Preview

Nt1330 Unit 1 Case Study

Good Essays
Open Document
Open Document
825 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 1 Case Study
Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.

When configuring windows networking, two major approaches are valid to secure all the network resources, the workgroup approach and the Domain approach. The workgroup approach is simply to create a windows peer-to-peer network with a decentralized security system. This workgroup security approach
…show more content…

Some advantages of using this type of scenario include the ability to manage windows workgroup since has a small number of computers that can be managed individually. Application servers, services or workstation software can be run off one or few machines rather than employing extensive active directory schema changes to be accomplished in a domain model. Complying with third party vendors' software and hardware can be achieved in a simple manner and migrating or installing new operating systems is an easy task that it would not be an option in a Windows Active Directory domain.

This simplicity comes to a price since by deploying a windows workgroup, other functionality and advantages of a Domain model is lost or not applicable and security can be compromised. For example, when deploying a patch or fix, each workstation has to be configured individually. Another example is that installing a new application in each computer requires the installation and configuration of each machine. Furthermore, in this model when user connect via VPN if they transmit copies of their files unencrypted, the security of the network and information is


You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 4 Case Study

    • 294 Words
    • 2 Pages

    A) Thingamajigs and Things has total assets of $45,000 and $9,000 in liabilities. This gives a current ratio of 5.00:1. Wannabees has total assets of $150,000 and $85,000 in liabilities. This gives a current ratio of 1.76:1. Thingamajigs and Things is more likely to be approved for a loan, because it has a higher current ration. This means that their assets are higher than their liabilities (what they owe), and they are more likely to be able to make payments.…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Case Study

    • 747 Words
    • 3 Pages

    Because of the specific words used that sentence they would have to use a direct distribution method.…

    • 747 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Check the linearity of the Black Box by connecting the DC Power Supply to the input of the Black Box, and the Multimeter to the output of the Black Box, then change the input voltage regularly and notice the changing in the output voltage of the Black Box.…

    • 237 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    PCA 1. The first PCA was conducted to construct the four categories of citizenship norms by using only data collected in 2004 (Table A11). It included the variables Actasoc, Buypol, HelpUSA, Helpwrld, Milserve, Obeylaws, Othreasn, Paytaxes, Voteelec, and Watchgov. Missing cases were deleted listwise, leaving a total of 1,406 valid cases from a population aged 18 to 89 years and older. The PCA was conducted using ten variables with orthogonal (varimax) rotation. An inspection of the correlation matrix revealed that all variables had at least one correlation coefficient r > .3. The KMO measure was .78, with individual measures exceeding the minimum level .5, confirming sample size adequacy. Furthermore, Bartlett’s test of spherity was statistically significant (p < .05), indicating that the data was suitable for PCA.…

    • 502 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 776 Words
    • 4 Pages

    The version of Windows Server 2012r2 that can be recommended for the company is the Datacenter edition because of following reasons:…

    • 776 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Case Study

    • 410 Words
    • 2 Pages

    43% of adults in the US receive fewer than 5 phone calls a day. In a random sample of 7 adults, what is the probability that the number receiving fewer than five calls a day is (a) exactly 3 (b) at least 3 (c) more than 3?…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110: Unit 1 Role Scenario 1) Identify threats to the seven domains of IT within the organization: A. User: Destroy data B. Workstation: Loss of data, not updated C. LAN: Unauthorized user, weak password D. LAN –WAN: Hackers, weak traffic filtering E. WAN- FTP anon uploads, DoS/DDoS F. System Application: Fire, DoS/DDoS, SQL injection corrupting data G. Remote: user virus, remote from office unsecure, VPN tunnel hack 2) Identify vulnerabilities in the seven domains of IT within the organization. A. User: Infected media, social engineering B. Workstation: OS vulnerability, browser vulnerability C. LAN: Worms, LAN OS vulnerability D. LAN-WAN: malicious websites, unblocked ports E. WAN: network outages F. System Application: ISP…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISO 17025 Certification, the general requirements for the competence to carry out tests and calibrations, including sampling. It handles testing and calibration carried out using standard methods, non-standard methods and laboratory-developed methods. It applies to all organizations that tests and calibrations. These include, first, second and third - party laboratories, and laboratories where testing and calibration forms part of inspection and product certification.…

    • 498 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    · S/W Environment: Minimum one Web Browser should be installed before PC installation, Use IE 5.5 or higher, Go to Tools > Internet Options > Security tab and click on Custom Level button and make sure that under the Scripting section the Active Scripting is set to “Enable”.…

    • 1858 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Case Study

    • 685 Words
    • 3 Pages

    What can you do to benefit the server: Starting off, I would take care of the chat for the server so that the environment is family friendly. Later on, I would attempt to deal with more blatant rule breakers such as hackers and or people whom abuse glitches or bugs to take advantage of anything. If anyone breaks the rules with the exception of hackers (instantly taken action against) I will first give them a verbal warning so they know they shouldn't repeat what they just did. If did again, either action or another verbal warning will be issued but the third time will call for immediate action. Considering the timezones, I can catch the more 'blatant' rule breakers whom could be ruining the experiences of players in my timezone where other staff aren't online or…

    • 685 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    There are many administration advantages for Windows Servers. One aspect is domain operations which are an important resource available on the network through Window Server. Making Window Server a domain controller adds security and the ability to add local and group policies to the network (Garza, 2010). If Window Server is not promoted to the status of a domain controller, then it can run simple network operations using peer-to-peer structures (Garza, 2010). These are workgroups, and they can only block or allow access but do not provide control features for the network. The numbers of applications that are available to run in the Window Server environment are numerous these include financial apps, database programs, and e-mail exchange operations as well as web server and Internet programs (Garza, 2010). Windows Server local policies have the ability to perform certain operational commands. These are operations available to the domain controller network system. This means that Window Server can centralize user and computer access. Only one machine needs to be configured as the Domain Controller rather than all machines on the network.…

    • 3411 Words
    • 14 Pages
    Better Essays
  • Better Essays

    Sales and marketing are not the only ones that will benefit from an intranet network at Dirt Bikes, human resources would be able to upload and store their employee related information such as employee policies, handbooks, benefits, meetings and schedules. This would reduce a great amount of paper being used at the company plus reduce the risk of losing or misplacing this information. Employees that are new could download this information onto their desktops and read from their instead of having a desk full of booklets or…

    • 1204 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    1. One can differentiate between the terms health record and health information by identifying their main purpose in the health community. Health records are the type of information regarding family history, diagnosis, complaints, or patient’s medications. Health information requires analyzing medical information and provides protection.…

    • 211 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    With the Active Directory service of Windows® 2000, organizations can simplify user and resource management while creating a scalable, secure, and manageable infrastructure for deploying additional important and emerging technologies.…

    • 9617 Words
    • 39 Pages
    Good Essays