Network requirements of the user and design

Assignment Help Basic Computer Science
Reference no: EM13936481

Evaluate the network requirements of the user and design an appropriate file and folder structure.
· Create the designed file and folder structure using appropriate administration and system tools. Document the file system using a security matrix.

· List five matters that would need to be considered when designing a file service.

  • What types of systems are ‘mission critical'?
  • What are the steps to follow when carrying out a risk analysis on the network?
  • List five threats to a network that should be considered in a risk analysis.
  • List precautions an organisation can take to prevent or minimise the impact of disastrous events.
  • List the options an organisation can use to recover from a disaster.

1. Configure a Windows 2000 server to provide secure access and logs for the Legal Department.

2. Write a report on how the access is managed. You will need to:
a. Examine resources to confirm and limit the access to files, folders, databases and overall file system, to organisational requirements.
Analyse the access log that reveals details about times and users accessing the file system

1. Prepare a report on illegal software found on workstations, based on the Software audit and Software inventory
Descrbe the steps you would take to check for illegal software on workstations. Add a printer to be shared on the network.

Reference no: EM13936481

Questions Cloud

Explain why issue of global warming effects on the ecosystem : Identify sources of information that can be useful to oppose information on this issue. What would be a good title name that will present this topic?
Occurred risk likelihood and risk impact : Name of the threat description when and where it occurred risk likelihood and risk impactHow the threat attacks the system
Which product would you recommend the bank invest in and why : The bank estimates its economic capital on product 1 to be $25 million and for product 2 to be $90 million. The bank's target hurdle rate is 20 percent. Which product would you recommend the bank invest in and why?
What parasites might the physician have suspected : What bacterial pathogens should be included in the screening of a routine stool culture, and how would the clinical laboratory scientist processing the culture recognize these potential pathogens?
Network requirements of the user and design : Create the designed file and folder structure using appropriate administration and system tools. Document the file system using a security matrix.
Infrastructure as a service (iaas) from a cloud service : An organization is planning to use Infrastructure as a Service (IaaS) from a cloud service provider to host their web site and e-commerce applications. This will consist of an appropriate number of suitably sized Linux Virtual Servers and Virtual ..
Why alcoholic acidity is determined : Why alcoholic acidity is determined and ash content is important factor in wheat flour?
What is probability of observing five operational risk event : What is the probability of observing five operational risk events in a single year for the 2000-2007 period?
Total processing speed of microprocessors : Task Part A : 1. The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year. Today, a symmetric session key needs to be 100 bits long to be considered strong. How long will a symmetric..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Variables does the data frame have

How many variables does the data frame have? How many rows does the data frame contain?

  K and l are mobile across sectors.

The next three questions pertain to the two-good (M,F)-two-factor (K-L) Harberger model.Unless noted otherwise, assume that each factor of production is always fully employed, allmarkets are competitive, and K and L are mobile across sectors.

  Write program reads in the length and width of a rectangular

Write a program that reads in the length and width of a rectangular yard (in meters) and the length and width of a rectangular house (in meters) placed in the yard. Your program should compute the time (in minutes) required to cut the lawn around ..

  Work with classes as reusable code

Objective: Work with classes as reusable code and random numbers. Instructions: A slot machine is a device that the user inserts money into and then pulls a lever (or presses a button).

  Write a shell script

Write a shell script, named grepdir.sh, that searches for a pattern in a directory, and all of its subdirectories.

  Find commercial web site show bleeding edge technology error

Visit the Internet and discover commercial Web sites which show each of the common errors listed below. Give links to those Websites in Microsoft Word document.

  You are the lead forensic technician within a medium size

create a 15-20 slide powerpoint presentation addressing the following scenarioyou are the lead forensic technician

  Find the greatest common divisor (gcd) of two integers

the greatest common divisor (GCD) of two integers is the largest integer that evenly divides each of the two numbers.Write method Gcd that returns the greatest common divisor of two integers.

  Add the following numbers in two''s complements

Given four bits, add the following numbers in two's complements. a. - 4 + (- 1), b. -7 + 3, c. -5 + 4

  Create advantages and efficiencies for an enterprise

Discuss how server virtualization, architecture, and Hyper-V can create advantages and efficiencies for an enterprise, including considerations for how to decide what an enterprise should factor in when calculating Return on Investment (ROI) befor..

  How could tcp and udp know the values in the ip header

When adding a per-segment checksum to a segment, TCP and UDP include some fields in the IP layer before the segment has been passed to its underlying layer, the IP layer. How could TCP and UDP know the values in the IP header?

  Write a calculator program that is able to process an input

Write a calculator program that is able to process an input in postfix notation and give the result. You are free to use the built in stack class or create your own ones.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd