How can dynamic access control benefit the organization

Assignment Help Computer Network Security
Reference no: EM132020782

Windows Network Services Proposal

Overview
Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assignment is meant for students to enhance their mastery of the material and to provide a creative and realistic way in which to apply knowledge from this course.

Scenario
International Marketing, Inc. (referred to as "IMI") has hired you as an IT consultant for their Windows network services infrastructure. IMIis a new advertising firm, and they have hired staff, are established in two locations, and have a need to get their internal IT services configured. They have an IT staff, but they do not have the in-house expertise to address their current infrastructure needs.

You are required to supply IMIwith a solution which addresses the integration and configuration of their Active Directory updates. Cost is not a significant concern - IMIwishes to implement the "right" solution to address their acquisition of a new company and its Active Directory forest which is comprised of a single domain. More specifically, IMIis based out of Houston, TX and they have a Windows Server 2012 domain that is operating at the Windows Server 2012 functional level. They recently acquired Media Guru Group which is based out of Richmond, VA, which has a domain (running Windows Server 2008 domain controllers) operating at the Windows Server 2003 functional level.

There are several details about IMIwhich will have an impact on your proposal:
- IMIhas restructured their organization they have a total of 110 employees in their Houston and Richmond sites. Each location the following departments:
- IMIwill have two sites, one in Houston, TX, and one in Richmond, VA.
- Executives (9 total with 5 in Houston, 4 in Richmond) - manage and run the company
- Accounts and Sales Department (30 employees with 15 in Houston and 15 in Richmond) - perform market research and maintain accounts
- Creative, Media and Production Department (49 employees in Houston) - advertising
- Human Resources and Finances (12 employees in Houston) - perform HR and financial duties
- IT (10 employees with 5 in Houston and 5 in Richmond) - manage IT for the company
- Networking equipment is already in place for both sites, which are separate Active Directory Domains.
- Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.
- Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see the company's financial details). Your team may make assumptions about how data should be shared or kept private.
- Assumptions can be made regarding any information not included here; all assumptions should be identified, however.

Assignment Requirements

There are specific requirements for the assignment: The final submission should contain at least 8 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 12 pages' worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 12 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required.
- At least one diagram must be included (not counted towards the minimum length described above); this could be a diagram describing Active Directory components, DHCP/DNS design, or anything else that is worth displaying graphically to enhance the reader's understanding of the proposal. Additional diagrams, images, or tables are welcome.
- The submission must cover all of the major topics outlined in the Topics to Cover section. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. Additional topics may be covered as desired.
- The structure of the final submission is flexible; however, it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the topics required, as well as a summary.
- At least two non-textbook, non-LabSim, non-Wikipedia reference is required; preferably, this would be a "best practice" guide or similar content from Microsoft or an experienced provider of Microsoft solutions.
- Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. It is expected that you are already familiar with UMUC's "Policy on Academic Dishonesty and Plagiarism." It is available in the Academic Policies section of the Syllabus; there are also links in the Webliography. In its simplest form, if you are using text from a source, you must cite and/or quote it. If plagiarism is found, then there will be a penalty to the grade.

Topics to Cover
Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.

Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2012 operating system should be used for all aspects of the solution.

The topics include:
Active Directory Infrastructure
- Describe features of Windows Server 2012 that will allow IMIto integrate the newly acquired company's domain into their existing forest.
- How will Forest Functional Levels be implemented?
- How will cross-forest trusts be implemented?
- How will replication be handled?
- Read-Only Domain Controllers - how will they be used?

File and Storage Solutions
- Will BranchCache be used? Why/Why not?
- How can Dynamic Access Control benefit the organization?
- What about storage optimization?

Disaster Recovery
- How can Windows Server Backup be utilized?
- Will the organization use Volume Shadow Copies?

DNS and DHCP
- How had DHCP installation and authorization been implemented?
- DHCP scope design (e.g., lease times, number of scopes, address range)
- Will a form of DHCP fault tolerance be implemented?
- Will DHCP reservations be used for servers?
- How can IPAM be utilized?
- How will IPv6 be utilized?
- How will DNS be implemented?
- DNS Security
- How will DNS be handled for the second site?

High Availability
- What implementation of Hyper-V would benefit IMI?
- Network Load Balancing
- Failover Clustering

Active Directory Certificate Services
- Will AD Certificate Services used in both domains need to be modified?

Active Directory Rights Management Services
- What use of AD Rights Management Services can be implemented?

Active Directory Federation Services
- AD Federation Services

Verified Expert

" IMI has a merger of its own business with a newly acquired firm. Both of them uses Windows server implementations using active directory. Their own site has more updated Windows server infrastructure and active directory forest. However, the newly acquired site runs on Windows server 2008. The report covers the integration of the active directory structure to meet their business requirements. It also covers how to deal with other related AD services."

Reference no: EM132020782

Questions Cloud

Computers in the teaching and learning process : What are the advantages and disadvantages of computers in the teaching and learning process?
Discuss the measures of central tendency or variability : Simply reporting measures of central tendency or measures of variability will not tell the whole story. Using the following information.
Define a niche market : Define a niche market and what makes it so. Explain the segmentation strategy implemented by this organization.
Retain and attract great employees : If you were in charge of a business, what paid-time-off benefits would you implement to help retain and attract great employees?
How can dynamic access control benefit the organization : You are required to supply IMIwith a solution which addresses the integration and configuration of their Active Directory updates
Compute the price of the bond : Weber Company issues bonds with a face value of $300,000 that pay 10 percent interest, semiannually. Compute the price of the bond
Tactical and medium term : Design decisions are usually strategic and long term, while planning decisions are tactical and medium term, and execution and control are operational and short
Describe in detail the positioning strategy : Based on what you see here, what are the strengths and weaknesses of each of these groups? Explain your reasoning.
Making decisions under conditions of uncertainty : Explain how a manager might deal with making decisions under conditions of uncertainty.

Reviews

urv2020782

12/10/2018 12:50:03 AM

This assignment was pending with me from the last one week and I was confused that whether I should go for online services. All of a sudden I saw the discount offers on your website and posted the requirement without any second thought. I received HD grades in the work and hence suggested your services to everyone in my circle.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd