Create a security matrix spreadsheet and security strategy

Assignment Help Management Information Sys
Reference no: EM131502503

Assignment

Use the following scenario for the Week One through Four individual assignments:

You are the systems administrator for Cybixx, a manufacturer and distributor of vending machines. Cybixx currently has three facilities and is looking to expand to a fourth.

As a Systems administrator, you are responsible for all server hardware and software, all client desktop hardware and software, and all networking equipment. You are also responsible for the creation and maintenance of the documentation for all systems.

Cybixx current infrastructure and facilities:

Atlanta, Georgia - Headquarters. Cybixx uses a partially centralized IT infrastructure. The systems location at the Atlanta office include:

• 5 physical Windows 2012 R2 servers
• 10 HYPER-V Windows 2012 R2 hosts running 78 Windows 2012 R2 guests
• DNS Services
• DCHP Services
• Active Directory Services
• A network 20 Mbs connection to the Cybixx MPLS cloud
• A 100 Mbs internet connection
• 25 Windows 10 desktops

Boise, Idaho. Cybixx has a Distribution Center located in Boise, Idaho. The Distribution Center include:

• 2 physical Windows 2012 R2 servers for file service and printing
• 10 Windows 10 desktops
• A 10 Mbs network connection to the Cybixx MPLS cloud

Boulder, Colorado. Cybixx has a Distribution Center located in Boulder, Colorado. The Distribution Center include:

• 2 physical Windows 2012 R2 servers for file service and printing
• 10 Windows 10 desktops
• A 10 Mbps network connection to the Cybixx MPLS cloud

Future Expansion: Cybixx has purchased a building for new Distribution Center in Akron, Ohio. It is the Systems Administrator's job to extend IT services to this location and update the company's IT landscape appropriately.

Assignment:

This assignment is a continuation from the Week Four assignment.

In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and configured.

Create a security matrix spreadsheet and security strategy summary. Include the user roles and matching security rights that would be expected to be created for the Akron site. Be sure to include the following user roles, as well as any others that may be deemed necessary:

• Administrative
• Accounting
• HR
• Warehouse Manager
• Warehouse Supervisor
• Janitorial User

Your strategy will be a 1-page summary of your matrix discussing the security strategy and how it will be applied to your matrix.

Reference no: EM131502503

Questions Cloud

What is the added value of the given leadership style : What is the added value of this leadership style? What impact does this leadership style have on the organization's overall image?
What is the most obvious economic indicator : What is the most obvious economic indicator to look at to tell if a recession has been caused by an aggregate demand shock or an aggregate supply shock?
Explain apple decision and quell potential negative reaction : DISCUSSION- Compose a statement to the press to explain Apple's decision and quell potential negative reactions.
Decrease in federal government spending : Even though Federal Government spending is "counter-cyclical" why is it not necessarily the case that an improvement in the nation's economy.
Create a security matrix spreadsheet and security strategy : Create a security matrix spreadsheet and security strategy summary. Include the user roles and matching security rights that would be expected.
How many more people would be working : In 2015, approximately 59 percent of the adult population (250 million) was employed, among the lowest employment rates in 20 years.
Analyses and apply appropriate problem solving techniques : BLB10089-6 STRATEGIC MANAGEMENT ASSIGNMENT. Analyses and apply appropriate problem solving techniques plus knowledge learned to solving complex business problems
Summarize an example of an effective supervisor : Summarize an example of an effective supervisor. How does this type of supervisor contribute to employee satisfaction?
How is the firm categorizing the event : Analyze the firm's press releases regarding the announced acquisition. How is the firm categorizing the event?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Erp and geshifting to erp we are basically saying that we

erp and geshifting to erp we are basically saying that we can plan for an entire enterprise.so for example companies

  Analyze how quality management tools may be used

Analyze how quality management tools may be used to determine and ensure high quality within project deliverables. Provide examples with your response

  Compare business continuity and disaster recovery planning

Analyze the way in which CIP has or has not advanced between the releases of the DHS' NIPP and the NIST's Framework for Improving Critical Infrastructure Cybersecurity. Justify your response.

  Identify the shortcomings of both it and the business

From a leadership/management perspective, what are the fundamental/underlying problems that exist within Hefty Hardware - Identify the shortcomings of both IT and the business.

  Outline sound practices for reducing input errors

As the design of user input commences, one of the first tasks is to assess the various alternatives for entering information. The primary objective of any form of data input is to enter or update error-free data.  Fraud is a problem reaching epidemic..

  Document the wou mission statement and key objectives

Information Systems Enterprise Architecture- Document the WOU mission statement and key objectives under the core themes for the university.

  What are the advantages and disadvantages of social media

What are the advantages and disadvantages of social media? How might knowing these advantages and disadvantages alter how a person might use social media?

  Describe line process vs. batch process

Line Process vs. Batch Process - Effect on Functions - What concerns might the following functions have about this proposed change?

  Case study on mitigating cloud computing risks

Imagine you are an Information Security Manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources onli..

  Problems that project managers will faceexplain four

problems that project managers will faceexplain four problems that project managers will face in the coming decade.pick

  Determine which tunneling protocol you would recommend

Suppose you work for a company that wants to implement a Virtual Private Networks (VPN) for telecommuters. Determine which tunneling protocol you would recommend and explain why.

  Define and draw the basic relationships among entity classes

For the above scenario, create a simple two-column table that lists all the entity classes in the left column and their associated primary keys in the right column. Then, record as many business rules as you can find provided in the scenario. defi..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd