0% found this document useful (0 votes)
43 views

Hardware and Network Servicing: LO 1: Ensure User Accounts Are Controlled

This document provides learning materials on controlling user accounts and establishing strong passwords from Harar Polytechnic College. It discusses setting up user accounts in Windows to control access and assign permissions through group memberships. It also outlines best practices for strong passwords, recommending they be at least seven characters using a combination of letters, numbers, and symbols, and not containing personal information. Monitoring and controlling user accounts and passwords are important aspects of system and network security.

Uploaded by

Sami Nur
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Hardware and Network Servicing: LO 1: Ensure User Accounts Are Controlled

This document provides learning materials on controlling user accounts and establishing strong passwords from Harar Polytechnic College. It discusses setting up user accounts in Windows to control access and assign permissions through group memberships. It also outlines best practices for strong passwords, recommending they be at least seven characters using a combination of letters, numbers, and symbols, and not containing personal information. Monitoring and controlling user accounts and passwords are important aspects of system and network security.

Uploaded by

Sami Nur
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

HARAR POLYTECHNIC COLLEGE

Hardware and Network Servicing

NTQF Level III

Unit of Competence: Monitor and Administer System and


Network Security
Module Title: Monitoring and Administer System
and Network Security
LG Code: ICT HNS3 M05 LO1-8
TTLM Code: ICT HNS3 TTLM 0719v1

LO 1: Ensure User Accounts are


controlled
Monitor and Administer System and Network Security

Learning Guide For Hardware and Version 1 Date: July: 2019 Page 1 of 3
Network Servicing Author: Harar Polytechnic College/ICT Department
HARAR POLYTECHNIC COLLEGE

Information Sheet 1 Control User Accounts

A user account defines the actions a user can perform in Windows. On a stand-alone computer or a computer
that is a member of a workgroup, a user account establishes the privileges assigned to each user. On a computer
that is part of a network domain, a user must be a member of at least one group. The permissions and rights
granted to a group are assigned to its members. User accounts on a computer that is a member of a network
domain. You must be logged on as an administrator or a member of the Administrators group to use User
Accounts in Control Panel. User Accounts allows you to add users to your computer and to add users to a group
In Windows, permissions and user rights usually are granted to groups. By adding a user to a group, you give
the user all the permissions and user rights assigned to that group.

Authentication: The process of verifying the identity of people who are attempting to access the
network or system. This is usually the first step in gaining access to a computer system. A process of
determining what activities or access will be permitted for user. This may include access to network
resources, data and applications.
User: An individual who uses a computer system, resources or application

Strong passwords

Computer security includes the use of strong passwords for your network logon and the Administrator account
on your computer. For a password to be strong, it should: Be at least seven characters long. Because of the way
passwords are encrypted, the most secure passwords are seven or 14 characters long.

Contain characters from each of the following three groups:

•Group Examples
Letters (uppercase and lowercase) A, B, C... (and a, b, c...)
Numerals 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Symbols (all characters not defined as letters or `~!@#$%^&*()_+-={}|[]\:";'<
numerals) >?,./
•Have at least one symbol character in the second through sixth positions.
•Be significantly different from prior passwords.
•Not contain your name or user name.
•Not be a common word or name.

Learning Guide For Hardware and Version 1 Date: July: 2019 Page 2 of 3
Network Servicing Author: Harar Polytechnic College/ICT Department
HARAR POLYTECHNIC COLLEGE

Passwords can be the weakest link in a computer security scheme. Strong passwords are important because
password cracking tools continue to improve and the computers used to crack passwords are more powerful
than ever. Network passwords that once took weeks to crack can now be cracked in hours.

Password cracking software uses one of three approaches: intelligent guessing, dictionary attacks, and
automation that tries every possible combination of characters. Given enough time, the automated method can
crack any password. However, it still can take months to crack a strong password.

Learning Guide For Hardware and Version 1 Date: July: 2019 Page 3 of 3
Network Servicing Author: Harar Polytechnic College/ICT Department

You might also like