What permissions would you give each type of worker and why

Assignment Help Computer Engineering
Reference no: EM131886022

Discussion

Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Clear and specific policies coupled with technology can secure your network. There must be a balance between tight security and the ability of users to have access to resources to perform their job duties. Discuss each of the following scenarios:

• Imagine you are an information technology (IT) manager at the organization that you chose for your project. List as many different kinds of users as you can think of who would need access to the organization's servers to perform their jobs. What permissions would you give each type of worker and why?

• Suppose a worker in your organization frequently forgets his or her password, attempts to use obvious passwords, reuses old passwords, and sometimes gets locked out of the system for failed log-in attempts. How would you deal with such a user? What organizational policies should be in place for handling user behaviors of this kind?

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening.

Reference no: EM131886022

Questions Cloud

Discuss the extend database functionality and reliability : Select at least three considerations that would enable organization to extend database functionality and reliability and enhance data transaction performance.
How will you communicate the need for change : How will you communicate the need for change with your team, while addressing the team members' diverse needs?
Describe the two most common alternate work schedules : What are the basic concepts discussed in goal theory. Describe the two most common alternate work schedules.
Speculate the data exchange and data management trends : Speculate the data exchange and data management trends that may take place in the next five to 10 years. Justify your response.
What permissions would you give each type of worker and why : Imagine you are an information technology (IT) manager at the organization. What permissions would you give each type of worker and why?
How could the cyber crime have been avoided : In your opinion, how could the cyber crime have been avoided? How would you conduct the forensics investigation for this cyber crime?
How to appropriately document the process : It is important to understand the target business process and how to appropriately document the process and the design for the solution.
Explain the linkage between each takeaway : Identify two to three (2-3) takeaways that you have learned or gained from the course learning activities. Explain the linkage between each takeaway.
Define protected health information : You have been invited to do a presentation to the laboratory department regarding Health Insurance Portability and Accountability Act (HIPAA) compliance.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd