Discuss briefly the use of inheritance blocking and forcing
Course:- Computer Network Security
Reference No.:- EM13334255

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Network Security

Eduwin College is a successful private college in the outskirts of Lonport. You are required to create an Active Directory structure for the organization based upon a single domain. The organization has three sections each of which has of twelve computers which are Languages, Technology and Business. Each section should each be given their own organizational unit (OU) and the management of the OU in respect of resetting passwords and adding users should be delegated to the appropriate member of the staff who should also be able to read all the user details. This is Francoise Lebonne (Languages), Nick Neverhere (Technology), and Alison Primm (Business). There are six other members of staff with administrative access, Peter Smith-Hampstead who manages the organization, Caroline Cotswold who is the system administrator, Dorothy Liddleton a student records administrator, Donald Truss, a support officer and Brian Bennett a clerical assistant.

You should create a Security Group for the students who will be using the classrooms and and a further Security Group for the three section managers. You will need to be able create a group policy object for each section to set the computer usage, wallpaper and software to be installed on the computers for each section. All users should have access to the V: drive which is used to store applications such as Adobe Acrobat reader.

You are required to show evidence that you can make a sample course notes file read/write for the administrative staff but read only for the students. You are required to show evidence that you can make a student records file read/write for the appropriate section manager but read only for the other section managers.

You are required to discuss briefly the use of Inheritance blocking and forcing giving at least one example each of how it could be used within the Eduwin scenario.

You are required to show evidence that you can prevent student phone numbers on the user information from being read by anyone other than Dorothy Liddleton and the appropriate section manager.

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
You will define security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and
Suppose that there is block cipher ABC that always encrypts block of b=72 bits using key of k= 60 bits. Prove that XYZ doesn't give much stronger security than ABC.
The owners of a store are looking for a lighted sign that could be mounted outside the store. The lights in the sign should be turned on when the outdoor light level falls giv
The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.
Write about computer security affects YOU at school and in your personal life. You may be surprised at how many things you do that depend on some aspects of secure computer
Provide your published (to the forum/blog) research report on the chosen topic with brief supportive descriptions about the challenges, problems, relevant technologies, appl
Details on physical security, you have to make sure you include the basics. Make sure you detail what will deter hackers from breaking in. Be sure to include your references
Describe at least two (2) types of loss that can occur that a standard homeowners insurance policy does not cover. List and examine the major challenges of enforcing policies