User Account Control Policy
Although the goal of establishing the LSS network is to increase the accessibility of its programs and services, it is not intended to be used by everyone. Accessibility often comes as an expense of increased level of security; and security often comes as an expense of increased accessibility . In this case, LSS’ user account control policy aims to strike the perfect balance between security and accessibility. Users are given privileges in the form of codes before they can create an account and access and customize said account in the future. This allows the network system manager to moderate who gets to access and use the network and not.
Acceptable use Control Policy
It shall be made clear that the network and its resources should only be used for processes and actions that are in line with the goals and objectives of the organization (i.e. LSS). As the network systems management for LSS, the organization must set proper expectations when it comes to the acceptable use of the network and communicate those expectations to the end users and network administrators. Part of the acceptable use policy includes the prohibition of any use of fraudulent, obscene, harassing, and threatening materials. This policy is done to keep a high level of professionalism in LSS. All forms of use that are in line with the goals and objectives of the organization that at the same time do not violate the prohibitions stated above may well be considered as acceptable use. The network systems manager reserves the right to actively forbid any activities that violate these two criteria.
Database Access Control Policy
LSS’ database access control policy is similar to the user account control policy in that it only allows users who have been given special privileges by the network system manager. It is important to remember that not all users who have an account in the system or network get to access the database. This is a privilege only given to individuals who are required to work with the network system manager or have special concerns with some of the information stored in the database.
References
Al Ameen, M., Jingwei, L., & Kwak, K. (2012). Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications. Journal of Medical Systems.
Hyojoon, K., & Feamster, N. (2013). Improving Network Management with Software Defined Networking. Communications Magazine.