Preview

Hollis IS3230 Unit 3 Lab3

Good Essays
Open Document
Open Document
766 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hollis IS3230 Unit 3 Lab3
Lab Assessment Questions and Answers

1. What is the Data Classification Standard used in the U.S. Department of Defense (DoD)/Military?Google “Data Classification Standard + DoD”. Summarize the different data classifications.

Top Secret- The highest security level. Information is classified Top Secret if unauthorized disclosure would cause "exceptionally grave damage" to national security

Secret- This is the second-highest classification. Information is classified Secret when its unauthorized disclosure would cause "serious damage" to national security. Most information that is classified is held at the secret sensitivity.

Confidential- This is the lowest classification level of information obtained by the government. It is defined as information that would "damage" national security if publicly disclosed, again, without the proper authorization.

Public Trust- Certain positions which require access to sensitive information, but not information which is classified, must obtain this designation through a background check. Public Trust Positions can either be moderate-risk or high-risk.

Unclassified- Is not actually a classification level, it is the lack of classification level. It is used for information that the government has not classified under the security classification system

2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.

Create a new domain wide GPO and enable "Deny logon locally" user right to the source domain user accounts and disable multiple logon. Teach strong password use and force change through Password GPO.

3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?

List Folder/Read Data, Read Attributes, Read Extended Attributes, Create Files/Write Data, Create Folders/Append Data, Write Attributes, Write Extended Attributes, Read Permissions,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The term confidentiality means whatever information you give will not be shared or passed on.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    6. Enabling Store Passwords Using Reversible Encryption determines whether Windows stores passwords using reversible encryption. Enabling this is essentially the same as storing passwords in plain text which is insecure and not recommended.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    7. In terms of file or directory permissions, what does U-G-O stand for? User Group Other What are the 3 permission that can be given to a file or directory? r=read w=write x=execute…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    4. What is a recommended best practice when implementing a Remote Access Policy server user authentication service?…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    You will learn how to determine the impact of a data classification standard on an organization's IT infrastructure.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    The benefits of Data classification policy, is it can reduce costs and administration overhead. It helps business discover what data they hold, where it’s located, and who can have access to it and how long it must be retained, as well as what level of protection it should receive and what type of media it should be retained to meet legal and regulatory requirements. Data classification is something that should be well planned especially when working with large amounts of data and be able to discover them.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    and configure role-based access permissions and controls on objects and folders in a Windows Server 2003…

    • 477 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    (TCO 1) Each _____ has one or more access control entries (ACEs) that state which objects have permissions to the file or folder and what permissions they have.…

    • 2202 Words
    • 36 Pages
    Satisfactory Essays
  • Satisfactory Essays

    groups that suited the requirements in the scenario. Finally, you applied those security groups to the folder…

    • 336 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The CIA refers to the triad of three concepts included in the information sharing and communication within and outside the organizations. this CIA is the short term for the Confidentiality, integrity and Availability. these three concept are also the three properties of the CIA. the confidentiality is actually related with the fact that any piece of information that is an importance resource of the organization like one of its trade secret or any of the reason behind its competitive advantage should not be leaked out of the company in an unethical or corruptive manner. the information must be tried to keep safe with high responsibility and importance must be given to protection of confidentiality. the integrity refers to the moral values in…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Clearance Info

    • 8089 Words
    • 33 Pages

    The Defense Industrial Security Clearance Office (DISCO) is part of the Defense Security Service (DSS), an…

    • 8089 Words
    • 33 Pages
    Powerful Essays
  • Best Essays

    Trade Secrets

    • 2228 Words
    • 9 Pages

    * The information must be secret (i.e. it is not generally known among, or readily accessible to, circles that normally deal with the kind of information in question).…

    • 2228 Words
    • 9 Pages
    Best Essays
  • Powerful Essays

    sgbrsgsr

    • 7754 Words
    • 50 Pages

    NOTES FOR THE TEACHER CHAPTER 2: SECTORS OF THE INDIAN ECONOMY An economy is best understood when we study its components or sectors. Sectoral classification can be done on the basis of several criteria. In this chapter, three types of classifications are discussed: primary/secondary/tertiary; organised/ unorganised; and public/private. You can create a discussion about these types by taking examples familiar to the students and relate them to their daily life.…

    • 7754 Words
    • 50 Pages
    Powerful Essays
  • Satisfactory Essays

    With respect to governmental information, any government may distinguish which materials are public or protected from disclosure to the public based on classification of information as sensitive, classified or secret and being otherwise protected from…

    • 555 Words
    • 3 Pages
    Satisfactory Essays