principles :
11 of 21
How to create username
A good naming convention makes it easy for
users to remember their logon names
continue
General Principles
12 of 21
Signal user account
All user ids should take the form
Mohammed Abdullah Allehyani
M a lehyani
continue
General Principles
13 of 21
semi-user accounts
There are some cases in which two users have
the same name
Mohammed Abdullah Allehyani
M a allehyani or lehyani1
continue
General Principles
14 of 21
Service accounts
Any users have Service Accounts shall have the prefix “svc”, followed by a
descriptive name of the service the account relates to it .
The Exchange service account would be:
Procedures of users account
15 of
Account Creation Process:
If the individual is not entered into the domain within 60 days
after the originally intended start date you will be lost the account .
21
Procedures of users account
16 of
Account Removal Process
HR will regularly notify IT Services of changes in employee
status for remove or increase the privileges it related to the status
change
21
Procedures of users account
17 of
account is locked
Account locked duration 10 minutes and you will remove the screen
to screen saver .If you do not touch or remove (keyboard or mouse
) after this time account is locked .
21
Procedures of users account
18 of
Ports
All ports like CD/DVD ,USB and FLOPY are locked except
the ports connect the device like (printer, scanner ,
barcode……etc.) by using Trend Antiviruses programme
21
Procedures of users account
19 of
Sharing
You should be chosen the username that give him permission for
files, folders or drives. Do not use default shares you should be
removed
21
Procedures of users account
20 of
Antivirus software
Antivirus software should be updated timely in consultation with
System Administrator
21
Procedures of users account
21 of
Partition
Do not give others the opportunity to look over your shoulder if
you are working on sensitive data
21

More Related Content

Viewers also liked

ORBIS Verkoopacties apr - mei 2016
ORBIS Verkoopacties apr - mei 2016ORBIS Verkoopacties apr - mei 2016
ORBIS Verkoopacties apr - mei 2016Ren K
 
The Blue Chip Standard
The Blue Chip StandardThe Blue Chip Standard
The Blue Chip Standardtbainton
 
The Business of Tennis - Specific Tips on How to Grow your Tennis Program
The Business of Tennis - Specific Tips on How to Grow your Tennis ProgramThe Business of Tennis - Specific Tips on How to Grow your Tennis Program
The Business of Tennis - Specific Tips on How to Grow your Tennis Programtbainton
 
Btp(2014 2015)
Btp(2014 2015)Btp(2014 2015)
Btp(2014 2015)8882589289
 
William Schutz PH.D. and the Interpersonal Needs Theory
William Schutz PH.D. and the Interpersonal Needs TheoryWilliam Schutz PH.D. and the Interpersonal Needs Theory
William Schutz PH.D. and the Interpersonal Needs TheoryMercy Neumark
 
Creating, Sustaining, & Leveraging Partnerships in the Tennis Industry
Creating, Sustaining, & Leveraging Partnerships in the Tennis IndustryCreating, Sustaining, & Leveraging Partnerships in the Tennis Industry
Creating, Sustaining, & Leveraging Partnerships in the Tennis Industrytbainton
 

Viewers also liked (6)

ORBIS Verkoopacties apr - mei 2016
ORBIS Verkoopacties apr - mei 2016ORBIS Verkoopacties apr - mei 2016
ORBIS Verkoopacties apr - mei 2016
 
The Blue Chip Standard
The Blue Chip StandardThe Blue Chip Standard
The Blue Chip Standard
 
The Business of Tennis - Specific Tips on How to Grow your Tennis Program
The Business of Tennis - Specific Tips on How to Grow your Tennis ProgramThe Business of Tennis - Specific Tips on How to Grow your Tennis Program
The Business of Tennis - Specific Tips on How to Grow your Tennis Program
 
Btp(2014 2015)
Btp(2014 2015)Btp(2014 2015)
Btp(2014 2015)
 
William Schutz PH.D. and the Interpersonal Needs Theory
William Schutz PH.D. and the Interpersonal Needs TheoryWilliam Schutz PH.D. and the Interpersonal Needs Theory
William Schutz PH.D. and the Interpersonal Needs Theory
 
Creating, Sustaining, & Leveraging Partnerships in the Tennis Industry
Creating, Sustaining, & Leveraging Partnerships in the Tennis IndustryCreating, Sustaining, & Leveraging Partnerships in the Tennis Industry
Creating, Sustaining, & Leveraging Partnerships in the Tennis Industry
 

Similar to Policy presentation

Bank management system
Bank management systemBank management system
Bank management systemsumanadas37
 
51955853 banking-system-documentation
51955853 banking-system-documentation51955853 banking-system-documentation
51955853 banking-system-documentationAziz Muslim
 
FINAL PROJECT REPORT1
FINAL PROJECT REPORT1FINAL PROJECT REPORT1
FINAL PROJECT REPORT1waqar younas
 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)Dev Dorse
 
documentation on bank management system
documentation on bank management systemdocumentation on bank management system
documentation on bank management systemUnsa Jawaid
 
Web based online shopping system Presentation slide
Web based online shopping system Presentation  slideWeb based online shopping system Presentation  slide
Web based online shopping system Presentation slideRakibul Hasan Pranto
 
Loan Approval Management Java project
Loan Approval Management Java projectLoan Approval Management Java project
Loan Approval Management Java projectTutorial Learners
 
BlackLine System Admin Best Practices
BlackLine System Admin Best PracticesBlackLine System Admin Best Practices
BlackLine System Admin Best PracticesAviva Spectrum™
 
Garth Graham MBA Tech Keynote slides 2018
Garth Graham MBA Tech Keynote slides 2018Garth Graham MBA Tech Keynote slides 2018
Garth Graham MBA Tech Keynote slides 2018Mortgage Coach
 
Risk management of privileged users 2
Risk management of privileged users 2Risk management of privileged users 2
Risk management of privileged users 2Ken Willén
 
BlackLine System Admin Best Practices
BlackLine System Admin Best Practices BlackLine System Admin Best Practices
BlackLine System Admin Best Practices Aviva Spectrum™
 
【En】line business connect operational guidelines 20141215 (1)
【En】line business connect operational guidelines 20141215 (1)【En】line business connect operational guidelines 20141215 (1)
【En】line business connect operational guidelines 20141215 (1)Dhruv Suri
 
【En】line business connect operational guidelines 20141215 (1)
【En】line business connect operational guidelines 20141215 (1)【En】line business connect operational guidelines 20141215 (1)
【En】line business connect operational guidelines 20141215 (1)Dhruv Suri
 
Business plan - Mobile Payment Application
Business plan - Mobile Payment ApplicationBusiness plan - Mobile Payment Application
Business plan - Mobile Payment ApplicationPlan Writers
 

Similar to Policy presentation (20)

Bank management system
Bank management systemBank management system
Bank management system
 
51955853 banking-system-documentation
51955853 banking-system-documentation51955853 banking-system-documentation
51955853 banking-system-documentation
 
PASCUA(REPORT.CMSC411)
PASCUA(REPORT.CMSC411)PASCUA(REPORT.CMSC411)
PASCUA(REPORT.CMSC411)
 
FINAL PROJECT REPORT1
FINAL PROJECT REPORT1FINAL PROJECT REPORT1
FINAL PROJECT REPORT1
 
User account (Windows)
User account (Windows)User account (Windows)
User account (Windows)
 
Final project (1)
Final project (1)Final project (1)
Final project (1)
 
70 .lic
70 .lic70 .lic
70 .lic
 
Project
ProjectProject
Project
 
documentation on bank management system
documentation on bank management systemdocumentation on bank management system
documentation on bank management system
 
Web based online shopping system Presentation slide
Web based online shopping system Presentation  slideWeb based online shopping system Presentation  slide
Web based online shopping system Presentation slide
 
Loan Approval Management Java project
Loan Approval Management Java projectLoan Approval Management Java project
Loan Approval Management Java project
 
BlackLine System Admin Best Practices
BlackLine System Admin Best PracticesBlackLine System Admin Best Practices
BlackLine System Admin Best Practices
 
Utilizing Technology to Design Efficient Law Firm Processes
Utilizing Technology to Design Efficient Law Firm ProcessesUtilizing Technology to Design Efficient Law Firm Processes
Utilizing Technology to Design Efficient Law Firm Processes
 
Garth Graham MBA Tech Keynote slides 2018
Garth Graham MBA Tech Keynote slides 2018Garth Graham MBA Tech Keynote slides 2018
Garth Graham MBA Tech Keynote slides 2018
 
Risk management of privileged users 2
Risk management of privileged users 2Risk management of privileged users 2
Risk management of privileged users 2
 
Webinar: Beneficiary Engagement and Incentives: Shared Decision Making (SDM) ...
Webinar: Beneficiary Engagement and Incentives: Shared Decision Making (SDM) ...Webinar: Beneficiary Engagement and Incentives: Shared Decision Making (SDM) ...
Webinar: Beneficiary Engagement and Incentives: Shared Decision Making (SDM) ...
 
BlackLine System Admin Best Practices
BlackLine System Admin Best Practices BlackLine System Admin Best Practices
BlackLine System Admin Best Practices
 
【En】line business connect operational guidelines 20141215 (1)
【En】line business connect operational guidelines 20141215 (1)【En】line business connect operational guidelines 20141215 (1)
【En】line business connect operational guidelines 20141215 (1)
 
【En】line business connect operational guidelines 20141215 (1)
【En】line business connect operational guidelines 20141215 (1)【En】line business connect operational guidelines 20141215 (1)
【En】line business connect operational guidelines 20141215 (1)
 
Business plan - Mobile Payment Application
Business plan - Mobile Payment ApplicationBusiness plan - Mobile Payment Application
Business plan - Mobile Payment Application
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

Policy presentation

  • 1. Policy and Procedures of the users account • Presentation by : Hani Allehyani Ahmed Alluhaybi
  • 2. OVERVIEW 1 of 21  Introduction  Definition  What are kind of police? • Basic Principles : • General Principles :  Questions
  • 3. Introduction 2 of 21  These policies regulate the direct and indirect use of Technology resources across most companies in the world.  The success of any information security program lies in policy development
  • 4. Definition 3 of 21 The basic principles by which a company is guided.
  • 5. What are kind of polices? 4 of 21 • There are two kinds of policies • Basic Principles : • General Principles :
  • 6. Basic Principles 5 of 21 • Every user should have one identity Connect all users description by ID that has 10 number to make easy to research
  • 7. Basic Principles 6 of 21 • Every user account should be used only by the person who issued to him Not allow to any user give to another user his username and password so If the user Account is misused, the person to whom the account was issued must take sole responsibility for those actions
  • 8. Basic Principles 7 of 21 User account or email addresses shall not affect after account retirement and after 12 month If the user account retire you will lose it after 12 month. There are two main reasons for this policy . Firstly, it is a requirement for our organization membership. Secondly, experience has shown that re-using an account it means still receives lots of private newsletters and messages.
  • 9. Basic Principles 8 of 21 All accounts must adhere to the principle of least privilege The level of access to resources granted to all users Account should be commensurate with the privileges required by the owner to do his job
  • 10. Basic Principles 9 of 21 2 In our organization the password is required to at least meet the following: • At least 8 characters long • Contain at least one upper case letter and at least one lower case letter • Contain at least one number or punctuation character • Not be a dictionary word • Be less than 12 months old
  • 11. General Principles 10 of 21 semi-user accounts There are some cases in which two users have the same name Mohammed Abdullah Allehyani M a allehyani or lehyani1 continue
  • 12. General Principles : 11 of 21 How to create username A good naming convention makes it easy for users to remember their logon names continue
  • 13. General Principles 12 of 21 Signal user account All user ids should take the form Mohammed Abdullah Allehyani M a lehyani continue
  • 14. General Principles 13 of 21 semi-user accounts There are some cases in which two users have the same name Mohammed Abdullah Allehyani M a allehyani or lehyani1 continue
  • 15. General Principles 14 of 21 Service accounts Any users have Service Accounts shall have the prefix “svc”, followed by a descriptive name of the service the account relates to it . The Exchange service account would be:
  • 16. Procedures of users account 15 of Account Creation Process: If the individual is not entered into the domain within 60 days after the originally intended start date you will be lost the account . 21
  • 17. Procedures of users account 16 of Account Removal Process HR will regularly notify IT Services of changes in employee status for remove or increase the privileges it related to the status change 21
  • 18. Procedures of users account 17 of account is locked Account locked duration 10 minutes and you will remove the screen to screen saver .If you do not touch or remove (keyboard or mouse ) after this time account is locked . 21
  • 19. Procedures of users account 18 of Ports All ports like CD/DVD ,USB and FLOPY are locked except the ports connect the device like (printer, scanner , barcode……etc.) by using Trend Antiviruses programme 21
  • 20. Procedures of users account 19 of Sharing You should be chosen the username that give him permission for files, folders or drives. Do not use default shares you should be removed 21
  • 21. Procedures of users account 20 of Antivirus software Antivirus software should be updated timely in consultation with System Administrator 21
  • 22. Procedures of users account 21 of Partition Do not give others the opportunity to look over your shoulder if you are working on sensitive data 21