Describe the use of windows security groups

Assignment Help Management Information Sys
Reference no: EM131541749 , Length: 5

Assignment : Secure Intranet Portal Login

Background:

You are the security professional for a medium-sized manufacturing company. The organization would like to deploy a secure portal for in-house use only. The portal will be available from the company's intranet.

The company is utilizing a Microsoft Internet Information Services (IIS) server to run the local intranet website. The portal will be created by in-house programming staff utilizing ASP.NET technology and scripting.

The management requires the login to be protected using Hypertext Transfer Protocol Secure (HTTPS). In addition, the management would like to use an integrated login so that users do not have to remember or create a separate username or password for this portal login. The company is using a Windows Server 2012 Active Directory infrastructure.

All users logging on to the portal also have existing active directory user accounts. The company also has an in-house Windows Server that serves as a local certificate authority for other existing web applications and services.

Tasks:

Create a 4- to 5-page report that will be shared with the company's board of directors, providing guidance and recommendations on how to best secure the web portal. Your report should cover the following aspects:

Describe what Windows-integrated authentication is and how it could potentially be used to provide secure access control to the portal.

Describe the use of Windows security groups and explain how a connection to active directory could be performed using the existing technology (existing IIS server and Windows Server 2012 Active Directory).

Describe how Windows certificate services work. Recommend a solution that would utilize the in-house Windows certificate authority server to provide a certificate to the new portal.

Explain how users can connect and log on to the portal in a secure fashion using secured socket layer (SSL) or HTTPS to ensure that all login credentials and activities on the portal are secure and encrypted.

Ensure that you write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.

Reference no: EM131541749

Questions Cloud

Summarize the recruitment strategies that you will employ : Summarize the recruitment strategies (if any) that you will employ. (how do you plan on retaining employees, benefits, flexible hours???)
Determine types of inventories companies currently manage : Determine the types of inventories these companies currently manage and describe their essential inventory characteristics.
Write the dml script to insert three test records : Write the DML script to insert 3 test records in each of the tables in the system. This data will be necessary to write the queries in the next assignment.
How do you advise howard mcdonald : How do you advise him? You should master chapter 4 of the text -- but also do some internet research on this question.
Describe the use of windows security groups : Describe the use of Windows security groups and explain how a connection to active directory could be performed using the existing technology.
How is the word myth used popularly : What are the most common mythological themes across different cultures? Why do myths from different cultures around the world address such similar.
Assess the likelihood of occurrence : Assess the likelihood of occurrence, potential impact to the organization if it did occur, and based on these two factors, an overall risk level.
Was pettits behavior unprofessional or immoral : Analyze the questions associated with your chosen case study and discuss them using concepts you learned in course. Explain your rationale for each of your
What did you learn about the nazi party : This documentary explains how the art world was attacked during the rise of the Third Reich. What did you learn about the Nazi party

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd