Premium Essay

Is3340 Unit 1

In: Computers and Technology

Submitted By rhanke
Words 430
Pages 2
Unit 1 Assignment1: Adding Active Directory
Robert Hanke
ITT Tech
IS3340 Windows Security
Dr. Joseph Martinez
3/27/14

Unit 1 Assignment1: Adding Active Directory
Currently, system administrators create Ken 7 users in each computer where users need access. In the Active Directory, the system admins will create Organizational Groups (OU). These OU’s can then can have restriction or Group Policy Objects (GPOs) put in to place that will restrict what a user can and can’t access. An organizational unit is the smallest scope or unit to which you can assign Group Policy settings or delegate administrative authority. Using organizational units, you can create containers within a domain that represent the hierarchical, logical structures within your organization. You can then manage the configuration and use of accounts and resources based on your organizational model (techNet, 2005).
With the users assigned to group accounts or OU’s, you can use to assign a set of permissions and rights to multiple users simultaneously, along with making any changes that are needed to individual users. Computer accounts provide a means for authenticating and auditing computer access to the network and to domain resources. Each computer account must be unique.
Once the conversion has taken place, the local users on the client computer will not be affected during domain join. They can still logon on the local machine. Meanwhile, on domain controllers, during the Active Directory Installation, local accounts in the registry-based SAM database are migrated to Active Directory; the existing SAM is deleted; and a new, smaller registry-based SAM is created.
Within the AD policy, the admin can adjust different polices that allows for users to have different access while on the same network, but also have different controls at different local machines. This is done by security polices and…...

Similar Documents

Free Essay

Unit 2 Assignment 1

...IS3340-WINDOWS SECURITY | Recommendations for Access Controls | Unit 2 Assignment 1 | | [Type the author name] | 4/3/2014 | | Access Control is the defined as “the selective restriction of access to a place or other resource”, in the RFC 4949. “The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.” Simply put the ability to read, write, modify, or deleting information or files is what Access Control is. It is more than this, in the permissions (authorization) granted to each Security Group or Individual User. The permissions mentioned in the previous paragraph are rights that a user is allowed to access, create, modify, or delete the file(s) inside a file folder, or objects. These are all permissions (authorizations) controlled by the Authorized Windows Security Personnel of the file structure. We will list some examples of how this outlined and what the impact would be, but first understand that requirements for the permissions is controlled from the Group Level, other than by Individual User, because it is easier to control from a security standpoint when you want to modify these abilities. There are four folders created (D:\ERPdocuments, D:\ERPdocuments\HRfiles, D:\ERPdocuments\SFfiles, D:\ERPdocuments\MGRfiles) which we want to allow specific permissions for certain functions (tasks). For example; by modifying the permissions under the specific user account for HRmanager to include...

Words: 436 - Pages: 2

Free Essay

Unit 3 Assignment 1

...IS3340-WINDOWS SECURITY | Encryption and BitLocker Activity | Unit 3 Assignment 1 | | | 5/1/2014 | | 1. One of the shop floor computers that is connected to your network is commonly used by the floor manager. You want the floor manager’s files to be encrypted on that computer. Although the floor manager’s documents folder is on a central server, there are some local temporary files that could contain sensitive information and should be encrypted at all times. Which Windows encryption feature would best provide encryption for all of the floor manager’s local files while leaving other users’ files unencrypted? Folder Encryption: EFS 2. The human resource (HR) manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data and the name of the spreadsheet does not change. Which Windows encryption feature would ensure this one file is always stored on the disk in encrypted format? File Encryption: EFS 3. The chief executive officer (CEO) wants to copy confidential sales projection information from her workstation to her laptop via a universal serial bus (USB) device. What is the best option to ensure the confidential information is secure during the copying process? BitLocker To Go 4. You want to encrypt your main file server’s disk that stores confidential information for several users. Which Windows encryption feature encrypts an entire disk and is not......

Words: 294 - Pages: 2

Premium Essay

Unit 4 Assignment 1

...IS3340-WINDOWS SECURITY | Auditing Tools for Windows System | Unit 4 Assignment 1 | | | 5/1/2014 | | 1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2008 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been installed. Which tool would be the best choice?. MBSA command line interface 2. You like the way MBSA presents scan results but you need to scan for vulnerabilities in older Windows products, including Microsoft Office 2000. Which tool provides extended scanning and the ability to use MBSA to view scan reports? Security Configuration and Analysis (SCA) 3. Your organization wants to encourage its employees and contractors to use vulnerability scanners at home as well as at work. You want to select a single vendor that can provide scanner software products for home and enterprise computers. A single vendor product line can streamline coordinating and analyzing scan results from many different computers. Which set of tools would be the best choice? Secunia Security Analyzers 4. You have developed several templates that consist of security settings for several types of computers, including desktop workstations, laptops, and various servers. You want to quickly compare a computer’s settings to its corresponding template to see if......

Words: 271 - Pages: 2

Premium Essay

Unit 6 Assignment 1

...IS3340-WINDOWS SECURITY | Minimizing Recovery Time Strategies | Unit 6 Assignment 1 | | | 5/5/2014 | | This document outlines the required steps to follow, in-order to properly scan the necessary servers and workstations in the Ken 7 Windows Limited Domain for security vulnerabilities. 1) Acquire and install MBSA(Microsoft Baseline Security Anaylizer) •Download MBSA. Download MBSA from the MBSA home page, and then install it to the default directory. •Updates for MBSA. If both the computer you will be scanning and the computer with MBSA installed have Internet access, the latest security catalog (.cab file), authentication files, and WUA installer files will be automatically downloaded, if needed. If either the target computer or the computer with MBSA installed does not have Internet access, download the following files and place them in the C:\Documents and Settings\<username>\Local Settings\Application Data\Microsoft\MBSA\2.0\Cache\ directory on the computer that is performing the scan. 2) Scan computers Run MBSA and clear the Check for security updates check box when performing the scan. Using the Graphical Interface Tool The following procedure describes how to use the MBSA GUI tool. To use the MBSA GUI tool to scan for updates and patches 1. On the Programs menu, click Microsoft Baseline Security Analyzer. 2. Click Scan a computer. 3. Make sure that the following options are not selected, and then click Start scan. *......

Words: 487 - Pages: 2

Free Essay

Is3340 Lab 1

...Lab 1 Worksheet 1. Active Directory and the configuration of access controls achieve C-I-A for folders and data because it controls who can access certain files and folders. This keeps the data confidential since only authorized users can access the files as well as keeping the integrity of the data as it is not able to be modified by unauthorized users. It also meets the accessibility requirements of C-I-A since the authorized users are able to access the resource through proper configuration of the Active Directory Domain Services. 2. It is not a good practice to include the user name in the password since authentication protocols may only transmit the password in cipher text but the user name as plain text, this makes it easy to intercept a user name and if that user name is part of the password, it makes it that much easier to break. 3. Password length and complexity requirements will ensure users are forced to have strong passwords to their accounts and password length and history will ensure the passwords are changed in reasonable increments of time as well as not being able to use the same password when a password change is required. 4. No, a user outside of the domain cannot access a shared drive within a domain. 5. Yes, a prompt requesting login credentials will appear when attempting to access a shared drive. 6. By default, the guests group has the least amount of implied privileges within the Active Directory structure. 7. Implementing controls...

Words: 407 - Pages: 2

Free Essay

The a-1 Unit

... The A-1 Unit* I.Time Context: Months after the operation of the A-1 unit of a popular government agency II. Viewpoint Consultant III. Statement of the Problem * A-1 was not a formally established staff. * The allegiance of the members towards the A-1 unit. * Group complaints about the heavy workload/multitasking * Alex Marasigan and Tino Torres do not contribute their fair share of the task. * The unclear assignment between the mother unit and the A-1 unit. * Agency’s concern seemed emphasized mostly to production and less to people. * Muñoz doesn’t want them to see him as a pushy and domineering head. IV. Objectives * Whether to design the A-1 unit with permanent staff. * Whether another training seminar is necessary to recruit more members to the A-1 workforce. * Whether another refreshing course is necessary to put Marasigan, Torres, and the rest of the members back on track. * Whether the A-1 unit be treated and defined to have an independent power and authority with respect to personnel concerns. V. Areas of Consideration * Understaffed and overload of assignment * Group complaints about the heavy workload, bottlenecks, and prioritization of assignments that the staff receives both from the respective home bases and the A-1. * Ambiguity to distinguish leader’s power and authority. VI. Alternative Courses of Action * Establish A-1’s staff; Hire new employees and conduct training seminars that is necessary for......

Words: 520 - Pages: 3

Premium Essay

Unit 1

...Edexcel BTEC Level 3 Subsidiary Diploma in Business Unit 2:Start date:Deadline date:Assessment feedback will be provided by:Assessor: | Business Resources | Unit Code:QCF Level 3:Credit Value:Guided Learning hours: | D/502/5409BTEC National1060 | Assignment 1 – ‘Human Resources’Purpose Learning OutcomesAfter completing this unit, you should: * Know how human resources are managed * know the purpose of managing physical and technological resources * Know how to access sources of finance * Be able to interpret financial statements.You are applying for a customer service job at the Tesco store in Ilkley. | Task 1Tesco are currently employing customer service staff for the store in Ilkley. Describe the recruitment documents Tesco should use. * Briefly describe what the recruitment process is. * Describe what a job advert is and how it is used at Tesco. * Describe what a job description is and how it is used at Tesco s. * Describe what a person specification is and how it is used at Tesco * Describe what an application form is and how it is used at Tesco. * Produce a Job description for the customer service job at Tesco * Produce a Person specification for the customer service job at Tesco (This provides evidence for P1) | Task 2You decided to apply for the position of customer service assistant at Tesco in Ilkley and have been short listed to attend an interview for the job vacancy. You take......

Words: 842 - Pages: 4

Free Essay

Is3340 Unit 6 Assignment 1

... IS3340 Unit 6 Assignment 1 1. How much data has been modified between the last backup and the time of failure? No data should have been lost since nothing was change since the last backup and the backup would have been completed before the error occurred. 2. What images are necessary to recover the workstation? The images that are necessary would be the reimaging image along with the latest back up image available. 3. What are the steps necessary to fix the problem that cause the data loss? Verify what caused the loss by reading the logs. Determine the fix for the issue. Reimage the computer. Restore the computer to last backup state and disable the issue that caused the data loss. 4. What steps should Ken 7 take to avoid a reoccurrence of this issue in the future? Read the logs to find out what caused the issue that caused the data lose.   Right a procedure guide to prevent the issue from occurring. Alert users of the occurrence of the issue and the way to prevent the issue. (Soloman, 2001) Procedure Guide: 1. Read logs to decide what cause the issue to occur. 2. Re-Image the computer to default configuration. 3. Restore to first available backup of the system. Restore Process: 1. Right-click on your Computer desktop icon (or click Start and right-click on the Computer tab on the right pane of the menu). 2. Click on Properties. 3. Locate the System protection tab in the System Properties menu. 4. Select the hard disk that......

Words: 393 - Pages: 2

Free Essay

Unit 1

...Unit 1- Introduction to Business Ethics Unit 1– Individual Project American Intercontinental University BUSN 310-1102B-03 Electronic Business Instructor June Cohen 06/06/2011 Abstract When a product is broken or not in working order, it can be irrationally hazardous to the consumer, when it has a inclination or a weakness to cause bodily harm beyond the contemplated by regular user. With the problem arises of a broken or not working product, the legal agent is a abrasion if it is the shortest route and in the natural form and unending sequence produces or donate substantially to generate such injury. (La Mance, Ken 1999-2011) With petition involving allegation of a broken or not in a working condition, irrationally hazardous products, the corporations or companies may be accountable even though the individual may locate it repeatedly for all acceptable care in the design manufacture and sale of the product in question. (La Mance, Ken 1999-2011) When an individual, homeowner, apartment managers, online shopping etc need to find a qualify contractor visit Angie List. This website has a lot of creditable, honest and it back up with Angie. All the date of website is all certified, they have complaint resolution team. (Angie List, 2009) A defective product can be broken or not in a working order. The defective product can have lead paint on it. A defective product can range from VCR, CD Player, Stereo, Refrigerator, Stove, Microwave, etc. A......

Words: 386 - Pages: 2

Premium Essay

Unit 1

...NT-1110 Unit 1 Assignment 1: Research and explain the basic components of a PC. Gilberto Canto Motherboard: Sometimes alternatively known as the mainboard, system board, planar board or logic board or colloquially, a mobo) is the main printed circuit board (PCB) found in computers and other expandable systems. It holds many of the crucial electronic components of the system, such as the central processing unit (CPU) and memory, and provides connectors for other peripherals. Motherboard specifically refers to a PCB with expansion capability and as the name suggests, this board is the "mother" of all components attached to it, which often include sound cards, video cards, network cards, hard drives, or other forms of persistent storage; TV tuner cards, cards providing extra USB or FireWire slots and a variety of other custom components. The motherboard is the core of the system. It really is the PC; everything else is connected to it, and it controls everything in the system. Central Processing Unit (CPU): Is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions. The term has been used in the computer industry at least since the early 1960s.Traditionally, the term "CPU" refers to......

Words: 1814 - Pages: 8

Premium Essay

Is3340 Unit 4 Assignment 1

...Identifying Types of Malware Infection 1) You notice that your computer is getting slower each day. You have terminated unneeded programs, disabled unneeded services, and have recently defragmented the disks. Your computer has plenty of memory but it still seems slow. Since it only started getting slow within the last two weeks, you suspect a malware attack. You have carefully examined each of the programs running but there are no unusual programs. However, you do notice that there is substantial disk activity, even when no programs are running that should be using the disk. What kind of malware do you think is present in your computer? Rootkit and likely another type of malware – Closing all programs and still seeing disk usage would suggest that a rootkit has installed and is actively hiding the actual program running. The rootkit would hide the program while a virus or worm is likely behind the scenes wreaking havoc. 2) You download a new program to display the current weather on your desktop. Since you installed the weather application you noticed a lot of network activity and your computer is getting slow. When you terminate the weather application your computer speeds up. What kind of malware do you think is present in your computer? Trojan Horse – Acting as a useful program, it actually infects and runs amuck inside of the pc and network. 3) Within a week after ordering a new widescreen television (TV) from an online retailer, you start getting many......

Words: 407 - Pages: 2

Premium Essay

Unit 1

...Unit 1 Strategy Unit 1 Strategy Bailey Nelson MT460 Bailey Nelson MT460 A business strategy means the company is set out to achieve its desired objectives. It can simply be described as a long-term business planning. Typically a business strategy will cover a period of about 3-5 years but can sometimes even be longer. Strategic management is a three-tier process involving corporate, business, and functional-level planners, and support personnel. At each progressively lower level, strategic activities were shown to be more specific, narrow, short term, and action oriented, with lower risks but fewer opportunities for dramatic impact. Having a business strategy is very important for a business to run smoothly. As a company, management needs to know what direction they want to go in and then have a plan on how they are going to get there. (http://businesscasestudies.co.uk/business-theory/strategy/business-strategy.html) Long-term objectives are “the results that an organization seeks over a multiyear period. Such objectives typically involve some or all of the following areas: profitability, return on investment, competitive position, technological leadership, productivity, employee relations, public responsibility, and employee development.” This is very important for a business to have so that they know what direction they need to go in when making decisions. Having an objective can give the company an idea on what the need to invest in at each point in time......

Words: 435 - Pages: 2

Premium Essay

Unit 1

...OBED OWUSU UNIT 2 PASS 1 Introduction: in this assignment I am going to explain the recruitment process and documentation and what they are used for. Recruitment is the process which in businesses use to obtain selected candidate for a job vacancy. This process helps businesses to pick the suitable people that match their specifications. There are 4 main types of documentation that are included in the recruitment process job description person specification application form legal contract Job description: is a document that states the initial role of the job that is being advertised which allows the person to know what they are applying for and be prepared for their interview. A job description typically outlines the necessary skills, training, required job hours and education needed by a potential employee. It states out the duties and responsibilities of the job. The use of job description helps an organization to understand the experience and skill needed to enhance the success of the company. It is used in many stages in the recruitment process, in the advert and interviews. Person specification: is a document that allows employers to know whether applicants are worth interviewing because they state the essential and desirable requirements which Skills experience Educations qualification Experience Special knowledge In most cases person specification can be shown up with job description in an advert. It allows the candidate...

Words: 374 - Pages: 2

Premium Essay

Unit 1

...BTEC Business Unit 3: Financial Forecasting for Business Learner Name: | Centre Number: 23168 | BTEC Business | | Learner No: | | UNIT NUMBER AND TITLE: | Unit 3: Financial Forecasting for Business | ISSUE DATE: | | HAND IN DATE: | | RESUBMISSION DATE: | | ASSESSOR: | | Aims The aim of this unit is to enable you to understand the financial aspects of running a business. You will do this through looking at the key concepts used by businesses to manage their money, and forecast their finances for the future. Money is at the heart of business. It is likely to be the main reason why a business was created and for it continuing to trade. This unit looks at the financial aspects of running a business. Work covered You will: * Know about costs, revenue and profit in a business organisation * Be able to prepare a break even analysis * Be able to create a cash flow forecast Know about costs, revenue and profit in a business organisation Business costs: costs incurred at start up; operating costs (fixed, indirect, variable, direct costs, total costs) Revenue: sources of revenue e.g. sales, leasing interest; calculating total revenue (unit sales price x number of units sold) Calculating gross and net profit: revenue (income) minus costs (expenditure), cost of sales, expenses (operating costs); maximising profits (increasing revenue Be able to prepare a break-even analysis Break even: balancing costs or......

Words: 2413 - Pages: 10

Premium Essay

Unit 1

...computer. The Operating System (OS) is the most essential software on the computer. The OS manages the hardware and software. The Operating System gives direct access to the storage, central processing unit (CPU), and memory, so that different programs can work properly. Without the OS the Computer will operate properly. The operating system determines what your computer can or cannot actually do because each OS has different features, options, applications, compatibilities and even the user interface may change. My current computer has Windows 8.1 as the operating system. Within Windows 8.1 the user interface is much different than the previous Windows 7. After, the first initial installation of Windows 8 certain programs did not work and had to be updated in order to be compatible with the system, even though they originally worked in Windows 7. On important change in Windows 8.1 has two different environments. One is the start screen with the tiles and the other is the old desktop screen. Both environments are easy to use but the desktop version is most common. In Windows 8.1 the search option is a great new attribute in the start screen environment. The Central Processing Unit (CPU) is one of the main parts of the computer, which is used for processing. The Central Processing Unit is known as the processor. The processor speed is measured by gigahertz (Ghz). Hertz is the measure of the amount of frequency, which is how often something occurs in a certain amount of......

Words: 888 - Pages: 4