How will the procedures for making changes to user accounts

Assignment Help Computer Engineering
Reference no: EM131980042

Assignment: Enabling Remote Access

Learning Objectives and Outcomes

Describe the impact of enabling remote access to an existing network in a Windows environment.

Assignment Requirements

For this assignment, imagine yourself to be a security administrator working for Ken 7 Windows Limited. You have been asked to evaluate the option of enabling remote access for the Ken 7 Windows network. Here are some facts to help you work on this assignment.

Ken 7 has just purchased a new enterprise resource planning (ERP) software package and will place the workstation computers which will use this ERP software at eight different locations on the shop floor. The ERP software requires two database servers, four application servers, and two Web servers, all of which run a Windows operating system. All above-mentioned servers and the shop floor workstations are new, but there are 22 workstations, already in place, that work with an older software Ken 7 used to manage the manufacturing and accounting processes. The existing 22 workstations are grouped into three workgroups: accounting, planning, and purchasing. Before you add Active Directory to the network, you have been asked to examine the effects of Active Directory in several key areas.

Tasks

Provide the answers to the following questions to satisfy the key points of interest to the Ken 7 Windows Limited management regarding the addition of Active Directory to the network.

1. Currently, system administrators create Ken 7 users in each computer where users need access. How will remote users connect to the Ken 7 network? How will they identify themselves?

2. How will the procedures for making changes to the user accounts, such as password changes, be different for remote users?

3. What action should administrators take for the existing local users to allow a single user account to be used for local and remote access?

4. How will the administrators resolve the differences between the user accounts defined for local and remote access? Will there be any differences?

5. How will the procedure for defining access controls change after enabling remote access?

Required Resources

- Text Sheet: Case Study for Rationale: Importance of a Multilayered Approach to Security (ts_multilayer)

Submission Requirements

- Format: Microsoft Word
- Font: Times New Roman, 12-Point, Double-Space
- Citation Style: APA Style with 3 references
- Length: 1-2 pages.

Reference no: EM131980042

Questions Cloud

Limited access social order and open access social order : What is the meaning of "limited access social order" and "open access social order" in a political economic development context?
Describe challenge of cost estimation for software projects : Describe the challenges of cost estimation for software development projects where requirements are usually not clear in early stages of the project.
Tax revenue-proportional tax : Will this system raise more or less tax revenue than a proportional tax rate of 10%. Explain your answer.
How cultures affect team management : Review at least four academically reviewed articles on how cultures affect team management. Develop power presentation based on the articles.
How will the procedures for making changes to user accounts : How will the procedures for making changes to the user accounts, such as password changes, be different for remote users?
Is communist china a capitalist economy : Is Communist China a capitalist economy? To what extent does Communist China have that something else.
Failure on planned aggregate expenditure : Using the Keynesian model illustrate and explain the impact of a large- scale bank failure on planned aggregate expenditure.
Deadweight loss of the tax : Use supply and demand diagram(s) to demonstrate whether the following statement is true or false and provide an explanation
What is the expected added profit from the challenger line : What is the expected added profit from the Challenger line and what is the expected impact of cannibalization of existing sales

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd