Windows authentication-networking and data access

Assignment Help Basic Computer Science
Reference no: EM132689218

Scenario

As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

The following are issues to be addressed through hardening techniques:

Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.

Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.

Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.

To protect servers from attack, each server should authenticate connections based on the source computer and user.

Tasks

Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.

Reference no: EM132689218

Questions Cloud

Develop a checklist that can take to organization : Develop a checklist that you can take to your organization to use for purchasing a commercial software firewall and an open-source firewall.
Business process redesign : If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign
Prepare a report the unexpected technology challenges : Prepare a report detailing the unexpected technology-related challenges the organization encountered in returning their operations to normal.
Explain the culture and generational differences : The Critical Thinking assignments in this course build upon each other to help you complete the final Portfolio Project, an instructional design blueprint.
Windows authentication-networking and data access : You have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.
Provide space and facilities for support personnel : Provide space and facilities for support personnel (you need to determine what job functions will be required to your best ability)
Responsibilities of risk management programs : Consider the responsibilities of risk management programs and risk in volunteer management.
What do think will be greatest challenge in college : What is your career goal when you graduate? 3 years after you graduate? 10 years after? 25 years after? What do think will be greatest challenge in college
Perform the first three phases of an attack : Intrusion Detection & Penetration Testing - Perform the first three phases of an attack - Users you suspect might not have good security practices

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Certified information systems security professional

Discuss and prepare tables to compare the following certifications: Certified Information Systems Security Professional (CISSP), HealthCare Information Security

  Calculate the decision npv

a. Calculate the decision's 1-day change in value. b. Calculate the decision's NPV.

  Discuss whether you should accept the promotion

As a programmer, you are offered promotion to a project management position but you feel that you can make a more effective contribution in a technical rather than a managerial role

  What are the differences between tls and ssl

Is TLS compatible with SSL connections? Is one protocol more secure than the other? How does the fact that SSL requires a designated secure port affect implementation choices?

  Formula to find the probabilities

There are 3 urns containing coins. Urn I contains 3 gold coins, urn II contains 1 gold coin and 1 silver coin, and urn III contains 2 silver coins.

  System protect patient privacy medical record

The length of the paper is 7 pages and I want to write on the areas of "Does computer system protect patient's privacy medical record?" Please follow this paper outline:

  Cybersecurity test and validation scheme

Cybersecurity is a daily process. As an organization continues to evolve, making sure the security is continuously protected effectively against latest threats

  Applications of a single-phase induction motor

Explain, the construction, working principle & applications of a single-phase induction motor.

  Topic of emerging enterprise network applications

Research at least two articles on the topic of emerging enterprise network applications. How are the topics of the two articles related?

  Explain what that margin of error means

Find the margin of error for the 2007 poll if we want 90% confidence in our estimate of the percent of national adults who are baseball fans.

  How has emphasis of quality control changed

How has the emphasis of quality control changed in recent years? Describe some of the modern quality control techniques that illustrate this change in emphasis

  Derive the transfer function h (z) of the lti-dt system

Derive the transfer function H (z) of the LTI-DT system described by the circuit given in Figure 2.9. Obtain the difference equation relating the input x(n) to the output y(n).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd