Preview

Hollis IS3230 Unit 3 Lab3

Good Essays
Open Document
Open Document
766 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hollis IS3230 Unit 3 Lab3
Lab Assessment Questions and Answers

1. What is the Data Classification Standard used in the U.S. Department of Defense (DoD)/Military?Google “Data Classification Standard + DoD”. Summarize the different data classifications.

Top Secret- The highest security level. Information is classified Top Secret if unauthorized disclosure would cause "exceptionally grave damage" to national security

Secret- This is the second-highest classification. Information is classified Secret when its unauthorized disclosure would cause "serious damage" to national security. Most information that is classified is held at the secret sensitivity.

Confidential- This is the lowest classification level of information obtained by the government. It is defined as information that would "damage" national security if publicly disclosed, again, without the proper authorization.

Public Trust- Certain positions which require access to sensitive information, but not information which is classified, must obtain this designation through a background check. Public Trust Positions can either be moderate-risk or high-risk.

Unclassified- Is not actually a classification level, it is the lack of classification level. It is used for information that the government has not classified under the security classification system

2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.

Create a new domain wide GPO and enable "Deny logon locally" user right to the source domain user accounts and disable multiple logon. Teach strong password use and force change through Password GPO.

3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?

List Folder/Read Data, Read Attributes, Read Extended Attributes, Create Files/Write Data, Create Folders/Append Data, Write Attributes, Write Extended Attributes, Read Permissions,

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    6. Enabling Store Passwords Using Reversible Encryption determines whether Windows stores passwords using reversible encryption. Enabling this is essentially the same as storing passwords in plain text which is insecure and not recommended.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430 Lab2 Joy Brewer

    • 989 Words
    • 4 Pages

    7. In terms of file or directory permissions, what does U-G-O stand for? User Group Other What are the 3 permission that can be given to a file or directory? r=read w=write x=execute…

    • 989 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    5. Name at least 3 remote access protections or security controls that must be in place to provide secure remote access.…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Data classification is the classification of data based on its level of sensitivity and impact to an organization. Impact is determined by how data is disclosed, altered or destroyed without appropriate authorization. How data is classified and the levels of sensitivity associated with it is generally determined by the organization but in some cases the classification is mandated by federal, state and local laws. Data classification levels are typically arranged from the most sensitive data being classified as restricted to unclassified or public data. The classification levels vary depending on the institution.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    The benefits of Data classification policy, is it can reduce costs and administration overhead. It helps business discover what data they hold, where it’s located, and who can have access to it and how long it must be retained, as well as what level of protection it should receive and what type of media it should be retained to meet legal and regulatory requirements. Data classification is something that should be well planned especially when working with large amounts of data and be able to discover them.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (TCO 1) Each _____ has one or more access control entries (ACEs) that state which objects have permissions to the file or folder and what permissions they have.…

    • 2202 Words
    • 36 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The term confidentiality means whatever information you give will not be shared or passed on.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The CIA refers to the triad of three concepts included in the information sharing and communication within and outside the organizations. this CIA is the short term for the Confidentiality, integrity and Availability. these three concept are also the three properties of the CIA. the confidentiality is actually related with the fact that any piece of information that is an importance resource of the organization like one of its trade secret or any of the reason behind its competitive advantage should not be leaked out of the company in an unethical or corruptive manner. the information must be tried to keep safe with high responsibility and importance must be given to protection of confidentiality. the integrity refers to the moral values in…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Clearance Info

    • 8089 Words
    • 33 Pages

    The Defense Industrial Security Clearance Office (DISCO) is part of the Defense Security Service (DSS), an…

    • 8089 Words
    • 33 Pages
    Powerful Essays
  • Best Essays

    Trade Secrets

    • 2228 Words
    • 9 Pages

    * The information must be secret (i.e. it is not generally known among, or readily accessible to, circles that normally deal with the kind of information in question).…

    • 2228 Words
    • 9 Pages
    Best Essays
  • Satisfactory Essays

    With respect to governmental information, any government may distinguish which materials are public or protected from disclosure to the public based on classification of information as sensitive, classified or secret and being otherwise protected from…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    sgbrsgsr

    • 7754 Words
    • 50 Pages

    NOTES FOR THE TEACHER CHAPTER 2: SECTORS OF THE INDIAN ECONOMY An economy is best understood when we study its components or sectors. Sectoral classification can be done on the basis of several criteria. In this chapter, three types of classifications are discussed: primary/secondary/tertiary; organised/ unorganised; and public/private. You can create a discussion about these types by taking examples familiar to the students and relate them to their daily life.…

    • 7754 Words
    • 50 Pages
    Powerful Essays