Discuss briefly the use of inheritance blocking and forcing
Course:- Computer Network Security
Reference No.:- EM13334255

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Network Security

Eduwin College is a successful private college in the outskirts of Lonport. You are required to create an Active Directory structure for the organization based upon a single domain. The organization has three sections each of which has of twelve computers which are Languages, Technology and Business. Each section should each be given their own organizational unit (OU) and the management of the OU in respect of resetting passwords and adding users should be delegated to the appropriate member of the staff who should also be able to read all the user details. This is Francoise Lebonne (Languages), Nick Neverhere (Technology), and Alison Primm (Business). There are six other members of staff with administrative access, Peter Smith-Hampstead who manages the organization, Caroline Cotswold who is the system administrator, Dorothy Liddleton a student records administrator, Donald Truss, a support officer and Brian Bennett a clerical assistant.

You should create a Security Group for the students who will be using the classrooms and and a further Security Group for the three section managers. You will need to be able create a group policy object for each section to set the computer usage, wallpaper and software to be installed on the computers for each section. All users should have access to the V: drive which is used to store applications such as Adobe Acrobat reader.

You are required to show evidence that you can make a sample course notes file read/write for the administrative staff but read only for the students. You are required to show evidence that you can make a student records file read/write for the appropriate section manager but read only for the other section managers.

You are required to discuss briefly the use of Inheritance blocking and forcing giving at least one example each of how it could be used within the Eduwin scenario.

You are required to show evidence that you can prevent student phone numbers on the user information from being read by anyone other than Dorothy Liddleton and the appropriate section manager.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Also, don't forget to keep up with references to include on the powerpoint. note: I'm a member in group of the persons .My part is 6 slides.So. the slides must just have inf
ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics. The inform
IT409 IT Security and Policies Assignment. Describe each of the six stages of the employee life cycle using your own words. Define and provide examples for the following using
Write the Access Control Policy section of the Information Security Policy. Include the User enrollment, Identification, Authentication, Privileged and special account access
Your goal is to identify the potential threats to a bank using mobile technology and rank them in terms of risk. To calculate risk, you will need to rank each threat in term
Analyze and recommend two antivirus solutions that can be used on all 3 operating systems. Compare and contrast the features of each product, and make a recommendation about
If this message is sent unencrypted and successfully received, determine its entropy? If this message is encrypted with DES using random 56-bit key, determine the encrypted m
Investigate the development on massive MIMO technology and prepare a brief report of around 1400 words. Your references may come from websites, white papers, government docu