Develop procedures for changing access controls

Assignment Help Basic Computer Science
Reference no: EM132423289

Purpose

This course-wide project introduces you to a variety of tasks and skills that are required for an entry-level security administrator who is tasked with securing systems in a Microsoft Windows environment.

The following tools and resources will be needed to complete this project:

- Course textbook

- Access to the Internet

Learning Objectives and Outcomes

You will be able to:

- Describe the impact of adding Active Directory to an existing Windows network.

- Develop procedures for changing access controls.

- Develop procedures for ensuring a malware-free environment.

- Recommend Group Policy Objects for a Windows environment.

- Develop procedures for auditing security in a Windows system.

- Develop procedures for restoring a failed Windows system.

- Recommend Windows hardening techniques.

- Describe security goals and write policies for securing Windows applications.

- Ensure the integrity of all evidence collected in a Windows environment.

Overall Project Scenario

Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia.

The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25 workstation computers in the headquarters offices and main warehouse. The network uses workgroups, and users are created locally on each computer. Employees from the regional warehouses connect to the Colorado network via a virtual private network (VPN) connection.

Due to a recent security breach, Always Fresh wants to increase the overall security of its network and systems. They have chosen to use a solid multilayered defense to reduce the likelihood that an attacker will successfully compromise the company's information security. Multiple layers of defense throughout the IT infrastructure makes the process of compromising any protected resource or data more difficult than any single security control. In this way, Always Fresh protects its business by protecting its information.

Project Part 1: Active Directory Recommendations

Scenario

Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company's network.

Tasks

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

Reference no: EM132423289

Questions Cloud

How can companies deal with software or operating services : How can companies deal with software or operating services/service packs end of life pressure? How can companies grow or expand if they do not plan for future.
Analyze the factor of police negotiation during the siege : Provide a historical overview of the facts of the Branch Davidian Standoff. Analyze the factor of police negotiation during the siege.
What segment of the market is the product appealing to : What Segment of the market is the product appealing to? Could this product have an international market? What changes to the product would need to be addressed?
ENG 4 130 Research Methods Assignment : ENG 4 130 Research Methods Assignment Help and Solution - German University of Technology in Oman. Title - Application of nanotechnology in petroleum industry
Develop procedures for changing access controls : Describe the impact of adding Active Directory to an existing Windows network. Develop procedures for changing access controls.
Explain the effectiveness in our current methods of control : How as the "War on Drugs" impacted societies and the manner in which nation approaches this subject matter in a comprehensive criminal justice manner?
Background levels of these stable isotopes that occur : You collect 500 liters of water (containing its usual aquatic organisms) from near the surface of a lake, place it in a large clear plastic bag floating
Compare law in your state with laws your classmates discuss : Review the law on insanity in your state. Based upon the laws of your state, can she use an insanity defense? In your reply posts, compare and contrast the law.
Do the cells the same surface area to volume ratio : How might the surface area to bolume affect the ability of a cell to take in and use nutrients from the envirement?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd