Windows limited new enterprise resource planning

Assignment Help Basic Computer Science
Reference no: EM132398006

Ken 7 Windows Limited new enterprise resource planning (ERP) software expands the size and scope of the Ken 7 Windows Limited computing environment. The new infrastructure means more computers and more users. You know that the process of administering a larger, more complex environment requires a more formal approach. You have decided to implement the Plan-Do-Check-Act (PDCA) cycle to help organize your efforts.

Consider the list of security administration tasks below. After each task, indicate the phase of the PDCA cycle to which it belongs. Write at least two pages that describe why the task belongs to the phase you chose and how each task makes your environment more secure.

Security administration tasks:

Write password policy to enforce complex passwords.

Identify settings that have changed for a specific computer by analyzing the output of a baseline comparison, then list settings that should be changed.

Use Microsoft Baseline Security Analyzer (MBSA) to scan for current software versions.

Lock the door to the data center.

Use a packet sniffer to see if network traffic is encrypted.

Develop daily server backup procedures.

Apply software security patches.

Update antivirus signature databases.

Monitor log files.

Reference no: EM132398006

Questions Cloud

Big data mining in the cloud : Big Data Mining in the Cloud. Every organization is facing the challenge with large data sources. It increases complexity of data to understand and store.
Reasoned responses : Reasoned Responses. Take position on whether or not CIO should develop reasoned responses that are driven by company objectives.
Major impacts that general data protection regulation : Essay on " Two major impacts that General Data Protection Regulation (GDPR) has on the process and practice of data mining"
Explain construction of software model and uses : Explaining a situation at your workplace that would have required a good tester when threat modeling. Explain construction of software model and uses.
Windows limited new enterprise resource planning : Ken 7 Windows Limited new enterprise resource planning (ERP) software expands the size and scope of the Ken 7 Windows Limited computing environment.
Explain PCI compliance to the database administrator : Explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance.
Hackers launch cyber attacks : In this scenario, hackers launch cyber attacks that affect several parts of the nation's financial infrastructure over the course of several weeks.
Academically reviewed articles on net neutrality : Read four academically reviewed articles on Net Neutrality. discuss how net neutrality will affect data networks and the availability of information to business
How do the teams manage their team boundaries : A. Consider the different teams presented in your reading assignment. How do the teams manage their team boundaries?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Flowcharts and pseudo code

Discuss the advantages of each and describe any disadvantages that might make you want to use one method over the other.

  Financial management decisions impact an organization

How do financial management decisions impact an organization? What are the role of taxes in the different legal categories of business organization?

  Software designed to damage or perform undesirable action

Background Malware (short for malicious software) refers to software designed to damage or perform undesirable actions on a computer system. Malware has become an increasingly profitable industry for business savvy hackers. Malware has also become..

  Create an annotated bibliography

For the course project, you will create an annotated bibliography of five sources that cites and describes four of the best Internet resources on a specified topic and one of the best library database resources.

  What are some of the ethical issues

What are some of the ethical issues that security professional use today? Pick at least 3 issues.

  Difference between project scope and product scope

What is the difference between project scope and product scope. Give an example using a software application that one might build to illustrate your answer.

  How can join types be used to develop a schema statement

Describe?how can join types be used to develop a schema statement?

  How can large corporate information systems

How can large corporate information systems such as CRM, ERP, and SCM have value?

  What operations are performed when exiting an interrupt

What operations are performed when exiting an interrupt service routine?

  Table around a bowl of spaghetti

Five silent philosophers sit at a table around a bowl of spaghetti. A fork is placed between each pair of adjacent philosophers.

  Why is phase 2 of the birch algorithm efficient

Why is it bad practice to include two highly correlated inputs to a clustering algorithm?

  Find all loan numbers with a loan value

a. Find all loan numbers with a loan value greater than $50,000. b. Find the names of all depositors who have an account with a value greater than $9,000. c. Find the names of all depositors who have an account with a value greater than $8,000 at the..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd