SlideShare a Scribd company logo
15. Let’s say you are systems administrator for a hospital’s network. Keep in mind that as system
administrator, your job is to provide the correct level of accessibility to authorized users while
denying access to those who lack authorization. What are the top five policies that you would
implement? How would you enforce compliance with these policies? How would you educate
your users to convince them to adhere to your policies?
Solution
The policies that system administrator use to provide the correct level of accessibility to
authorized users while denying access to unauthorized users are-
1. Using antivirus software and running them regularly to protect systems from attack by
malicious softwares.
2. Using firewalls to maintain access control based on sender's and reciever's ip addresses.
3. By providing Login system policy to ensure authorized access to system by individuals (using
login ID and passwords).
4. Using high level encryption techniques to secure access of information on transit between two
users.
5. By monitoring network communication.
These policies can be enforced by system administrator by using distributed operating system.
Because DO/S works on the property of global control of all assets.
Users can be provided with individual login and password as unauthorized access may lead to
breach in security of hospital's information. As security breach in Hospital's information may
lead to adverse effects like- breach in information of patients, their diseases, medicines
prescribed and many more.

More Related Content

Similar to 15. Let’s say you are systems administrator for a hospital’s network.pdf

How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
NeilStark1
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
NeilStark1
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
NeilStark1
 
Access control policy
Access control policyAccess control policy
Access control policy
Bsmah Fahad
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
maqib8373
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
danhaley45372
 
Explanation of the most common types of technical risks
Explanation of the most common types of technical risksExplanation of the most common types of technical risks
Explanation of the most common types of technical risks
kevinmass30
 
Cyber Security Measures for LMS Platforms
Cyber Security Measures for LMS PlatformsCyber Security Measures for LMS Platforms
Cyber Security Measures for LMS Platforms
Rahul Pal
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
rahulkumarcscsf21
 
Untitled document.pdf
Untitled document.pdfUntitled document.pdf
Untitled document.pdf
google
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
Kudzi Chikwatu
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
RohitK71
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security Policies
Aamir Sohail
 
The Risks of Horizontal Privilege Escalation.pdf
The Risks of Horizontal Privilege Escalation.pdfThe Risks of Horizontal Privilege Escalation.pdf
The Risks of Horizontal Privilege Escalation.pdf
uzair
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 
WK8.pptx
WK8.pptxWK8.pptx
Network and Information security_new2.pdf
Network and Information security_new2.pdfNetwork and Information security_new2.pdf
Network and Information security_new2.pdf
AyanMujawar2
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
Kimarie Brown
 
What is Information Assurance Model in Cyber Security.pptx
What is Information Assurance Model in Cyber Security.pptxWhat is Information Assurance Model in Cyber Security.pptx
What is Information Assurance Model in Cyber Security.pptx
infosec train
 

Similar to 15. Let’s say you are systems administrator for a hospital’s network.pdf (20)

How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
Access control policy
Access control policyAccess control policy
Access control policy
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
 
Explanation of the most common types of technical risks
Explanation of the most common types of technical risksExplanation of the most common types of technical risks
Explanation of the most common types of technical risks
 
Cyber Security Measures for LMS Platforms
Cyber Security Measures for LMS PlatformsCyber Security Measures for LMS Platforms
Cyber Security Measures for LMS Platforms
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 
Untitled document.pdf
Untitled document.pdfUntitled document.pdf
Untitled document.pdf
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITYOPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security Policies
 
The Risks of Horizontal Privilege Escalation.pdf
The Risks of Horizontal Privilege Escalation.pdfThe Risks of Horizontal Privilege Escalation.pdf
The Risks of Horizontal Privilege Escalation.pdf
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Network and Information security_new2.pdf
Network and Information security_new2.pdfNetwork and Information security_new2.pdf
Network and Information security_new2.pdf
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
What is Information Assurance Model in Cyber Security.pptx
What is Information Assurance Model in Cyber Security.pptxWhat is Information Assurance Model in Cyber Security.pptx
What is Information Assurance Model in Cyber Security.pptx
 

More from infoeyecare

All fungi have tiny tube-like structures call hyphae. One is labeled .pdf
All fungi have tiny tube-like structures call hyphae. One is labeled .pdfAll fungi have tiny tube-like structures call hyphae. One is labeled .pdf
All fungi have tiny tube-like structures call hyphae. One is labeled .pdf
infoeyecare
 
What would the predicted result be if Griffith injected mice with a .pdf
What would the predicted result be if Griffith injected mice with a .pdfWhat would the predicted result be if Griffith injected mice with a .pdf
What would the predicted result be if Griffith injected mice with a .pdf
infoeyecare
 
Write a function called myfind that will search for a key in a vecto.pdf
Write a function called myfind that will search for a key in a vecto.pdfWrite a function called myfind that will search for a key in a vecto.pdf
Write a function called myfind that will search for a key in a vecto.pdf
infoeyecare
 
wright Mills proposed that sociologists could explain individual beha.pdf
wright Mills proposed that sociologists could explain individual beha.pdfwright Mills proposed that sociologists could explain individual beha.pdf
wright Mills proposed that sociologists could explain individual beha.pdf
infoeyecare
 
Why are General, Special Revenue, and other governmental (expendable).pdf
Why are General, Special Revenue, and other governmental (expendable).pdfWhy are General, Special Revenue, and other governmental (expendable).pdf
Why are General, Special Revenue, and other governmental (expendable).pdf
infoeyecare
 
Which functions of a cell membrane would be compromised if the membr.pdf
Which functions of a cell membrane would be compromised if the membr.pdfWhich functions of a cell membrane would be compromised if the membr.pdf
Which functions of a cell membrane would be compromised if the membr.pdf
infoeyecare
 
What is the state of water at 200 kPa and 250oCQuestion 7 options.pdf
What is the state of water at 200 kPa and 250oCQuestion 7 options.pdfWhat is the state of water at 200 kPa and 250oCQuestion 7 options.pdf
What is the state of water at 200 kPa and 250oCQuestion 7 options.pdf
infoeyecare
 
What is ransomware How can these cyber-attacks result in data loss.pdf
What is ransomware How can these cyber-attacks result in data loss.pdfWhat is ransomware How can these cyber-attacks result in data loss.pdf
What is ransomware How can these cyber-attacks result in data loss.pdf
infoeyecare
 
What are the 3 ways a Java method must match with its definition and.pdf
What are the 3 ways a Java method must match with its definition and.pdfWhat are the 3 ways a Java method must match with its definition and.pdf
What are the 3 ways a Java method must match with its definition and.pdf
infoeyecare
 
Using the Internet, compare and contrast two commercially available .pdf
Using the Internet, compare and contrast two commercially available .pdfUsing the Internet, compare and contrast two commercially available .pdf
Using the Internet, compare and contrast two commercially available .pdf
infoeyecare
 
uetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdf
uetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdfuetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdf
uetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdf
infoeyecare
 
The starship Epidemiology Team has cone many missions exploring the u.pdf
The starship Epidemiology Team has cone many missions exploring the u.pdfThe starship Epidemiology Team has cone many missions exploring the u.pdf
The starship Epidemiology Team has cone many missions exploring the u.pdf
infoeyecare
 
Question 3)Perform a regression analysis using compa as the depend.pdf
Question 3)Perform a regression analysis using compa as the depend.pdfQuestion 3)Perform a regression analysis using compa as the depend.pdf
Question 3)Perform a regression analysis using compa as the depend.pdf
infoeyecare
 
Problems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdf
Problems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdfProblems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdf
Problems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdf
infoeyecare
 
Only a very small percentage of organisms actually fossilize. Based o.pdf
Only a very small percentage of organisms actually fossilize. Based o.pdfOnly a very small percentage of organisms actually fossilize. Based o.pdf
Only a very small percentage of organisms actually fossilize. Based o.pdf
infoeyecare
 
package lab7; import java.util.Scanner; Sammy Student, Program.pdf
package lab7; import java.util.Scanner; Sammy Student, Program.pdfpackage lab7; import java.util.Scanner; Sammy Student, Program.pdf
package lab7; import java.util.Scanner; Sammy Student, Program.pdf
infoeyecare
 
Odin and Zeus travel to the outermost reaches of our galaxy using wa.pdf
Odin and Zeus travel to the outermost reaches of our galaxy using wa.pdfOdin and Zeus travel to the outermost reaches of our galaxy using wa.pdf
Odin and Zeus travel to the outermost reaches of our galaxy using wa.pdf
infoeyecare
 
Many new species of desert have arisen from a population which was .pdf
Many new species of desert  have arisen from a  population which was .pdfMany new species of desert  have arisen from a  population which was .pdf
Many new species of desert have arisen from a population which was .pdf
infoeyecare
 
List and analyze some of the most salient social factors of group un.pdf
List and analyze some of the most salient social factors of group un.pdfList and analyze some of the most salient social factors of group un.pdf
List and analyze some of the most salient social factors of group un.pdf
infoeyecare
 
J. A. Moore investigated the inheritance of spotting patterns in leop.pdf
J. A. Moore investigated the inheritance of spotting patterns in leop.pdfJ. A. Moore investigated the inheritance of spotting patterns in leop.pdf
J. A. Moore investigated the inheritance of spotting patterns in leop.pdf
infoeyecare
 

More from infoeyecare (20)

All fungi have tiny tube-like structures call hyphae. One is labeled .pdf
All fungi have tiny tube-like structures call hyphae. One is labeled .pdfAll fungi have tiny tube-like structures call hyphae. One is labeled .pdf
All fungi have tiny tube-like structures call hyphae. One is labeled .pdf
 
What would the predicted result be if Griffith injected mice with a .pdf
What would the predicted result be if Griffith injected mice with a .pdfWhat would the predicted result be if Griffith injected mice with a .pdf
What would the predicted result be if Griffith injected mice with a .pdf
 
Write a function called myfind that will search for a key in a vecto.pdf
Write a function called myfind that will search for a key in a vecto.pdfWrite a function called myfind that will search for a key in a vecto.pdf
Write a function called myfind that will search for a key in a vecto.pdf
 
wright Mills proposed that sociologists could explain individual beha.pdf
wright Mills proposed that sociologists could explain individual beha.pdfwright Mills proposed that sociologists could explain individual beha.pdf
wright Mills proposed that sociologists could explain individual beha.pdf
 
Why are General, Special Revenue, and other governmental (expendable).pdf
Why are General, Special Revenue, and other governmental (expendable).pdfWhy are General, Special Revenue, and other governmental (expendable).pdf
Why are General, Special Revenue, and other governmental (expendable).pdf
 
Which functions of a cell membrane would be compromised if the membr.pdf
Which functions of a cell membrane would be compromised if the membr.pdfWhich functions of a cell membrane would be compromised if the membr.pdf
Which functions of a cell membrane would be compromised if the membr.pdf
 
What is the state of water at 200 kPa and 250oCQuestion 7 options.pdf
What is the state of water at 200 kPa and 250oCQuestion 7 options.pdfWhat is the state of water at 200 kPa and 250oCQuestion 7 options.pdf
What is the state of water at 200 kPa and 250oCQuestion 7 options.pdf
 
What is ransomware How can these cyber-attacks result in data loss.pdf
What is ransomware How can these cyber-attacks result in data loss.pdfWhat is ransomware How can these cyber-attacks result in data loss.pdf
What is ransomware How can these cyber-attacks result in data loss.pdf
 
What are the 3 ways a Java method must match with its definition and.pdf
What are the 3 ways a Java method must match with its definition and.pdfWhat are the 3 ways a Java method must match with its definition and.pdf
What are the 3 ways a Java method must match with its definition and.pdf
 
Using the Internet, compare and contrast two commercially available .pdf
Using the Internet, compare and contrast two commercially available .pdfUsing the Internet, compare and contrast two commercially available .pdf
Using the Internet, compare and contrast two commercially available .pdf
 
uetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdf
uetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdfuetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdf
uetator Periodic Table Question 6 of 30 Incorrect Incorrect DA Saplin.pdf
 
The starship Epidemiology Team has cone many missions exploring the u.pdf
The starship Epidemiology Team has cone many missions exploring the u.pdfThe starship Epidemiology Team has cone many missions exploring the u.pdf
The starship Epidemiology Team has cone many missions exploring the u.pdf
 
Question 3)Perform a regression analysis using compa as the depend.pdf
Question 3)Perform a regression analysis using compa as the depend.pdfQuestion 3)Perform a regression analysis using compa as the depend.pdf
Question 3)Perform a regression analysis using compa as the depend.pdf
 
Problems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdf
Problems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdfProblems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdf
Problems in PYTHON3.5 1. Define a function sumOfDigits that has one .pdf
 
Only a very small percentage of organisms actually fossilize. Based o.pdf
Only a very small percentage of organisms actually fossilize. Based o.pdfOnly a very small percentage of organisms actually fossilize. Based o.pdf
Only a very small percentage of organisms actually fossilize. Based o.pdf
 
package lab7; import java.util.Scanner; Sammy Student, Program.pdf
package lab7; import java.util.Scanner; Sammy Student, Program.pdfpackage lab7; import java.util.Scanner; Sammy Student, Program.pdf
package lab7; import java.util.Scanner; Sammy Student, Program.pdf
 
Odin and Zeus travel to the outermost reaches of our galaxy using wa.pdf
Odin and Zeus travel to the outermost reaches of our galaxy using wa.pdfOdin and Zeus travel to the outermost reaches of our galaxy using wa.pdf
Odin and Zeus travel to the outermost reaches of our galaxy using wa.pdf
 
Many new species of desert have arisen from a population which was .pdf
Many new species of desert  have arisen from a  population which was .pdfMany new species of desert  have arisen from a  population which was .pdf
Many new species of desert have arisen from a population which was .pdf
 
List and analyze some of the most salient social factors of group un.pdf
List and analyze some of the most salient social factors of group un.pdfList and analyze some of the most salient social factors of group un.pdf
List and analyze some of the most salient social factors of group un.pdf
 
J. A. Moore investigated the inheritance of spotting patterns in leop.pdf
J. A. Moore investigated the inheritance of spotting patterns in leop.pdfJ. A. Moore investigated the inheritance of spotting patterns in leop.pdf
J. A. Moore investigated the inheritance of spotting patterns in leop.pdf
 

Recently uploaded

Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 

Recently uploaded (20)

Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 

15. Let’s say you are systems administrator for a hospital’s network.pdf

  • 1. 15. Let’s say you are systems administrator for a hospital’s network. Keep in mind that as system administrator, your job is to provide the correct level of accessibility to authorized users while denying access to those who lack authorization. What are the top five policies that you would implement? How would you enforce compliance with these policies? How would you educate your users to convince them to adhere to your policies? Solution The policies that system administrator use to provide the correct level of accessibility to authorized users while denying access to unauthorized users are- 1. Using antivirus software and running them regularly to protect systems from attack by malicious softwares. 2. Using firewalls to maintain access control based on sender's and reciever's ip addresses. 3. By providing Login system policy to ensure authorized access to system by individuals (using login ID and passwords). 4. Using high level encryption techniques to secure access of information on transit between two users. 5. By monitoring network communication. These policies can be enforced by system administrator by using distributed operating system. Because DO/S works on the property of global control of all assets. Users can be provided with individual login and password as unauthorized access may lead to breach in security of hospital's information. As security breach in Hospital's information may lead to adverse effects like- breach in information of patients, their diseases, medicines prescribed and many more.