Chapter 2.2. Social Implications for Networks Flashcards
(15 cards)
usernames
identify the user
passwords
authenticate the user
what are access rights
setup by the network administrator to give the users access to data on the network
what are permissions
used determine what the user may do with the data, there are also setup by the network administrator using the NAC settings in the server software
access rights vs permissions
a user may have access rights for a folder on the server but they may only have permission to view the files in the folder and not change them
expand NAC
network access control
define NAC
settings in network system software that the network administrator uses to set access rights and permissions for users
examples of NAC
-learners access own files on server but not other users
-used setup rules that users have to follow to create strong passwords
-user permissions and access rights are set up using NAC
6 different types of permission for files and folder
- READ: allows viewing, listing, opening and copying of files, folders and subfolders
- WRITE: allows user to add new files and make changes to files, folders and subfolders
- READ AND EXECUTE: allows viewing and listing of files, folder, subfolders as well as run program files (.exe)
- LIST FOLDER CONTENT: allows user to view and list files and folder, users not able to view the contents of the files by opening them
- MODIFY: allows user to make changes to files, folders, subfolders including deleting them
- FULL CONTROL: permits reading, writing, changing and deleting of files and folders. Has all permissions of modify but can change other user’s permissions and who owner is of the file or folder
rights of the administrator user
full control over system like network: allows them too
-install software
-manage and configure hardware
-reset user passwords
-set user permissions and access rights
-create and delete users
-full control over all files, folders and subfolders
rights of standard user
-able make changers to files, folders and subfolders according to permissions set on their user account by network administrator
-only change their password, not others
-use application software but only install software if granted permission
expand AUP
acceptable use policy
define AUP
document specifying the rules and regulations of what acceptable behaviour is for users of a company’s network. It describes what a user is allowed and not allowed to do on the network. Each user must sign this legally binding contract
examples of AUP
-network may not be used for illegal activities
-may not disrupt the security of network
-may not reveal information from company about their clients/service providers to outsiders
-restriction on what user allowed to install on network
-consequences when rules and regulations of AUP are not followed
how should the AUP be implemented
-all users made agree and sign AUP
-network administrator should setup permissions and access rights to ensure users are restricted in such a way to limit the violation of AUP
-action must taken as stipulated in AUP when rules and regulations are broken