SlideShare uma empresa Scribd logo
1 de 6
• The account management is the control of network security when it comes to safe
guarding someone’s personal data. By employing the best practices and following the
guidelines, the risk of having security breaches can easily be minimized.
• These can be found on a network when your logging onto a workplace such as school and
you have to type in your user name and password to access it. It also used on the internet
for things like blogger, slideshare, twitter etc.
• Without this your personal areas can easily be accessed, your privacy can be viewed and
someone could publish it out for the world to see.
• This is the process of being able to identify an individual based on what there username
and there password is. This is basically make sure that the individual for the computer
there using is confirming who he or she is claiming to be, but says nothing about the
access rights for the individual.
• If this system wasn’t around then any could logon to the local network and this could lead
to pieces of information being hacked into or even being stolen
• Active Directory is a standardized and centralized system that automatically connects to
the network management which holds the users data, distributed resources and security
and this also enables interoperation with other directories. This was especially designed
for distributing over the network environment.
• Without the use of service then the data held by users or data they’ve created will not be
able to be accessed and security won’t connect instantly which make the computer
immediately vulnerable to viruses.
• DNS stands for Domain Name System. This device can be found within a
server. This piece of technology is used for managing the different names of
websites and other internet domains. This basically allows you to type names
on the internet and the computer will browse the whole internet to find the
matching address e.g. www.google.co.uk.
• Without the use of Domain Name System the internet will fail to remember
the names of web addresses and other important information and from this
the whole will be seen as useless
• http://compnetworking.about.com/od/dns_domainnamesystem/f/dns_servers.htm
• http://www.ccs.uottawa.ca/accounts/guidelines.html
• http://searchwindowsserver.techtarget.com/definition/Active-Directory

Mais conteúdo relacionado

Mais procurados

02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
Jana Baxter
 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overview
limsh
 

Mais procurados (20)

Mohamme d hamed
Mohamme d hamedMohamme d hamed
Mohamme d hamed
 
Mayed
MayedMayed
Mayed
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security Issues
 
Ict skills for teachers
Ict skills for teachersIct skills for teachers
Ict skills for teachers
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Carver-IT Security for Librarians
Carver-IT Security for LibrariansCarver-IT Security for Librarians
Carver-IT Security for Librarians
 
EAGLEYE Data Sheet
EAGLEYE Data SheetEAGLEYE Data Sheet
EAGLEYE Data Sheet
 
Dos attack
Dos attackDos attack
Dos attack
 
Presentation1
Presentation1Presentation1
Presentation1
 
Security & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts ExplainedSecurity & Compliance: Core Concepts Explained
Security & Compliance: Core Concepts Explained
 
CBSE class X Computer Applications ch 1 INTERNET
CBSE class X Computer Applications ch 1 INTERNETCBSE class X Computer Applications ch 1 INTERNET
CBSE class X Computer Applications ch 1 INTERNET
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these days
 
BAIT1103 Course Overview
BAIT1103 Course OverviewBAIT1103 Course Overview
BAIT1103 Course Overview
 
Oauth Behind The Scenes
Oauth Behind The Scenes Oauth Behind The Scenes
Oauth Behind The Scenes
 
Cis100 outline
Cis100 outlineCis100 outline
Cis100 outline
 
2° Ciclo Microsoft Fondazione CRUI 6° Seminario: Classificazione e protezion...
2° Ciclo Microsoft Fondazione CRUI  6° Seminario: Classificazione e protezion...2° Ciclo Microsoft Fondazione CRUI  6° Seminario: Classificazione e protezion...
2° Ciclo Microsoft Fondazione CRUI 6° Seminario: Classificazione e protezion...
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Logs vs Insiders
Logs vs InsidersLogs vs Insiders
Logs vs Insiders
 

Semelhante a ,Directory services

MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
missionsk81
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Nicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
Nicholas Davis
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptx
SakshiGawde6
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
jemtallon
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docx
priestmanmable
 

Semelhante a ,Directory services (20)

MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
A Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration SolutionsA Guide To Single Sign-On for IBM Collaboration Solutions
A Guide To Single Sign-On for IBM Collaboration Solutions
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Authentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.pptAuthentication Authorization-Lesson-2-Slides.ppt
Authentication Authorization-Lesson-2-Slides.ppt
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptx
 
Computer / Internet Security
Computer / Internet SecurityComputer / Internet Security
Computer / Internet Security
 
Database security
Database securityDatabase security
Database security
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
CISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security OperationsCISSP Chapter 7 - Security Operations
CISSP Chapter 7 - Security Operations
 
IT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docxIT 650 Principles of Database DesignProject Milestone – 5.docx
IT 650 Principles of Database DesignProject Milestone – 5.docx
 
Where To Start When Your Environment is Fucked
Where To Start When Your Environment is FuckedWhere To Start When Your Environment is Fucked
Where To Start When Your Environment is Fucked
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
Database Security Presentation Why database Security is important
Database Security Presentation Why database Security is importantDatabase Security Presentation Why database Security is important
Database Security Presentation Why database Security is important
 

Mais de ConnorJohnAdkins (20)

Evaluation 4
Evaluation 4Evaluation 4
Evaluation 4
 
Evaluation 4
Evaluation 4Evaluation 4
Evaluation 4
 
9 frames
9 frames9 frames
9 frames
 
5. digipak analysis
5. digipak analysis5. digipak analysis
5. digipak analysis
 
14. storyboard
14. storyboard14. storyboard
14. storyboard
 
14. storyboard
14. storyboard14. storyboard
14. storyboard
 
File services
File servicesFile services
File services
 
Telecommunication services
Telecommunication servicesTelecommunication services
Telecommunication services
 
4. record labels and permissions
4. record labels and permissions4. record labels and permissions
4. record labels and permissions
 
8. cinematography and editing for music videos
8. cinematography and editing for music videos8. cinematography and editing for music videos
8. cinematography and editing for music videos
 
File services
File servicesFile services
File services
 
6. magazine advert analysis
6. magazine advert analysis6. magazine advert analysis
6. magazine advert analysis
 
2. genre music video analysis
2. genre music video analysis2. genre music video analysis
2. genre music video analysis
 
5. digipak analysis
5. digipak analysis5. digipak analysis
5. digipak analysis
 
7. theories of production
7. theories of production7. theories of production
7. theories of production
 
7. theories of production
7. theories of production7. theories of production
7. theories of production
 
History of the cinema's technological developments
History of the cinema's technological developmentsHistory of the cinema's technological developments
History of the cinema's technological developments
 
Nine frames
Nine framesNine frames
Nine frames
 
13. mood board
13. mood board13. mood board
13. mood board
 
13. mood board
13. mood board13. mood board
13. mood board
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

,Directory services

  • 1.
  • 2. • The account management is the control of network security when it comes to safe guarding someone’s personal data. By employing the best practices and following the guidelines, the risk of having security breaches can easily be minimized. • These can be found on a network when your logging onto a workplace such as school and you have to type in your user name and password to access it. It also used on the internet for things like blogger, slideshare, twitter etc. • Without this your personal areas can easily be accessed, your privacy can be viewed and someone could publish it out for the world to see.
  • 3. • This is the process of being able to identify an individual based on what there username and there password is. This is basically make sure that the individual for the computer there using is confirming who he or she is claiming to be, but says nothing about the access rights for the individual. • If this system wasn’t around then any could logon to the local network and this could lead to pieces of information being hacked into or even being stolen
  • 4. • Active Directory is a standardized and centralized system that automatically connects to the network management which holds the users data, distributed resources and security and this also enables interoperation with other directories. This was especially designed for distributing over the network environment. • Without the use of service then the data held by users or data they’ve created will not be able to be accessed and security won’t connect instantly which make the computer immediately vulnerable to viruses.
  • 5. • DNS stands for Domain Name System. This device can be found within a server. This piece of technology is used for managing the different names of websites and other internet domains. This basically allows you to type names on the internet and the computer will browse the whole internet to find the matching address e.g. www.google.co.uk. • Without the use of Domain Name System the internet will fail to remember the names of web addresses and other important information and from this the whole will be seen as useless