Discuss briefly the use of inheritance blocking and forcing
Course:- Computer Network Security
Reference No.:- EM13334255

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Network Security

Eduwin College is a successful private college in the outskirts of Lonport. You are required to create an Active Directory structure for the organization based upon a single domain. The organization has three sections each of which has of twelve computers which are Languages, Technology and Business. Each section should each be given their own organizational unit (OU) and the management of the OU in respect of resetting passwords and adding users should be delegated to the appropriate member of the staff who should also be able to read all the user details. This is Francoise Lebonne (Languages), Nick Neverhere (Technology), and Alison Primm (Business). There are six other members of staff with administrative access, Peter Smith-Hampstead who manages the organization, Caroline Cotswold who is the system administrator, Dorothy Liddleton a student records administrator, Donald Truss, a support officer and Brian Bennett a clerical assistant.

You should create a Security Group for the students who will be using the classrooms and and a further Security Group for the three section managers. You will need to be able create a group policy object for each section to set the computer usage, wallpaper and software to be installed on the computers for each section. All users should have access to the V: drive which is used to store applications such as Adobe Acrobat reader.

You are required to show evidence that you can make a sample course notes file read/write for the administrative staff but read only for the students. You are required to show evidence that you can make a student records file read/write for the appropriate section manager but read only for the other section managers.

You are required to discuss briefly the use of Inheritance blocking and forcing giving at least one example each of how it could be used within the Eduwin scenario.

You are required to show evidence that you can prevent student phone numbers on the user information from being read by anyone other than Dorothy Liddleton and the appropriate section manager.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Brief introduction to the topic, stating clearly the name and credentials of the presenter and brief overview of what the lecture was about and then setting out the inter
Every organization must create a cybersecurity profile (system security plan (SSP)) for all of its major and minor information systems. The cybersecurity profile documents t
Identify the three different kinds of access control, which one most resembles a Windows OS environment, military. What are the three authentication factors. Provide an exampl
You have probably received some form of information security education, either in your workplace, school, or other settings. Discuss a situation where you received security
Suppose you worked for a Canadian base company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered?
Compare and contrast the identified uses of the wireless network chosen by you with the other one, out of the ones mentioned above. Explain how RFID tags might be used in co
What type of application is being communicated? How do you know? What type of tool would be used to obtain the information above? Was the entire transaction completed? How do
Be sure to list your two required references at the end of your post. References must be in APA citation format. Answer the following questions below must be a minimum of 30