User Domain Policies


Pick two best practices for User Domain Policies and explain what they are and provide examples of what could go wrong in an organization if these best practices are not followed.

Don't use plagiarized sources. Get Your Custom Essay on
User Domain Policies
Order Essay


1) APA format

2) References

3) Body Citations

4) No Plagiarism

5) 350 words

6) 2 responses (every 150 words)


ccess Control Policy

Access control is an approach that guarantees users’ identity and that they are authorized to access the organizations’ data and information. Johnson and Merkow (2010) believe that the access control policy summarizes the controls on physical access to the information system and software to limit unauthorized access to sensitive data and computer networks.

The policy ensures that the users have only access to what they require to perform their daily activities.  According to Peltier (2016), this will define clearly that they should do the work that they have been scheduled for. Any additional activities that are not authorized should be considered against the user domain policy.

2.  Password Policy

Peltier (2016) defines a password policy as a set of rules and regulations that administrators develop to strengthen computer security by promoting the proper use of strong passwords. A password policy is mainly an official rule of a business that is taught as an aspect of security awareness training. Johnson and Merkow (2010) suggest that password policies enable users to establish the configuration, as well as the complexity of the appropriate passwords to apply in computer software.

Business leaders can either develop advanced policies or utilize the present policies to fulfill organizational needs and requirements. Johnson and Merkow (2010) suggest that this will ensure that the users have their login credentials and that they do not share them with anyone else. Also, it will maintain the security of the domain, preventing access to other user’s information.

If access control and password policies are not followed in an organization, then there could be no data or information security in the organization.


Humans are considered as the weakest link in IT security and hence they should follow implemented security practices to minimize threats to the organizations. Two of those security practices are

Password practices – According to a study conducted by the Ponemon Institute, negligent employees are the number one reason for data breaches accounting to 24% (Ekran, 2020). Not having strong or unique passwords coupled with the increase in the Internet of Things (IoT) is a recipe for disaster. Password protection is also a security issue. If the employees carelessly leave their passwords on a keyboard by simply writing them on a sticky note can lead to cybersecurity incidents. Hence, employees should make sure to have strong passwords on every device they use inside the organization and should also store them securely.

Access control practices – Maintaining adequate physical security should be a top priority for every organization. Unauthorized physical access can lead to data theft and theft of property including hard drives or USB sticks. Hence, organizations should implement access control practices to keep employees from accessing areas they are not supposed to. Enforcing the use of smart cards, fobs, password-protected computers and networks are some of the forms of access control practices.

Grand Paper Writers
Order NOW For A 10% Discount!
Pages (550 words)
Approximate price: -

Our Advantages

Plagiarism Free Papers

All papers are written by the best professional writers to ensure 100% originality. We always provide plagiarism reports whenever we deliver completed papers.

Free Revisions

All papers by Grand Paper Writers are completed and submitted on time. This timely delivery of papers gives you time to go through the paper before the official deadline.


As an additional service, we will provide a title page that precedes the contents of your paper. Here, you will provide your personal details.


We also ensure that we provide an extra page for the references or bibliographies following referencing rules.

Originality & Security

At, we guarantee students for the provision of security and original work. All your personal information is handled with confidentiality and is not shared with third parties. Additionally, we ensure that we provide original content with accompanying plagiarism reports to show originality.

24/7 Customer Support

Our customer support team is always available 24/7 to provide instant responses to any queries raised by students.

Try it now!

Calculate the price of your order

We'll send you the first draft for approval by at
Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services has the best professional essay writers for quality services.


Flexible Pricing

Here, a, we do not compromise on the time of our clients. We always deliver all completed papers on or before the deadlines.


Admission Help & Client-Writer Contact provides an interactive portal where students can communicate directly to their writers.


Paper Submission

Here, a, we do not compromise on the time of our clients. We always deliver all completed papers on or before the deadlines.


Customer Feedback appreciates feedback from our clients to help us improve the delivery of essay writing services. As such, we are constantly changing our policies to ensure maximum customer and writer satisfaction.