Network requirements of the user and design

Assignment Help Basic Computer Science
Reference no: EM13936481

Evaluate the network requirements of the user and design an appropriate file and folder structure.
· Create the designed file and folder structure using appropriate administration and system tools. Document the file system using a security matrix.

· List five matters that would need to be considered when designing a file service.

  • What types of systems are ‘mission critical'?
  • What are the steps to follow when carrying out a risk analysis on the network?
  • List five threats to a network that should be considered in a risk analysis.
  • List precautions an organisation can take to prevent or minimise the impact of disastrous events.
  • List the options an organisation can use to recover from a disaster.

1. Configure a Windows 2000 server to provide secure access and logs for the Legal Department.

2. Write a report on how the access is managed. You will need to:
a. Examine resources to confirm and limit the access to files, folders, databases and overall file system, to organisational requirements.
Analyse the access log that reveals details about times and users accessing the file system

1. Prepare a report on illegal software found on workstations, based on the Software audit and Software inventory
Descrbe the steps you would take to check for illegal software on workstations. Add a printer to be shared on the network.

Reference no: EM13936481

Questions Cloud

Explain why issue of global warming effects on the ecosystem : Identify sources of information that can be useful to oppose information on this issue. What would be a good title name that will present this topic?
Occurred risk likelihood and risk impact : Name of the threat description when and where it occurred risk likelihood and risk impactHow the threat attacks the system
Which product would you recommend the bank invest in and why : The bank estimates its economic capital on product 1 to be $25 million and for product 2 to be $90 million. The bank's target hurdle rate is 20 percent. Which product would you recommend the bank invest in and why?
What parasites might the physician have suspected : What bacterial pathogens should be included in the screening of a routine stool culture, and how would the clinical laboratory scientist processing the culture recognize these potential pathogens?
Network requirements of the user and design : Create the designed file and folder structure using appropriate administration and system tools. Document the file system using a security matrix.
Infrastructure as a service (iaas) from a cloud service : An organization is planning to use Infrastructure as a Service (IaaS) from a cloud service provider to host their web site and e-commerce applications. This will consist of an appropriate number of suitably sized Linux Virtual Servers and Virtual ..
Why alcoholic acidity is determined : Why alcoholic acidity is determined and ash content is important factor in wheat flour?
What is probability of observing five operational risk event : What is the probability of observing five operational risk events in a single year for the 2000-2007 period?
Total processing speed of microprocessors : Task Part A : 1. The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year. Today, a symmetric session key needs to be 100 bits long to be considered strong. How long will a symmetric..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd