Accounts are used to ensure that a particular person has certain access to a
system. On computers like Windows 98, accounts can be used so that each
person can control her display settings, background picture, and so forth. On network
operating systems like Windows 2000, accounts are used to control access
to files and folders on the hard disk as well as specify which programs and network
resources can be accessed. In addition, other types of accounts exist, such as
accounts used on the Internet. E-mail accounts allow you to access your e-mail
from your Internet Service Provider’s mail server, while Internet connection
accounts are used to access the Internet itself.
Sharing accounts is a major security risk for both home users and businesses.
By sharing accounts, you allow others to access your personal information,
desktop settings, files on a network, or other resources. If the information they
acquire includes your employee number, address, financial records, or other information
you assumed was secure, then the damage could be significant. By
acquiring the power of your account, another person has the ability to access data
that might enable them to steal your identity.
NOTE:
The identity of a user on a network or the Internet is based upon who
has access to the account. If more than one person is using your e-mail,
Web site accounts, or other accounts, distinguishing you from others is
almost always impossible. Such power allows others to send e-mail in
your name, apply for credit online, and perform other tasks that can
damage your credit and reputation.
No comments:
Post a Comment