logo

System Administration Assignment

7 Pages867 Words234 Views
   

Added on  2020-10-22

System Administration Assignment

   Added on 2020-10-22

ShareRelated Documents
System administration
System Administration Assignment_1
Table of ContentsOverview..........................................................................................................................................3Objective-.........................................................................................................................................3Purpose- ..........................................................................................................................................3Policy -.............................................................................................................................................3Scope - ............................................................................................................................................4IT equipment and information access policy- .................................................................................4REFERENCES................................................................................................................................5
System Administration Assignment_2
OverviewThe acceptable usage policy is covered the security aspects and usage in the terms ofinformation and IT equipment. It can be included the internet, mobile IT equipment and emailetc. This policy is applied on the organization to their employees, agents, investors andcontractors. Each and every individual person has more responsibility to control the hardwareaccess in the organization (Dodgson, 2018). All the user has user id and password to operate ownaccount in proper manner. ObjectiveThe objectives of acceptable policy are:It has provided the consistent and rigorous protection to information system and also helpfor managed in both ways such as business policy and legal requirements.It is minimized the potential damage to the organization and IT information or equipmentbeing exposed (Koliba and et.al., 2018). It has responsibilities for individual for protecting IT and information effectively andefficiently. PurposeThe main purpose of acceptable policy that help for providing the safety and securityregarding IT equipment in the organization. Policy Acceptable policy is designed for reducing the risk of unauthorized access and data loss.Hardware system must be locked and also protected with the screen locking that help forcontrolled by using password (Huang and et.al., 2018). All enterprises regarding printed matteralways disposed with the help of confidential waste bins. Every employee has used the softwareto access the data by using the licensing agreement software. It is used the policy when theemployees are working away from the office.
System Administration Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Advanced Network Security
|6
|1027
|376

Advanced Network and Infrastructure Security: Network Security Policy, Security Policies, Network Equipment Security Guidelines
|11
|966
|122

Development of Acceptable Use Policy
|6
|1472
|95

Assignment On Data Communications And Networks
|6
|1517
|20

Security Policy Framework Document - Desklib
|14
|2582
|468

THE DEVELOPING POLICY
|6
|1084
|17