Hardware and Network Servicing: LO 1: Ensure User Accounts Are Controlled
Hardware and Network Servicing: LO 1: Ensure User Accounts Are Controlled
Learning Guide For Hardware and Version 1 Date: July: 2019 Page 1 of 3
Network Servicing Author: Harar Polytechnic College/ICT Department
HARAR POLYTECHNIC COLLEGE
A user account defines the actions a user can perform in Windows. On a stand-alone computer or a computer
that is a member of a workgroup, a user account establishes the privileges assigned to each user. On a computer
that is part of a network domain, a user must be a member of at least one group. The permissions and rights
granted to a group are assigned to its members. User accounts on a computer that is a member of a network
domain. You must be logged on as an administrator or a member of the Administrators group to use User
Accounts in Control Panel. User Accounts allows you to add users to your computer and to add users to a group
In Windows, permissions and user rights usually are granted to groups. By adding a user to a group, you give
the user all the permissions and user rights assigned to that group.
Authentication: The process of verifying the identity of people who are attempting to access the
network or system. This is usually the first step in gaining access to a computer system. A process of
determining what activities or access will be permitted for user. This may include access to network
resources, data and applications.
User: An individual who uses a computer system, resources or application
Strong passwords
Computer security includes the use of strong passwords for your network logon and the Administrator account
on your computer. For a password to be strong, it should: Be at least seven characters long. Because of the way
passwords are encrypted, the most secure passwords are seven or 14 characters long.
•Group Examples
Letters (uppercase and lowercase) A, B, C... (and a, b, c...)
Numerals 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Symbols (all characters not defined as letters or `~!@#$%^&*()_+-={}|[]\:";'<
numerals) >?,./
•Have at least one symbol character in the second through sixth positions.
•Be significantly different from prior passwords.
•Not contain your name or user name.
•Not be a common word or name.
Learning Guide For Hardware and Version 1 Date: July: 2019 Page 2 of 3
Network Servicing Author: Harar Polytechnic College/ICT Department
HARAR POLYTECHNIC COLLEGE
Passwords can be the weakest link in a computer security scheme. Strong passwords are important because
password cracking tools continue to improve and the computers used to crack passwords are more powerful
than ever. Network passwords that once took weeks to crack can now be cracked in hours.
Password cracking software uses one of three approaches: intelligent guessing, dictionary attacks, and
automation that tries every possible combination of characters. Given enough time, the automated method can
crack any password. However, it still can take months to crack a strong password.
Learning Guide For Hardware and Version 1 Date: July: 2019 Page 3 of 3
Network Servicing Author: Harar Polytechnic College/ICT Department