Author: Neftaly Malatjie

  • 114046 LG 1.9 LEVEL OF ACCESS AND CATEGORIES OF USERS

    User roles are a means of controlling user access to the LAN network. A user role is a property of a user account. Each user role grants a different set of permissions. More specifically, a user role defines:

    • Theresources that a user can manage. User roles define the types of resources, or objects, that a user can manage.
    • Thetasks that a user can perform

    A role defines the type of objects that a user can manage, permission and the tasks that a user can perform on those object types. A role does not define the set of specific, existing objects that the user can access.

    Permissions enable you to fine-tune your network security by controlling access to specific network resources, such as files or printers, for individual users or groups.

    Permission

    Abbreviation

    What the User Can Do

    Read

    R

    The user can open and read the file.

    Write

    W

    The user can open and write to the file.

    Execute

    X

    The user can run the file.

    Delete

    D

    The user can delete the file.

    Change

    P

    The user can change the permissions for the file.

    Take Ownership

    O

    The user can take ownership of the file.


  • 114046 LG 1.8 INTRODUCTION

    Protection of enterprise data assets is best controlled through granular identity-based access control policy enforcement – before, during, and after a user is granted access to the network. Critical data resides in multiple places and is accessed by various users in different locations, so having per-user, location-independent policies is essential. Additionally, persistent access control policy enforcement should prevent unauthorized users from even “seeing” network, system and application resources for which they should not be accessing.

    Effective access control policy enforcement goes beyond the point at which a user connects to the network and continues to validate access is appropriate and authorized.

    Additionally, integrating access control policy decisions with policy enforcement eases administration and complexity compared to approaches that rely on managed switches or other third party devices for policy enforcement and threat containment. 

  • 114046 LG 1.7 SESSION 1: MANAGEMENT OF ACCESS TO A LAN

    On completion of this section you will be able to explain the management of access to a local area computer network. 

    1. The explanation identifies resources whose access can be managed. 
    2. The explanation outlines the level of access for different categories of people. 
    3. The explanation outlines methods of controlling access. 
    4. The explanation outlines the purpose of an access audit trail. 
  • 114046 LG 1.6 HOW YOU WILL BE ASSESSED

    This programme has been aligned to registered unit standards.  You will be assessed against the outcomes of the unit standards by completing a knowledge assignment that covers the essential embedded knowledge stipulated in the unit standards.  When you are assessed as competent against the unit standards, you will receive a certificate of competence and be awarded 4 credits towards a National Qualification.

     

     

     

    Prescribed Learning

    Material / Text Book

    Author

    Publisher

    Supplier

    Price

    per book/ per page

    (Vat excluded)


     

     

  • 114046 SA 1.1 Question 1

    Question 1 (SO 2, AC 1, AC 2, AC 3)

    You are required to visit an organisation which uses LAN computer network. Answer the following based on the organisation:

    1. Describe the business conducted by the organisation.       (2 marks)
    2. Identify examples of individuals or group that are classified as:
    • Users
    • Operator
    • Administrator       (6 marks)
    • Explain the level of access for the above categories       (6 marks)
    1. Interview different categories of people and identify the types of viruses that affect the organisation’s LAN computer network.        (6 marks)

    Research and report on the various ways used by the organisation to prevent, detect and eradicate viruses.