It Security Essay

1433 Words Jul 5th, 2013 6 Pages
NextGard Technologies Windows Security Implementation Model
Michael White
American Public University

Author Note This paper was prepared for ISSC362 B003 Fall 12, taught by Professor Butler, William
NextGard Technologies Windows Security Implementation Model
Below are the seven areas of concentration for the focus of this essay: in section one Microsoft Windows access controls will be researched and discussed for solutions with details that are appropriate, in section two cryptography methods will be researched and detailed in order to protect the organization, in section three a plan will be devised to protect the company against malicious code and activity, in section four a plan will be implemented to monitor
…show more content…
Mandatory Access Control (MAC) – refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. Role Based Access Control (RBAC) – is an approach to restricting system access to authorized users based on specific positions within an organization (Solomon, 2011). For this company the best access control method would be groups based on roles, access control lists defined by groups, founded on the role based access control strategy with the active directory providing group access control list management. The general approach to handling keys using trusted entities and digital certificates has been formalized into a strategy called the public key infrastructure (PKI). PKI is the collection of hardware, software, policies, and procedures needed to manage digital certificates (Solomon, 2011). Having defined what a public key infrastructure is and its purpose this section will focus on the problems associated with maintaining the PKI for a large entity. The four issues addressed in this section that a large entity like Ken 7 Windows Limited are: lack of standards for

Related Documents