Create a security matrix spreadsheet and security strategy

Assignment Help Management Information Sys
Reference no: EM131502503

Assignment

Use the following scenario for the Week One through Four individual assignments:

You are the systems administrator for Cybixx, a manufacturer and distributor of vending machines. Cybixx currently has three facilities and is looking to expand to a fourth.

As a Systems administrator, you are responsible for all server hardware and software, all client desktop hardware and software, and all networking equipment. You are also responsible for the creation and maintenance of the documentation for all systems.

Cybixx current infrastructure and facilities:

Atlanta, Georgia - Headquarters. Cybixx uses a partially centralized IT infrastructure. The systems location at the Atlanta office include:

• 5 physical Windows 2012 R2 servers
• 10 HYPER-V Windows 2012 R2 hosts running 78 Windows 2012 R2 guests
• DNS Services
• DCHP Services
• Active Directory Services
• A network 20 Mbs connection to the Cybixx MPLS cloud
• A 100 Mbs internet connection
• 25 Windows 10 desktops

Boise, Idaho. Cybixx has a Distribution Center located in Boise, Idaho. The Distribution Center include:

• 2 physical Windows 2012 R2 servers for file service and printing
• 10 Windows 10 desktops
• A 10 Mbs network connection to the Cybixx MPLS cloud

Boulder, Colorado. Cybixx has a Distribution Center located in Boulder, Colorado. The Distribution Center include:

• 2 physical Windows 2012 R2 servers for file service and printing
• 10 Windows 10 desktops
• A 10 Mbps network connection to the Cybixx MPLS cloud

Future Expansion: Cybixx has purchased a building for new Distribution Center in Akron, Ohio. It is the Systems Administrator's job to extend IT services to this location and update the company's IT landscape appropriately.

Assignment:

This assignment is a continuation from the Week Four assignment.

In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and configured.

Create a security matrix spreadsheet and security strategy summary. Include the user roles and matching security rights that would be expected to be created for the Akron site. Be sure to include the following user roles, as well as any others that may be deemed necessary:

• Administrative
• Accounting
• HR
• Warehouse Manager
• Warehouse Supervisor
• Janitorial User

Your strategy will be a 1-page summary of your matrix discussing the security strategy and how it will be applied to your matrix.

Reference no: EM131502503

Questions Cloud

What is the added value of the given leadership style : What is the added value of this leadership style? What impact does this leadership style have on the organization's overall image?
What is the most obvious economic indicator : What is the most obvious economic indicator to look at to tell if a recession has been caused by an aggregate demand shock or an aggregate supply shock?
Explain apple decision and quell potential negative reaction : DISCUSSION- Compose a statement to the press to explain Apple's decision and quell potential negative reactions.
Decrease in federal government spending : Even though Federal Government spending is "counter-cyclical" why is it not necessarily the case that an improvement in the nation's economy.
Create a security matrix spreadsheet and security strategy : Create a security matrix spreadsheet and security strategy summary. Include the user roles and matching security rights that would be expected.
How many more people would be working : In 2015, approximately 59 percent of the adult population (250 million) was employed, among the lowest employment rates in 20 years.
Analyses and apply appropriate problem solving techniques : BLB10089-6 STRATEGIC MANAGEMENT ASSIGNMENT. Analyses and apply appropriate problem solving techniques plus knowledge learned to solving complex business problems
Summarize an example of an effective supervisor : Summarize an example of an effective supervisor. How does this type of supervisor contribute to employee satisfaction?
How is the firm categorizing the event : Analyze the firm's press releases regarding the announced acquisition. How is the firm categorizing the event?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Examine the potential reasons why the security risks

Suggest what you believe to be the best mitigation or defense mechanisms that would help to combat the Domain Name System Security Extensions (DNSSEC) concerns to which the article refers. Propose a plan that the U.S. government could use in order..

  Connection of corporate governance and company cybersecurity

Analyze the connection between corporate governance and a company's cybersecurity posture. Provide at least three points to justify whether or not there is an impactful relationship between corporate governance and a company's cybersecurity postur..

  Plan for entire spectrum of products

ERP and GE - companies like Johnson and Johnson or General Electric can plan for their entire spectrum of products.

  Technology in the 20th centuryprepare a 700- to 1050-word

technology in the 20th centuryprepare a 700- to 1050-word response identifying the major advances in technology that

  Ways that you believe encryption could assist

From the e-Activity and your own research, give your opinion of the two (2) most important ways that you believe encryption could assist in addressing some of the current challenges facing organizations today

  Difference between is and it issues

Two Hardware Houses have decided to merge their business. In your report, make the difference between Information Systems (IS) and Information Technology (IT) issues and how it will affect customer choice, continued patronage, brand loyalty, etc

  Discuss features of apple ipad and samsung galaxy tab

Compare and contrast the features of both the Apple iPad and the Samsung Galaxy Tab. Compare and contrast the available accessories, potential for future upgrades, warranties, and available support of both the iPad and the Galaxy Tab

  Evaluate the four risk-mitigation options and strategies

Explain how ITPM best practices can facilitate process change within an organization. Determine if ITPM would be used differently depending upon the industry in which it was used. Explain your answer.Evaluate the four risk-mitigation options and st..

  Payroll cycle- harware and software controlsin respects to

payroll cycle- harware and software controlsin respects to the payroll cycle - think of what hardware and software

  Discuss idea that applications have to visually consistent

Imagine you are the manager of a medium-sized IT department. While walking through the hall one day, you overhear a senior-level software developer telling a newly hired developer to focus on improving his coding skills rather than learning about ..

  Examine the cannibalization strategy

Examine how firms can use social IT in alignment with organizational strategy and IS strategy. Consider collaborative capabilities, what, how, and who should use social IT for a social business strategy.

  How a system could improve accuracy

How a system could improve efficiency? How a system could improve accuracy? How sales of individual items would be entered? How the database would store the data compared to the current spreadsheet method?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd