Organizational IT Security and Troubleshooting

3141 Words7 Pages

Security of a network is a huge issue with companies due to the sensitive information that the companies work with. One of the easiest ways of security the computer is to secure user accounts and people need to understand to never give out their passwords to anyone. Techs may ask for the user name to reset a person password but never give out the password. Social engineering activity lately has been increasing with attacker calling claiming to be an internet helpdesk or some sort of helpdesk. There are user authentication policies which can be created to help improve the network security. There are many password policies which can be set and enforced by Windows 7 or the network domain services which will help ensure the system is secure. One of the policies to set for password would be password requirements for authentication. These requirements are the password length, complexity, password age, and password history. The password length is the minimum size of the password such as using six or more character, some places are enforcing password lengths up to eight to thirteen characters as a minimum size, and anything with fewer characters will be rejected by the system. The complexity of the password is using capital and lower case letters, numbers, and symbols. Most password requirements today include using eight or more characters with at least one upper case letter, number and symbol to be used. The password complexity can be different depending on the requirements of the company. The password age would be set to how long the password is good for. The passwords should be force to change after a period of time such as 90 days. People who do not change the password can make it easier for an attacker to get into a system and als...

... middle of paper ...

...ntation can be made of the problem and the steps for the fix. Three scenarios have been described on troubleshooting problems with Windows 7 and can be applied with troubleshooting any operating system. There are many problems which can happen with computers and other equipment such as printers, scanners, and others which can be turned into scenarios to help train junior system administrators.

Works Cited

Dean, Tamara. (2010). Network+ Guide to networks. (pp. 172). Masion, OH: Cengage Learning
Kim, D. & Solomon, M. (2012). Fundmentals of information system security. (pp. 102) Sudbury, MA: Jones & Bartlett Learning.
Schreier, Jason. (2011 May 23). Sony estimates $171 million loss from PSN hack. Retrieved from http://www.wired.com/gamelife/2011/05/sony-psn-hack-losses/
Zacker, C. (2011). Windows 7 configuration. (pp. 401-404). Danvers, MA: John Wiley & Sons, Inc.

More about Organizational IT Security and Troubleshooting

Open Document