SlideShare a Scribd company logo
Security
Management
System Administration
Ethical issues for systems and
networks administration
Invasion of Privacy
System or Network Administrators might be directed to review
browser activities and emails of employees to ensure they are
complying with Internet usage policies.
Equality in Reporting
There may be some concern with what information about an
employee’s activities should be reported. It will need to be
determined what constitutes as a serious infraction that will need
to be reported.
Sensitive Information
System or Network Administrators must be trusted to know
proprietary technologies and business practices that could be
useful to other companies. Non-disclosure agreements can provide
guidance to what information can or cannot be shared.
Legal issues for systems and
networks administration
Invasion of Privacy
“The Electronic Communications Privacy Act allows system
administrators to access a person's electronic information in the
normal course of employment, when necessary, to protect the
Integrity of computing and networking resources” of an
organization (US Department of Justice, 2013).
Intercepting Electronic Communications
Potentially violating The Wiretap Act by installing sniffer software
to monitor employee activities (i.e., pornography or music
downloads on the network), and uses or releases the information
(Cybertelecom, 2017).
Policy issues for systems and
networks administration
Security Policies
Be able to identify and prevent information from being
compromised and the abuse of business-related data, applications,
computer systems, and networks.
Acceptable Use Policies
Ensure there are proper and complete guidelines for instructing
users on acceptable and unacceptable computing usage.
Copyright and Licensing Policies
• Implement procedures to ensure software license and
copyright compliance.
• Ensure users don’t copy software unless permitted by the
licensing agreement.
• Conduct annual audits on installed software to determine
compliance.
User and Group Security
1. From the Control Panel,
click on the
Administrative Tools
icon.
2. Click on Computer
Management icon.
3. Double-click on Local
Users and Groups.
4. Expand the folders to list
the user accounts and
groups.
5. Right-click on the Users
folder, and select New
User…
6. Enter required info, and
click Create.
Using Local Users and Groups can limit
the actions that can be performed on the
computer through the assignment of
rights and permissions.
User and Group Security
1.Right-click on the
Group folder, and
select New
Group…
2.Enter a name for
the new Local
Group.
3.Members (Users)
can be assigned to
the Group.
4.Click Create.
User and Group Security
1.Right-click on a User
and select Properties
to modify.
2.General tab
1. Disable the account
2. Set password rules
3.Member Of tab
1. Assign user to group(s)
4.Profile tab
1. Set paths and Home folder
5.Right-click on Group to
set properties or assign
Members.
Implementing Virus Protection
Install and maintain current antivirus software
It is important to keep antivirus software up-to-date to protect against
new viruses which are constantly emerging.
Scan internal disk drives and external media
Complete scans should be scheduled once a week and after operating
system updates are downloaded and installed.
Block potentially dangerous attachments
Certain types of attachments should be blocked from being received via
email as they may execute a virus or malicious program that can infect
all the computers on the network.
Develop a reaction plan
• Review security bulletins and verify any warnings about new viruses.
• Block services that might be vulnerable to the virus.
• Deploy anti-virus updates as they become available.
Configuring a network-based firewall
1.Select Windows Firewall
from the Control Panel.
2.Click Advanced Settings
in the left pane.
3.Click the Inbound Rules
node from the dialog
window.
4.Scroll to find the rule
you want to modify, such
as the File and Printer
Sharing (Echo Request-
ICMPv4-In) rule
The Inbound Rules pane displays
the details of various firewall
inbound rules.
(Xvoucher, 2015)
Configuring a network-based firewall
5.Right-click the rule and
select Properties.
6.Under the General tab,
within the Action
section, select the
Block the connection
radio button.
7.Click Apply to save
changes, and then OK
to close the dialog box.
8.The rule will displays a
blocked icon.
(Xvoucher, 2015)
Configuring proxy settings
1.From the Control
Panel, select Internet
Options.
2.Under the Connections
tab, click LAN settings.
3.In the dialog box,
check Use a proxy
server for your LAN.
4.Type the address and
port of your proxy
server.
5.Click OK to close all
dialog boxes.
(Smith, 2014)
References
Cybertelecom. (2017, January 3). Wiretap Act. Retrieved from
http://www.cybertelecom.org/security/ecpaexception.ht
m
Smith, R. (2014, August 13). Network Security: Using Windows
Firewall with Advanced Security. Retrieved from
http://www.howtogeek.com/school/windows-network-
security/lesson5/all/
US Department of Justice. (2013, July 30). Electronic
Communications Privacy Act of 1986. Retrieved from
https://it.ojp.gov/PrivacyLiberty/authorities/statutes/1285
Xvoucher. (2015). CompTIA A+ Certification

More Related Content

What's hot

Security policies
Security policiesSecurity policies
Security policies
Nishant Pahad
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
Faheem Ul Hasan
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
Shafaan Khaliq Bhatti
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
Directorate of Information Security | Ditjen Aptika
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
chauhankapil
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Password policy template
Password policy templatePassword policy template
Password policy template
Jayaramachandran Rajendran
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Mohammed Adam
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Security awareness
Security awarenessSecurity awareness
Security awareness
Josh Chandler
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
Network security
Network securityNetwork security
Network security
quest university nawabshah
 
Physical Security
Physical SecurityPhysical Security
Physical Security
Kriscila Yumul
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
Spiceworks
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 

What's hot (20)

Security policies
Security policiesSecurity policies
Security policies
 
Network security
Network securityNetwork security
Network security
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Network Security
Network SecurityNetwork Security
Network Security
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Password policy template
Password policy templatePassword policy template
Password policy template
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Network Security
Network SecurityNetwork Security
Network Security
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Network security
Network securityNetwork security
Network security
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 

Viewers also liked

Stadium Security Management in Indonesia and United States: Practices and Rec...
Stadium Security Management in Indonesia and United States: Practices and Rec...Stadium Security Management in Indonesia and United States: Practices and Rec...
Stadium Security Management in Indonesia and United States: Practices and Rec...
Jason Robert K.
 
Security Management and Disaster Preparedness for Archival Collections
Security Management and Disaster Preparedness for Archival CollectionsSecurity Management and Disaster Preparedness for Archival Collections
Security Management and Disaster Preparedness for Archival Collections
Fe Angela Verzosa
 
Records Security and Disaster Management
Records Security and Disaster ManagementRecords Security and Disaster Management
Records Security and Disaster Management
Abdon Kanuti
 
Faculty evaluation
Faculty evaluationFaculty evaluation
Why is Security Management So Hard?
Why is Security Management So Hard?Why is Security Management So Hard?
Why is Security Management So Hard?
inaz2
 
Human rights.
Human rights.Human rights.
Human rights.
catalina-rotaru
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
Bradley Susser
 
Teachers‘ evaluation
Teachers‘ evaluationTeachers‘ evaluation
Teachers‘ evaluation
Hanita Adámková
 
Teacher evaluation form
Teacher evaluation formTeacher evaluation form
Teacher evaluation form
Saqib Ahmed
 
Evolution of Security Management
Evolution of Security ManagementEvolution of Security Management
Evolution of Security Management
Christophe Briguet
 
Human rights of the child
Human rights of the childHuman rights of the child
Human rights of the child
ucitlaw2011
 
Rights & Responsibilities in Aged Care
Rights & Responsibilities in Aged CareRights & Responsibilities in Aged Care
Rights & Responsibilities in Aged Care
IHNA Australia
 
Rights of refugees
Rights of refugeesRights of refugees
Rights of refugees
Md Aaquib Sahrwardi
 
Policy, Process, Procedure, Guidelines
Policy, Process, Procedure, GuidelinesPolicy, Process, Procedure, Guidelines
Presentation on human rights for disabled person
Presentation on human rights for disabled personPresentation on human rights for disabled person
Presentation on human rights for disabled person
mandy122
 
Women’s rights
Women’s rightsWomen’s rights
Women’s rights
cmfrierman
 
Women's Rights
Women's RightsWomen's Rights
Women's Rights
MrsHeller
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
Cyber law
Cyber lawCyber law

Viewers also liked (20)

Stadium Security Management in Indonesia and United States: Practices and Rec...
Stadium Security Management in Indonesia and United States: Practices and Rec...Stadium Security Management in Indonesia and United States: Practices and Rec...
Stadium Security Management in Indonesia and United States: Practices and Rec...
 
Security Management and Disaster Preparedness for Archival Collections
Security Management and Disaster Preparedness for Archival CollectionsSecurity Management and Disaster Preparedness for Archival Collections
Security Management and Disaster Preparedness for Archival Collections
 
Records Security and Disaster Management
Records Security and Disaster ManagementRecords Security and Disaster Management
Records Security and Disaster Management
 
Faculty evaluation
Faculty evaluationFaculty evaluation
Faculty evaluation
 
Why is Security Management So Hard?
Why is Security Management So Hard?Why is Security Management So Hard?
Why is Security Management So Hard?
 
Human rights.
Human rights.Human rights.
Human rights.
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
Teachers‘ evaluation
Teachers‘ evaluationTeachers‘ evaluation
Teachers‘ evaluation
 
Teacher evaluation form
Teacher evaluation formTeacher evaluation form
Teacher evaluation form
 
Evolution of Security Management
Evolution of Security ManagementEvolution of Security Management
Evolution of Security Management
 
Human rights of the child
Human rights of the childHuman rights of the child
Human rights of the child
 
Rights & Responsibilities in Aged Care
Rights & Responsibilities in Aged CareRights & Responsibilities in Aged Care
Rights & Responsibilities in Aged Care
 
Rights of refugees
Rights of refugeesRights of refugees
Rights of refugees
 
Policy, Process, Procedure, Guidelines
Policy, Process, Procedure, GuidelinesPolicy, Process, Procedure, Guidelines
Policy, Process, Procedure, Guidelines
 
Presentation on human rights for disabled person
Presentation on human rights for disabled personPresentation on human rights for disabled person
Presentation on human rights for disabled person
 
Women’s rights
Women’s rightsWomen’s rights
Women’s rights
 
Women's Rights
Women's RightsWomen's Rights
Women's Rights
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 

Similar to Security Management | System Administration

Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
backdoor
 
2 Understand what is meant by professional practice
2 Understand what is meant by professional practice2 Understand what is meant by professional practice
2 Understand what is meant by professional practice
Mark Anthony Kavanagh
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
fashiionbeutycare
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
Nikhil Pandit
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
danhaley45372
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
nephtalie
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
Kristen Wilson
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
phanleson
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
Online
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
scobycakau
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
IJCNCJournal
 
A Combination of the Intrusion Detection System and the Open-source Firewall ...
A Combination of the Intrusion Detection System and the Open-source Firewall ...A Combination of the Intrusion Detection System and the Open-source Firewall ...
A Combination of the Intrusion Detection System and the Open-source Firewall ...
IJCNCJournal
 
Total Security MAC User Guide
Total Security MAC User GuideTotal Security MAC User Guide
Total Security MAC User Guide
QUICK HEAL TECHNOLOGIES LIMITED
 
Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com  Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com
amaranthbeg147
 
Monitoring of computers
Monitoring of computers Monitoring of computers
Monitoring of computers
carlosrudy_45
 
Information security policy
Information security policyInformation security policy
Information security policy
BalachanderThilakar1
 
Rules of Behavior
Rules of BehaviorRules of Behavior
Rules of Behavior
GovCloud Network
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 

Similar to Security Management | System Administration (20)

Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
2 Understand what is meant by professional practice
2 Understand what is meant by professional practice2 Understand what is meant by professional practice
2 Understand what is meant by professional practice
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
 
A Combination of the Intrusion Detection System and the Open-source Firewall ...
A Combination of the Intrusion Detection System and the Open-source Firewall ...A Combination of the Intrusion Detection System and the Open-source Firewall ...
A Combination of the Intrusion Detection System and the Open-source Firewall ...
 
Total Security MAC User Guide
Total Security MAC User GuideTotal Security MAC User Guide
Total Security MAC User Guide
 
Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com  Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com
 
Monitoring of computers
Monitoring of computers Monitoring of computers
Monitoring of computers
 
Information security policy
Information security policyInformation security policy
Information security policy
 
Rules of Behavior
Rules of BehaviorRules of Behavior
Rules of Behavior
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 

Recently uploaded

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 

Recently uploaded (20)

HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 

Security Management | System Administration

  • 2. Ethical issues for systems and networks administration Invasion of Privacy System or Network Administrators might be directed to review browser activities and emails of employees to ensure they are complying with Internet usage policies. Equality in Reporting There may be some concern with what information about an employee’s activities should be reported. It will need to be determined what constitutes as a serious infraction that will need to be reported. Sensitive Information System or Network Administrators must be trusted to know proprietary technologies and business practices that could be useful to other companies. Non-disclosure agreements can provide guidance to what information can or cannot be shared.
  • 3. Legal issues for systems and networks administration Invasion of Privacy “The Electronic Communications Privacy Act allows system administrators to access a person's electronic information in the normal course of employment, when necessary, to protect the Integrity of computing and networking resources” of an organization (US Department of Justice, 2013). Intercepting Electronic Communications Potentially violating The Wiretap Act by installing sniffer software to monitor employee activities (i.e., pornography or music downloads on the network), and uses or releases the information (Cybertelecom, 2017).
  • 4. Policy issues for systems and networks administration Security Policies Be able to identify and prevent information from being compromised and the abuse of business-related data, applications, computer systems, and networks. Acceptable Use Policies Ensure there are proper and complete guidelines for instructing users on acceptable and unacceptable computing usage. Copyright and Licensing Policies • Implement procedures to ensure software license and copyright compliance. • Ensure users don’t copy software unless permitted by the licensing agreement. • Conduct annual audits on installed software to determine compliance.
  • 5. User and Group Security 1. From the Control Panel, click on the Administrative Tools icon. 2. Click on Computer Management icon. 3. Double-click on Local Users and Groups. 4. Expand the folders to list the user accounts and groups. 5. Right-click on the Users folder, and select New User… 6. Enter required info, and click Create. Using Local Users and Groups can limit the actions that can be performed on the computer through the assignment of rights and permissions.
  • 6. User and Group Security 1.Right-click on the Group folder, and select New Group… 2.Enter a name for the new Local Group. 3.Members (Users) can be assigned to the Group. 4.Click Create.
  • 7. User and Group Security 1.Right-click on a User and select Properties to modify. 2.General tab 1. Disable the account 2. Set password rules 3.Member Of tab 1. Assign user to group(s) 4.Profile tab 1. Set paths and Home folder 5.Right-click on Group to set properties or assign Members.
  • 8. Implementing Virus Protection Install and maintain current antivirus software It is important to keep antivirus software up-to-date to protect against new viruses which are constantly emerging. Scan internal disk drives and external media Complete scans should be scheduled once a week and after operating system updates are downloaded and installed. Block potentially dangerous attachments Certain types of attachments should be blocked from being received via email as they may execute a virus or malicious program that can infect all the computers on the network. Develop a reaction plan • Review security bulletins and verify any warnings about new viruses. • Block services that might be vulnerable to the virus. • Deploy anti-virus updates as they become available.
  • 9. Configuring a network-based firewall 1.Select Windows Firewall from the Control Panel. 2.Click Advanced Settings in the left pane. 3.Click the Inbound Rules node from the dialog window. 4.Scroll to find the rule you want to modify, such as the File and Printer Sharing (Echo Request- ICMPv4-In) rule The Inbound Rules pane displays the details of various firewall inbound rules. (Xvoucher, 2015)
  • 10. Configuring a network-based firewall 5.Right-click the rule and select Properties. 6.Under the General tab, within the Action section, select the Block the connection radio button. 7.Click Apply to save changes, and then OK to close the dialog box. 8.The rule will displays a blocked icon. (Xvoucher, 2015)
  • 11. Configuring proxy settings 1.From the Control Panel, select Internet Options. 2.Under the Connections tab, click LAN settings. 3.In the dialog box, check Use a proxy server for your LAN. 4.Type the address and port of your proxy server. 5.Click OK to close all dialog boxes. (Smith, 2014)
  • 12. References Cybertelecom. (2017, January 3). Wiretap Act. Retrieved from http://www.cybertelecom.org/security/ecpaexception.ht m Smith, R. (2014, August 13). Network Security: Using Windows Firewall with Advanced Security. Retrieved from http://www.howtogeek.com/school/windows-network- security/lesson5/all/ US Department of Justice. (2013, July 30). Electronic Communications Privacy Act of 1986. Retrieved from https://it.ojp.gov/PrivacyLiberty/authorities/statutes/1285 Xvoucher. (2015). CompTIA A+ Certification