1/56
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
User Management
- ability for administrators to manage user access to various IT resources like systems, devices, applications, storage systems, networks and more.
User Management
a core part to any directory service and is a basic security essential for any organizational.
User Management
enables admins to control user access and on-board and off board users to and from IT resources.
Accounting
in user management refers to the process of tracking, creating, modifying, and deleting user accounts.
Accounting
Key Challenges:
- Failure to remove inactive or former employee accounts can lead to security vulnerabilities.
- Managing permissions dynamically as roles change within the organization.
- Keeping track of user activity to detect unauthorized access or anomalies.
Accounting**
User registration:
Assigning new users with accounts and appropriate permissions based on their roles.
Accounting**
Account modification:
Updating user details, changing access rights, or reassigning roles.
Accounting**
Account termination:
Ensuring that users who leave the organization no longer have access to systems and data.
Comfort and Convenience
- should focus on providing a seamless and efficient experience for users.
- providing intuitive interfaces for account creation, password management, and access control settings.
Comfort and Convenience
Key Challenges:
- Striking a balance between security and ease of access.
- Avoiding cumbersome authentication processes that hinder productivity.
- Ensuring accessibility for users with disabilities.
Support Services
- involve assisting users in accessing and utilizing computer systems effectively
- requires providing robust support services to address user inquiries, troubleshoot issues, and assist with account-related tasks.
Support Services
Key Challenges:
- Handling large volumes of support requests efficiently.
- Balancing security while providing quick resolutions.
- Ensuring minimal downtime and disruption for users.
Ethical Issues
must uphold ethical standards when managing user accounts and data. Respecting privacy and promoting fairness.
Ethical Issues**
Privacy Protection
Ensuring that user data is not accessed or shared without proper authorization.
Ethical Issues**
Accountability
Ensuring administrators do not misuse their elevated privileges.
Ethical Issues**
Data integrity
Preventing unauthorized modifications or deletions of user data.
Trust Management and Security
- Establishing trust between users and the system is essential for effective user management. Users need to trust that their personal information and data are secure and protected from unauthorized access or misuse.
- Robust security measures, such as encryption, access controls, and regular security audits, are necessary to safeguard user data and maintain the integrity of the system.
Trust Management and Security
Key Challenges:
- Preventing unauthorized access without causing inconvenience to legitimate users.
- Identifying and mitigating insider threats.
- Responding quickly to security breaches and account compromises.
centralized location
Users can be registered at a _ by the system manager, and made available to all of the hosts/computers in the network
umbrella of the organization
it is also important for all users to be registered under the
Account Policy
Most organizations need a strict _for assigning accounts and opening the system for users
Users
are the foremost danger to a computing system
Policy rules
are required for guiding user behavior, and also for making system rules clear.
User Support Services**
Checklist
are a useful algorithmic aid to securing predictable results.
Greeting
1. Greeting ('How may I help you')
Problem identification
2. Identify problem
3. Refine and express the problem
4. Verify the problem
Correction
5. Propose solutions
6. Select solution
7. Execution
Verification
8. Self-check
9. User-check
Nine steps in Limoncelli's model of user assistance (Nine Step Model)
-> Problem identification -> Verification -> Solution ->
Nine Step Model -> Development Cycle
Passive and Active User
TWO TYPES OF USERS
Passive User
Utilize the system often minimally, quietly accepting the choices which have been made for them. They seldom place great demands on the system. They do not follow the development of the system and they are often not even aware of what files they have. They seldom make demands other than when things go wrong. Passive users can be a security risk, because they are not aware of their actions.
Active User
Follow every detail of system development. They frequently find every error in the system and contact system administrators frequently, demanding upgrades of their favorite programs. Active users can be of great help to a system administrator, because they test out problems and report them actively. They are an important part of the system administration team, or community, and can also go a long way to helping the passive users. An important point about active users, however, is that they are not authorized staff.
Killing Old Processes
Processes sometimes do not get terminated when they should.
- look for user processes which have run for more than a day.
Moving Users
is a straightforward operation, but it should be done with some caution.
should not be logged in while the _ is taking place, or files could be copied incorrectly.
Deleting old users
- Users who leave an organization eventually need to be _ from the system.
-often advisable to keep old accounts for a time in case the user actually returns,or wishes to transfer data to a new location.
- Before _ a user completely, a backup of the data can be made for safe-keeping.
User well-being
Contented users work well and treat the system well.
User well-being**
Health
Certainly every administrator needs to look after his/her own
Eyes should be protected**
Dust Particle and Reflection
Major Cause of eye strain
Back (spine)
one of the most complex and important parts of the body. It supports the upper body and head, and is attached to the brain
Mouse strain
strain in the tendons of the finger and forearm, which spreads to the shoulder and back and can be quite painful. It comes from using the mouse too much.
Pregnancy and cancer
recommend that pregnant women wear protective aprons when sitting in front of computer screens. It is unclear whether this has any real purpose, since any radiation from the screen would be easily stopped by normal clothing.
System Administrators Guild of Education (SAGE)
SAGE acronym
SAGE Code of Ethics
developed its own professional guidelines for system administrators.
written by Hal Miller
revised by Lee Damon
SAGE Code of Ethics
written by:
revised by:
The Sage code of Ethics > Original Draft
Canon 1
The integrity of a system administrator must be beyond reproach. System administrators must uphold the law and policies as established for the systems and networks they manage, and make all efforts to require the same adherence from their users
The Sage code of Ethics > Original Draft
Canon 2
A system administrator shall not unnecessarily infringe upon the rights of users. System administrators will not exercise their special powers to access any private information other than when necessary to their role as system managers.
The Sage code of Ethics > Original Draft
Canon 3
Communications of system administrators with all whom they may come in contact shall be kept to the highest standards of professional behavior.
The Sage code of Ethics > Original Draft
Canon 4
The continuance of professional education is critical to maintaining currency as a system administrator.
A system administrator must take an appropriate level of action to update and enhance personal technical knowledge
The Sage code of Ethics > Original Draft
Canon 5
A system administrator must maintain an exemplary work ethic.
System administrators must be tireless in their effort to maintain high levels of quality in their work.
The Sage code of Ethics > Original Draft
Canon 6
At all times, system administrators must display professionalism in the performance of their duties. All manner of behavior must reflect highly upon the profession as a whole.
The Sage code of Ethics > Original Draft
1. Fair Treatment
I will treat everyone fairly. I will not discriminate against anyone on grounds such as age, disability, gender, sexual orientation, religion, race, national origin, or any other non - business related issue.
The Sage code of Ethics > Original Draft
2. Privacy
I will only access private information on computer systems when it is necessary in the course of my duties. I will maintain and protect the confidentiality of any information to which I may have access, regardless of the method by which I came into knowledge of it. I acknowledge and will follow all relevant laws governing information privacy.
The Sage code of Ethics > Original Draft
3. Communication
I will keep users informed about computing matters that may affect them - such as conditions of acceptable use, sharing of common resources, maintenance of security, occurrence of system monitoring, and any relevant legal obligations.
The Sage code of Ethics > Original Draft
4. System Integrity
I will strive to ensure the integrity of the systems for which I have responsibility, using all appropriate means - such as regularly maintaining software and hardware; analyzing levels of system performance and activity; and, as far as possible, preventing unauthorized use or access.
The Sage code of Ethics > Original Draft
5. Cooperation
I will cooperate with and support my fellow computing professionals. I acknowledge the community responsibility that is fundamental to the integrity of local, national, and international network and computing resources.
The Sage code of Ethics > Original Draft
6. Honesty
I will be honest about my competence and will seek help when necessary. When my professional advice is sought, I will be impartial. I will avoid conflicts of interest; if they do arise I will declare them and recuse (sic) myself if necessary.
The Sage code of Ethics > Original Draft
7. Education
I will continue to update and enhance my technical knowledge and other work-related skills through training, study, and the sharing of information and experiences with my fellow professionals. I will help others improve their skills and understanding where my skills and experience allow me to do so.
The Sage code of Ethics > Original Draft
8. Social responsibility
I will continue to enlarge my understanding of the social and legal issues relating to computing environments. When appropriate, I will communicate that understanding to others and encourage the writing and adoption of policies and laws about computer systems consistent with these ethical principles.
The Sage code of Ethics > Original Draft
9. Quality
I will be honest about the occurrence and impact of mistakes, and where possible and appropriate I will attempt to correct them. I will strive to achieve and maintain a safe, healthy, and productive workplace.
The Sage code of Ethics > Original Draft
10. Ethical responsibility
I will lead by example, maintaining a consistently high ethical standard and degree of professionalism in the performance of all my duties.