Topic > Organizational IT Security and Troubleshooting

Securing a network is a big issue for businesses because of the sensitive information that businesses work with. One of the easiest ways to protect your computer is to secure user accounts, and people must understand to never give out their passwords to anyone. Technicians may ask for a username to reset a person's password, but never provide the password. Social engineering activity has increased lately with calls from attackers claiming to be an Internet helpdesk or some sort of helpdesk. There are user authentication policies that can be created to help improve network security. There are many password policies that can be set and enforced by Windows 7 or network domain services that help ensure system security. One of the criteria to set for the password would be the password requirements for authentication. These requirements are password length, complexity, age, and password history. Password length is the minimum size of the password, for example using six or more characters, some places enforce password lengths of up to eight to thirteen characters as the minimum size and anything with fewer characters will be rejected by the system. The complexity of the password lies in the use of uppercase and lowercase letters, numbers and symbols. Most password requirements today include eight or more characters with at least one capital letter, one number, and one symbol to use. Password complexity may vary depending on your company's needs. The password age will be set to how long the password is valid. Passwords should be forcibly changed after a period of 90 days. People who do not change their password can make it easier for an attacker to gain access to the system and also… in the middle of the paper you can provide a description of the problem and steps to resolve it. Three scenarios for troubleshooting Windows 7 have been described and can be applied to troubleshooting any operating system. There are many problems that can occur with computers and other equipment such as printers, scanners and others that can be turned into scenarios to help train junior system administrators. Works Cited Dean, Tamara. (2010). Network+ Guide to networks. (p. 172). Masion, Ohio: Cengage LearningKim, D. & Solomon, M. (2012). Fundamentals of information systems security. (pp. 102) Sudbury, MA: Jones & Bartlett Learning.Schreier, Jason. (May 23, 2011). Sony estimates $171 million loss due to PSN hack. Retrieved from http://www.wired.com/gamelife/2011/05/sony-psn-hack-losses/Zacker, C. (2011). Windows 7 configuration. (pages 401-404). Danvers, MA: John Wiley & Sons, Inc.