Preview

client server 2 unit 7 assinment and exercise

Satisfactory Essays
Open Document
Open Document
327 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
client server 2 unit 7 assinment and exercise
Unit 7 .assignment 1. AD password policy planning
I can understand your concern with your network security and better securing your information without losing productivity. You can set up your users to have their passwords be changed at a certain time and I would recommend a short amount of time in-between. And also you can have the passwords be in a certain context or to be made a certain way and make sheer that the security levels are high on them so that a hacker has a harder time to get in to the network. I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “JVentura10415867@Domain*%$.Local” if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. Can also buy better security items to better your network things like smart card, finger print scanners, retinal scanners, and others. But I only recommend these for really sensitive information and only for certain users in your company. I hope that this has helped you in any way and I wish the best of luck to you.

Unit 7. Exercise 1. AD OU planning scenario
1. How many departments will there be?
2. How many sub-departments will there need to be?
3. How many OUs will be needed within each parent OU?
4. Will departments need to share resources?
5. What resources are required by each department?
6. Who will be in charge of password resets and management?
7. What type of security setups do you have in line?
8. And what permission do each department need to have and what departments don’t need as much or less permission?

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1230 Unit 10 Assignment

    • 409 Words
    • 2 Pages

    The company I choose is a small IT company. The company offers all the big major companies technical support. They have to backup client information, finical records, and employee’s information. The company would use the GFS scheme for backing up their information. The GFS scheme comes with a full month backup which is stored offsite, and a weekly and daily backup that is kept onsite as well as offsite. The weekly and daily backups are kept onsite for 30 days then are reused and recycled daily and weekly at the offsite location. The monthly backup that is secured offsite is kept for 3 years depending on the client. Presently for the…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    This domain is the fastest way for the system to be compromised. I would implement an AUP (acceptable use policy) that will be understood and signed by all employees with access to the network. The employees will also have to go through initial information security training before gaining access to the network. This training will also be required annually in order to maintain their access to the network. The AUP will dictate the requirements for passwords. The requirements will include an eight character alphanumeric password, two uppercase letters, two lowercase letters, two special characters, and two numbers. This will make it more difficult for the password to be breached. The AUP will also state that the company systems will only be used for work related purposes. All social networking sites and many other miscellaneous sites will be blocked. The user will also have to consent to monitoring when signing the…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Would you recommend a RAID setup? If so, what RAID level? If not, what would you suggest for fault tolerance?…

    • 868 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Assignment

    • 532 Words
    • 3 Pages

    There are different ways through which businesses can add value to their products and services.…

    • 532 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When creating a multi-layered security plan, I would look at all seven domains of the IT infrastructure and then increase the security on each of those domains because that will increase the security for the whole plan. In the user domain, this is the quickest way for the system to be compromised the users. So I would implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will also need to be changed every 90 days and the same password cannot be used again for three calendar years. In the workstation domain, I would make sure that each workstations, whether desktop or laptop has some security on it like antivirus and malware protection installed. Laptops can be very vulnerable for loss or theft, which would make me install an encrypted hard drive so if it is stolen the data can only be retrieved by the owner. For the LAN domain, just train all users about email scams. I would guess that most users know not to access suspicious emails when on our system but I would still implement to the users a quick training course. Then I we should add spam filters this will help get rid of most of the junk email. In the LAN-to-WAN domain, we need to shut down the File Transfer Protocol (FTP) server we have running and switch it over to use secure FTP so that only users allowed on our system can access our FTP server. In the WAN domain, we need to make sure that we have firewalls set up on our network that will filter all incoming traffic. This firewall will stop all traffic coming on to our system that is not meant or not wanted our network. In the Remote Access Domain, we need to establish strict user password policies, as well as lockout policies to defend against brute force attacks, require the use of authorization tokens have a real-time lockout procedure if token is lost, or stolen. The last domain is System/Application domain we need to…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    Create a new domain wide GPO and enable "Deny logon locally" user right to the source domain user accounts and disable multiple logon. Teach strong password use and force change through Password GPO.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Create a forward and (optional) reverse lookup zone. After creating the first zone, you can also create additional zones, as needed.…

    • 380 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    If we watch these specific areas closer and implement some user policies, I’m certain that we can normalize as well as reduce security threats to our network and in turn, will make our company a more productive and profitable…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    One of the security options that we are going to use is Privacy or confidentiality. This will keep all information secret from all people unless you are authorized to see it. This will help with employee’s not finding things that they should not see like social security numbers, address, and sensitive documents for the company and so on. Having this as a security options is great. I would implement this on all of the networks that I would manage.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Currently the security for the internet server and the location of it in the network is not as protected as it should be and it is not the best design either. The internet server must be located out of the company firewall to protect the systems and network internally. By doing this it separates the remote server system the system has proper validation and connection through the system allows access to the rest of the network. Staffs that are located in the firewall can authenticate through a proxy system and then access the internet, which in turn allows them to communicate…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Client Request Ii

    • 480 Words
    • 2 Pages

    According to Schroeder, Clark, & Cathey (2011), a contingency is a possible future event that will have some impact on the firm (p. 369). The most frequently encountered contingencies are pending lawsuits, income tax disputes, notes receivable discounted, and accommodation endorsements.…

    • 480 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Uncle Bob

    • 277 Words
    • 2 Pages

    Explain at least four ways that this information is shared between local and/or federal agencies.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays