Describe the use of windows security groups

Assignment Help Management Information Sys
Reference no: EM131541749 , Length: 5

Assignment : Secure Intranet Portal Login

Background:

You are the security professional for a medium-sized manufacturing company. The organization would like to deploy a secure portal for in-house use only. The portal will be available from the company's intranet.

The company is utilizing a Microsoft Internet Information Services (IIS) server to run the local intranet website. The portal will be created by in-house programming staff utilizing ASP.NET technology and scripting.

The management requires the login to be protected using Hypertext Transfer Protocol Secure (HTTPS). In addition, the management would like to use an integrated login so that users do not have to remember or create a separate username or password for this portal login. The company is using a Windows Server 2012 Active Directory infrastructure.

All users logging on to the portal also have existing active directory user accounts. The company also has an in-house Windows Server that serves as a local certificate authority for other existing web applications and services.

Tasks:

Create a 4- to 5-page report that will be shared with the company's board of directors, providing guidance and recommendations on how to best secure the web portal. Your report should cover the following aspects:

Describe what Windows-integrated authentication is and how it could potentially be used to provide secure access control to the portal.

Describe the use of Windows security groups and explain how a connection to active directory could be performed using the existing technology (existing IIS server and Windows Server 2012 Active Directory).

Describe how Windows certificate services work. Recommend a solution that would utilize the in-house Windows certificate authority server to provide a certificate to the new portal.

Explain how users can connect and log on to the portal in a secure fashion using secured socket layer (SSL) or HTTPS to ensure that all login credentials and activities on the portal are secure and encrypted.

Ensure that you write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.

Reference no: EM131541749

Questions Cloud

Summarize the recruitment strategies that you will employ : Summarize the recruitment strategies (if any) that you will employ. (how do you plan on retaining employees, benefits, flexible hours???)
Determine types of inventories companies currently manage : Determine the types of inventories these companies currently manage and describe their essential inventory characteristics.
Write the dml script to insert three test records : Write the DML script to insert 3 test records in each of the tables in the system. This data will be necessary to write the queries in the next assignment.
How do you advise howard mcdonald : How do you advise him? You should master chapter 4 of the text -- but also do some internet research on this question.
Describe the use of windows security groups : Describe the use of Windows security groups and explain how a connection to active directory could be performed using the existing technology.
How is the word myth used popularly : What are the most common mythological themes across different cultures? Why do myths from different cultures around the world address such similar.
Assess the likelihood of occurrence : Assess the likelihood of occurrence, potential impact to the organization if it did occur, and based on these two factors, an overall risk level.
Was pettits behavior unprofessional or immoral : Analyze the questions associated with your chosen case study and discuss them using concepts you learned in course. Explain your rationale for each of your
What did you learn about the nazi party : This documentary explains how the art world was attacked during the rise of the Third Reich. What did you learn about the Nazi party

Reviews

Write a Review

Management Information Sys Questions & Answers

  The answer to knowledge managementselect an organization

the answer to knowledge managementselect an organization. prepare a paper in which you evaluate the organizing function

  Coordinated information technology and competitive

coordinated information technology and competitive advantagethere is a great deal of interest in the process of

  Summarize the article & attack type

Does the vulnerability exist in other IoT items? What are the implications for society & security professionals? Has the vulnerability been fixed?

  Explain efficient supply chain implementation

What are some common characteristics and challenges in effective and efficient supply chain implementation for a company that wishes to achieve a global presence in the marketplace

  Discuss about the company policy

Company policy mandates that users (including admins) cannot install software on Company PCs. A GPO (Group Policy Object) enforces that for users but not administrators. One weekend you came across a cool utility that you would like to test in you..

  Prepare presentation that address the occurrence of malware

Prepare a presentation that address the Occurrence of malware, spyware, and botnet, Prevention of spam and phishing, Securing your home network and Prevention of identity theft and Internet fraud.

  E-businesss technologies and softwarecan you help me get

e-businesss technologies and softwarecan you help me get started with this assignment?e-business has birthed new

  The usability test plan

The usability test plan you create for this assignment will serve as your guidance for completing your final assessment .

  Explain in detail the potential impact of malicious attacks

Explain in detail the potential impact of the three selected malicious attacks. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.

  Retention in the nursing home environment

Improvement solutions to employee retention in the nursing home environment?

  Describe implications for practice and future research

develop an evaluation plan to be included in your final evidence-based practice.Describe the rationale for the methods used in collecting the outcome data.

  Describe the five steps of the system development life cycle

Differentiate between agile, JAD, and RAD methodologies. Which will you use for the development, and why? Would you use a prototype method?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd