Active Directory Case Study

Great Essays
Register to read the introduction… When looking at the Active Directory structure for Users and Computers, which group has the least amount of implied privileges?
Guests have the least amount of implied privileges.

7. When granting access to LAN systems for GUESTS (i.e., auditors, consultants, third-party individuals, etc.), what security controls do you recommend be implemented in order to maximize C-I-A of production systems and data?
Guest access should be limited to shared folders in order to maintain C-I-A of the LAN, they may also have a protected access to local machines, if it is not their own machine, and protected access to the internet.

8. When granting access for the Shop Floor group to the SFfiles within the SFfiles folder, what must be configured within Active Directory?
…show more content…
9. When granting access for the Human Resources group to access the HRfiles within the HRfiles folder, what must be configured within Active Directory?
That groups’ access must be limited to that particular folder, also being a human resource group, access to this groups shares must be very restricted from other groups.

10. Explain how C-I-A can be achieved down to the folder and data file access level for departments and its user’s using Active Directory and Windows Server 2008 R2 access control configurations. Configuring unique access controls for different user types is an example of what kind of access controls?
Data access controls insure that the data itself is restricted to certain users being able to read or write it. These controls are examples of data access administration, and offer unique user access controls on a user by user basis. Any access of this data can be limited and traced to whom is accessing it.

Week 1 Laboratory Part 2

Lab Part 2: Implement Access Control Lists to Secure Folders and Read/Write/Access to Files
Learning Objectives and

Related Documents

  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Additionally, when remote workers are employed by organizations it is important to provide the employee with a secure connection to the network and server. By using a VPN, the establishment of a safe connection can ensue. For example, when buying locks to keep homes or businesses safe there is a different key for every lock. This means like keys; the VPN establishes a secure connection that does not allow for intrusions to occur by using the Internet (Stewart 19). The remote connection is established by using a tunneling protocol which adds security by encrypting data.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 3 Quiz

    • 507 Words
    • 3 Pages

    1. Go to your home directory and run: Most file systems have designated directories to assign permissions or access rights to specific users. File permission controls users to view, change, navigate & execute the designated contents of the file directories. LINUX/UNIX coherently use file permission to enable access to ownership for files & directories. File permission includes rwx is for read, write, and execute permissions.…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Lab 1

    • 1712 Words
    • 7 Pages

    1. Goal Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are…

    • 1712 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Employees who require privileged access to administer devices and services on the network, should be issued a second card with separate administrative credentials. b)…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Confidentiality: Only the authorized people can access the data, no other persons cannot access the data or accounts. Integrity: only the authorized person can change the data, no other people cannot access it. Availability: The data should be available to the authorized users 24/7.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Define GPO policies to avoid user to use USB devices or cd devices ( this in order to prevent information stolen) also access based on group access as well as batch files to map drives. 3. Have in place a firewall, I would suggest a cisco firewall or zywall ( zywall is cheaper and it works great) this firewall will need to have UTM to help protect from viruses, malware and intrusions. This firewall can also to deploy VPN connection if needed 4. I remember you talking about you needed a VPN, but I would say that a Remote connection could work better.…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Case Study 1 AIT 652 Sache Bond Executive summary: Towson University is responsible for complying with both Federal and Maryland state laws. It is essential that all employees are aware that the proper procedures must be followed to ensure that the legal action remains unrevised once the legal hold notice is issued. The legal holds notice will inform all necessary employees of their new profound obligation as an employee. The notice refers you to the policy written on the legal hold notices. The guidance of the legal holds notice supersedes all other retention policy guidelines (Records).…

    • 1033 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    These information systems are: • LAN – Switches, routers and firewall • Servers -- SHGTS Microsoft Access 97 database, Remote access server (RAS) • Workstations • Communication network – Phone and IP phones • Agency data processing center including its operating systems and utilities • Tactical radio network • Shared information processing service facilities (Bowen, Hash, & Swanson, 2006). A5: IT infrastructure that includes a description of information flow JINX application server is housed in room 1234, located at the HBWC’s executive office facility. This is a Microsoft Windows NT application server that is customized to run several applications including Microsoft Access 97 database that is used specifically for SHGTS. The database tracks all data and activities related to the grant distribution, grant users access the database to complete their grant…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ans: 1-Employees have the opportunity of decision making at any specified forms like deciding the schedule for work and choosing process. 2- Rewards/ bonus should be provided which depends upon completion of a task or depends on any productive suggestion. 10-…

    • 753 Words
    • 4 Pages
    Improved Essays