Implement appropriate network security controls

Assignment Help Computer Network Security
Reference no: EM131917260

Assessment 3: Lab

Overview of Labs

You are required to complete two labs which are:

Lab 1 - you will set up and implement two network controls, a password policy and an audit policy to track failed logons

Lab 2- you will monitor the audit policy by generating a failed logon attempt and view the log file entry that your policy has created.

For lab resources please refer to page-2 of this assessment resources summary.

Lab 1 Set up and implement network controls

Scenario: You have been asked by hotel management to set up and implement appropriate network security controls to support the new network security plan. Management wants the password policy to be set so that passwords have to be changed at least every 90 days, and that all failed logon attempts are logged in the security log for later investigation.

Instructions:

Edit the local security policy to set password policy so that the maximum age of a password is 90 days, and that all failed logon attempts are logged in the security log. Note that you need administrative rights on the Windows computer in order to change these settings - if you are using a level 10 lab computer, you can sign on using the Administrator account and the password abc@123.

Take a screenshot of your new password and security policies for evidence you have completed the labs. The screenshots should look similar to the images below:

Password policy change

Audit policy change

Lab 2 - Monitoring your network control

Scenario:

Now you are going to monitor the network control you set up in the previous lab by viewing the effect of policy violations in the Windows Security log

Instructions:

Create a user Snnnnn (where Snnnnn is your student number) in Windows 2012, assign them to the Administrators group, and give them a password.

Logoff and attempt to logon as that user, deliberately entering an incorrect password (to generate a policy breach)

Enter the correct password, and logon and view the Security Log. You should see evidence of the policy breach in the log similar to that shown below

Save the screenshot of the security log as evidence you have completed the lab.

Attachment:- Labs-Assignment.rar

Reference no: EM131917260

Questions Cloud

How would you expect the solubility of silver fluoride : How would you expect the solubility of silver fluoride (AgF) to compare to the halides measured in lab (AgBr, AgCl, AgI)?
Write a article review - a better way to forecast : A Better Way to Forecast by Uriel Haran and Don A. Moore - What are the implications of the article for management practice
Simple interest is the interest earned : Simple interest is the interest earned on. What is the effective interest rate if you need $128,500 for one year to cover your operating expenses?
Calculate the concentration of the original solution : The concentration of the final solution is 0.00383 M. Calculate the concentration of the original solution.
Implement appropriate network security controls : You have been asked by hotel management to set up and implement appropriate network security controls to support the new network security plan.
How would you rate the privacy protections : How would you rate the privacy protections available to individuals who purchase items through Amazon.com? How safe are similar data of individuals.
Dissolution of the kcl : What is the approximate amount of heat (in J) involved in the dissolution of the KCl, assuming the heat capacity of the resulting solution is 4.18 J/g°C?
Net in the company statement of cash flows : Should the $10 million paid to employees and the $10 million received from WTD be presented gross or net in the Company’s statement of cash flows?
How many milliliters of barium hydroxide : A 48.6 mL sample of a 0.455 M aqueous hydrocyanic acid solution is titrated with a 0.475 M aqueous solution of barium hydroxide.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd