SYSAD - Chap 2: User Management

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/56

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

57 Terms

1
New cards

User Management

- ability for administrators to manage user access to various IT resources like systems, devices, applications, storage systems, networks and more.

2
New cards

User Management

a core part to any directory service and is a basic security essential for any organizational.

3
New cards

User Management

enables admins to control user access and on-board and off board users to and from IT resources.

4
New cards

Accounting

in user management refers to the process of tracking, creating, modifying, and deleting user accounts.

5
New cards

Accounting

Key Challenges:

- Failure to remove inactive or former employee accounts can lead to security vulnerabilities.

- Managing permissions dynamically as roles change within the organization.

- Keeping track of user activity to detect unauthorized access or anomalies.

6
New cards

Accounting**

User registration:

Assigning new users with accounts and appropriate permissions based on their roles.

7
New cards

Accounting**

Account modification:

Updating user details, changing access rights, or reassigning roles.

8
New cards

Accounting**

Account termination:

Ensuring that users who leave the organization no longer have access to systems and data.

9
New cards

Comfort and Convenience

- should focus on providing a seamless and efficient experience for users.

- providing intuitive interfaces for account creation, password management, and access control settings.

10
New cards

Comfort and Convenience

Key Challenges:

- Striking a balance between security and ease of access.

- Avoiding cumbersome authentication processes that hinder productivity.

- Ensuring accessibility for users with disabilities.

11
New cards

Support Services

- involve assisting users in accessing and utilizing computer systems effectively

- requires providing robust support services to address user inquiries, troubleshoot issues, and assist with account-related tasks.

12
New cards

Support Services

Key Challenges:

- Handling large volumes of support requests efficiently.

- Balancing security while providing quick resolutions.

- Ensuring minimal downtime and disruption for users.

13
New cards

Ethical Issues

must uphold ethical standards when managing user accounts and data. Respecting privacy and promoting fairness.

14
New cards

Ethical Issues**

Privacy Protection

Ensuring that user data is not accessed or shared without proper authorization.

15
New cards

Ethical Issues**

Accountability

Ensuring administrators do not misuse their elevated privileges.

16
New cards

Ethical Issues**

Data integrity

Preventing unauthorized modifications or deletions of user data.

17
New cards

Trust Management and Security

- Establishing trust between users and the system is essential for effective user management. Users need to trust that their personal information and data are secure and protected from unauthorized access or misuse.

- Robust security measures, such as encryption, access controls, and regular security audits, are necessary to safeguard user data and maintain the integrity of the system.

18
New cards

Trust Management and Security

Key Challenges:

- Preventing unauthorized access without causing inconvenience to legitimate users.

- Identifying and mitigating insider threats.

- Responding quickly to security breaches and account compromises.

19
New cards

centralized location

Users can be registered at a _ by the system manager, and made available to all of the hosts/computers in the network

20
New cards

umbrella of the organization

it is also important for all users to be registered under the

21
New cards

Account Policy

Most organizations need a strict _for assigning accounts and opening the system for users

22
New cards

Users

are the foremost danger to a computing system

23
New cards

Policy rules

are required for guiding user behavior, and also for making system rules clear.

24
New cards

User Support Services**

Checklist

are a useful algorithmic aid to securing predictable results.

25
New cards

Greeting

1. Greeting ('How may I help you')

Problem identification

2. Identify problem

3. Refine and express the problem

4. Verify the problem

Correction

5. Propose solutions

6. Select solution

7. Execution

Verification

8. Self-check

9. User-check

Nine steps in Limoncelli's model of user assistance (Nine Step Model)

26
New cards

-> Problem identification -> Verification -> Solution ->

Nine Step Model -> Development Cycle

27
New cards

Passive and Active User

TWO TYPES OF USERS

28
New cards

Passive User

Utilize the system often minimally, quietly accepting the choices which have been made for them. They seldom place great demands on the system. They do not follow the development of the system and they are often not even aware of what files they have. They seldom make demands other than when things go wrong. Passive users can be a security risk, because they are not aware of their actions.

29
New cards

Active User

Follow every detail of system development. They frequently find every error in the system and contact system administrators frequently, demanding upgrades of their favorite programs. Active users can be of great help to a system administrator, because they test out problems and report them actively. They are an important part of the system administration team, or community, and can also go a long way to helping the passive users. An important point about active users, however, is that they are not authorized staff.

30
New cards

Killing Old Processes

Processes sometimes do not get terminated when they should.

- look for user processes which have run for more than a day.

31
New cards

Moving Users

is a straightforward operation, but it should be done with some caution.

should not be logged in while the _ is taking place, or files could be copied incorrectly.

32
New cards

Deleting old users

- Users who leave an organization eventually need to be _ from the system.

-often advisable to keep old accounts for a time in case the user actually returns,or wishes to transfer data to a new location.

- Before _ a user completely, a backup of the data can be made for safe-keeping.

33
New cards

User well-being

Contented users work well and treat the system well.

34
New cards

User well-being**

Health

Certainly every administrator needs to look after his/her own

35
New cards

Eyes should be protected**

Dust Particle and Reflection

Major Cause of eye strain

36
New cards

Back (spine)

one of the most complex and important parts of the body. It supports the upper body and head, and is attached to the brain

37
New cards

Mouse strain

strain in the tendons of the finger and forearm, which spreads to the shoulder and back and can be quite painful. It comes from using the mouse too much.

38
New cards

Pregnancy and cancer

recommend that pregnant women wear protective aprons when sitting in front of computer screens. It is unclear whether this has any real purpose, since any radiation from the screen would be easily stopped by normal clothing.

39
New cards

System Administrators Guild of Education (SAGE)

SAGE acronym

40
New cards

SAGE Code of Ethics

developed its own professional guidelines for system administrators.

41
New cards

written by Hal Miller

revised by Lee Damon

SAGE Code of Ethics

written by:

revised by:

42
New cards

The Sage code of Ethics > Original Draft

Canon 1

The integrity of a system administrator must be beyond reproach. System administrators must uphold the law and policies as established for the systems and networks they manage, and make all efforts to require the same adherence from their users

43
New cards

The Sage code of Ethics > Original Draft

Canon 2

A system administrator shall not unnecessarily infringe upon the rights of users. System administrators will not exercise their special powers to access any private information other than when necessary to their role as system managers.

44
New cards

The Sage code of Ethics > Original Draft

Canon 3

Communications of system administrators with all whom they may come in contact shall be kept to the highest standards of professional behavior.

45
New cards

The Sage code of Ethics > Original Draft

Canon 4

The continuance of professional education is critical to maintaining currency as a system administrator.

A system administrator must take an appropriate level of action to update and enhance personal technical knowledge

46
New cards

The Sage code of Ethics > Original Draft

Canon 5

A system administrator must maintain an exemplary work ethic.

System administrators must be tireless in their effort to maintain high levels of quality in their work.

47
New cards

The Sage code of Ethics > Original Draft

Canon 6

At all times, system administrators must display professionalism in the performance of their duties. All manner of behavior must reflect highly upon the profession as a whole.

48
New cards

The Sage code of Ethics > Original Draft

1. Fair Treatment

I will treat everyone fairly. I will not discriminate against anyone on grounds such as age, disability, gender, sexual orientation, religion, race, national origin, or any other non - business related issue.

49
New cards

The Sage code of Ethics > Original Draft

2. Privacy

I will only access private information on computer systems when it is necessary in the course of my duties. I will maintain and protect the confidentiality of any information to which I may have access, regardless of the method by which I came into knowledge of it. I acknowledge and will follow all relevant laws governing information privacy.

50
New cards

The Sage code of Ethics > Original Draft

3. Communication

I will keep users informed about computing matters that may affect them - such as conditions of acceptable use, sharing of common resources, maintenance of security, occurrence of system monitoring, and any relevant legal obligations.

51
New cards

The Sage code of Ethics > Original Draft

4. System Integrity

I will strive to ensure the integrity of the systems for which I have responsibility, using all appropriate means - such as regularly maintaining software and hardware; analyzing levels of system performance and activity; and, as far as possible, preventing unauthorized use or access.

52
New cards

The Sage code of Ethics > Original Draft

5. Cooperation

I will cooperate with and support my fellow computing professionals. I acknowledge the community responsibility that is fundamental to the integrity of local, national, and international network and computing resources.

53
New cards

The Sage code of Ethics > Original Draft

6. Honesty

I will be honest about my competence and will seek help when necessary. When my professional advice is sought, I will be impartial. I will avoid conflicts of interest; if they do arise I will declare them and recuse (sic) myself if necessary.

54
New cards

The Sage code of Ethics > Original Draft

7. Education

I will continue to update and enhance my technical knowledge and other work-related skills through training, study, and the sharing of information and experiences with my fellow professionals. I will help others improve their skills and understanding where my skills and experience allow me to do so.

55
New cards

The Sage code of Ethics > Original Draft

8. Social responsibility

I will continue to enlarge my understanding of the social and legal issues relating to computing environments. When appropriate, I will communicate that understanding to others and encourage the writing and adoption of policies and laws about computer systems consistent with these ethical principles.

56
New cards

The Sage code of Ethics > Original Draft

9. Quality

I will be honest about the occurrence and impact of mistakes, and where possible and appropriate I will attempt to correct them. I will strive to achieve and maintain a safe, healthy, and productive workplace.

57
New cards

The Sage code of Ethics > Original Draft

10. Ethical responsibility

I will lead by example, maintaining a consistently high ethical standard and degree of professionalism in the performance of all my duties.