...assignment is due by the beginning of class for Unit 4. 1. What is the significance of creating Groups and adding Users to Groups? Explain. Creating groups and adding users to their groups is a form of access control. It basically separates each user into their own departments and allows only authorized users to access the file or directory. For instance, a user from the HR group will be able to access the "HR Records" file but are not allowed to access the Marketing Department files. 2. Given, the scenario where there are 5 database administrators that may periodically need to access to a given system. Discuss a concept to better manage these administrators’ access permissions. For the 5 database administrators, an account and password will be created for each user. A new group will be created for the users and then they will be added to the group. Group permissions can be defined within their departments direct which only the database administrators are allowed access. 3. The new web administrator’s account has been set up and a password provided. What is the process to force a password change upon first login? To force a user to change their password on the initial login, they must use the following command: chage -d 0 [username] 4. What is the purpose of the “su” command? Explain the significance. The purpose of typing the su command will allow a user to run root command without actually giving them root privileges. 5. Restricting the use of SU command can be configured...
Words: 556 - Pages: 3
...Manage User Account Access The account policy for first World Bank would be a very simple and easy policy. Basically all personnel will only have one account at a time, each person will only have their account on the system that they have business being on. You can be assigned to multiple groups within the system if need be. Before anyone can be added to the system, they will have to read and sign the User Account Policy; this will make sure that no one can say that they “didn’t know”. Now for creating users and groups there will be no special permissions in order to “create” them but when it comes to the specific users and groups there will be. The Web Administrators will have their own permissions and groups, the Linux administrators will have their own users and group, and the Security Analyst will have their own groups. I think that there should be a group set up so that all departments can talk with each only to help each other and inform each other of certain things. The Security group I feel should have access to the maintenance group so that they can get regular updates and patches, and to the Web Admin group so they can apply the updates/patches. Web and Linux groups will not have access to the Security so that way no one can go in and change anything with security. The Web admin and Linux admin will have permissions for each other so they can make changes that are needed but they will only have certain permissions for that, for example, Linux will not be able to...
Words: 300 - Pages: 2
...Unit 6 Exercise - AD User and Group Account Creation TO: Junior Admin FROM: IT Admin Create a user account in Active Directory 1 Open Active Directory Users and Computers. 2 In the console tree, right-click the folder in which you want to add a user account. (Active Directory Users and Computers/domain node/folder) 3 Point to New, and then click User. 4 In First name, type the user's first name. 5 In Initials, type the user's initials. 6 In Last name, type the user's last name. 7 Modify Full name to add initials or reverse order of first and last names. 8 In User logon name, type the user logon name, click the UPN suffix in the drop-down list, and then click Next. 9 If the user will use a different name to log on to computers running Windows 95, Windows 98, or Windows NT, then you can change the user logon name as it appears in User logon name (pre-Windows 2000) to the different name. 10 In Password and Confirm password, type the user's password, and then select the appropriate password options. To perform this procedure, you must be a member of the Account Operators group, Domain Admins group, or the Enterprise Admins group in Active Directory, or you must have been delegated the appropriate authority. As a security best practice, consider using Run as to perform this procedure. For more information, see Default local groups, Default groups, and Using Run as. To open Active Directory Users and Computers, click Start, click...
Words: 596 - Pages: 3
...Open Active Directory Users and Computers. 2 In the console tree, right-click the folder in which you want to add a user account. (Active Directory Users and Computers/domain node/folder) 3 Point to New, and then click User. 4 In First name, type the user's first name. 5 In Initials, type the user's initials. 6 In Last name, type the user's last name. 7 Modify Full name to add initials or reverse order of first and last names. 8 In User logon name, type the user logon name, click the UPN suffix in the drop-down list, and then click Next. 9 If the user will use a different name to log on to computers running Windows 95, Windows 98, or Windows NT, then you can change the user logon name as it appears in User logon name (pre-Windows 2000) to the different name. 10 In Password and Confirm password, type the user's password, and then select the appropriate password options. To perform this procedure, you must be a member of the Account Operators group, Domain Admins group, or the Enterprise Admins group in Active Directory, or you must have been delegated the appropriate authority. As a security best practice, consider using Run as to perform this procedure. For more information, see Default local groups, Default groups, and Using Run as. To open Active Directory Users and Computers, click Start, click Control Panel, double-click Administrative Tools, and then double-click Active Directory Users and Computers. To add a user, you can also click on...
Words: 317 - Pages: 2
...Lesson 1 Knowledge Assessment Fill in the Blank 1. Enterprise, Ultimate, and Starter 2. Minwin 3. Save Location 4. Search connectors 5. Window Vista Business 6. 0 megabytes 7. User State Migration 8. Aero Peak 9. (32 bit) 4GB, (64 bit) 192GB True/False 1. F 2. F 3. T 4. F 5. T 6. F 7. T 8. F 9. F 10. F Review Question 1. All of the editions are included on a single DVD disk. The operating system setup program determines which edition to install from the product key you enter during the installation process. 2. ReadyBoost – Windows Vista and Windows 7 enables a computer to utilize an external storage device as a cache for data that would ordinarily be swapped to a (slower) hard disk. In Windows 7 version of ReadyBoost enhances the system’s caching capability by supporting larger caches on as many as eight external devices simultaneously. Lesson 2 Knowledge Assessment Fill in the Blank 1. Side by side, and wipe and load 2. Window RE (window Recovery Environment) 3. Easy transfer or User State migration tool 4. 72 Hours 5. Floppy Disk 6. MUI Multi Language User Interface 7. RAM Disk 8. Clean Install 9. User Profile Folders 10. Networking and NTFS True/False 1. F 2. F 3. T 4. T 5. T 6. F 7. F 8. T 9. F 10. F Review Question 1. a. Native 32-bit and 64-bit support. (Enables the computer to address memory...
Words: 1677 - Pages: 7
...Configuration 6 Thumb Drives 7 Email Account 7 Account Management 7 Wireless Network 8 Security Policy Part 2 8 Missing 9 Incomplete 9 Inaccurate 10 Ill advised 10 References 12 Abstract This paper is based on two companies and their security policies. Some companies have a security policy that is complete and some companies have a security policy that is incomplete. The company that has a complete security policy will be able to activate that policy when a security violation occurs. The users and network administrator will know exactly what to do to mitigate the incident. The policy should have a corrective action section that will guide the people involved on how to handle the incident. Then there are those companies that have an incomplete plan so when a security violation occurs the whole company is in an up roar because they do not know what to do. These companies will have to mitigate the incident as they go and when this happens the process is not complete leaving things left undone. The best practice for every company is to have a complete and accurate security plan that is reviewed annually. The Security Policy Security Policy Part 1 I work for a hospital so network security is very important when it comes to keeping patient data safe. Ten things that are subject to compromise are: computers, switches, personal drives, patient database, department shared drives, network configuration, authorized thumb drives, email, account management, and the wireless...
Words: 2464 - Pages: 10
...Hacking: Understanding It All John Williams INF 103: Computer Literacy Thomas Hennefer June 14, 2010 Abstract As technology has grown, so has the dependence of society on its role in everyday life. Like many things, this dependence on technology comes at a risk. Hacking is the risk that members of society must face. Hackers can find any information they wish to acquire, which puts information, such as finances and personal, at great risk. In order to understand how to prevent hacking, one must first understand what is at risk to be hacked and the way in which the act is done. Technology has become a constant part of every day life. People now manage their bank accounts, pay bills, deal with highly confidential information, and even personal information online. All these aspects of technology in daily life are a temptation to others throughout the internet. Those who find themselves tempted perform the task of hacking, which leaves others and their personal information vulnerable. This paper will discuss society’s reliance of technology in all aspects of life; thereby, leaving personal information vulnerable. Also being discussed will be information hackers find tempting, the steps that some take to hack into systems allowing them access to normally unavailable information and the steps that can be used to help prevent hacking from occurring. Method In the task of preventing hackers from gaining access to information that could be harmful to the individual, you must...
Words: 2876 - Pages: 12
...TECHNICAL INFRASTRUCTURE NEEDS (Task 2) Thanks to the task team assigned to this project, an outline of what the network and routing needs has already been completed. The following services will be required to support: • A database server o Recommended solution: DBMS MySQL • A Web server o Recommended solution: Apache • A file server o Recommended solution: Red Hat Enterprise/Samba • An SMTP (Simple Mail Transfer Protocol) server o Recommended solution: hMail • An LDAP (Lightweight Directory Access Protocol) server o Recommended solution: Apache Directory Server DBMS MySQL: Oracle has several “best practice” recommendations for MySQL , including but not limited to: changing default settings, restricting use of privileged accounts, using dedicated...
Words: 1376 - Pages: 6
...Claudia Goodman IT302 Homework 2 Security-Enhanced Linux The NSA has long been involved with the computer security research community in investigating a wide range of computer security topics including operating system security. It recognizes the critical role of operating system security mechanisms in supporting security at higher levels. End systems must be able to enforce confidentiality and integrity requirements to provide system security. Unfortunately, existing mainstream operating systems lack the critical security feature required for enforcing separation: mandatory access control. Application security mechanisms are vulnerable to tampering and bypass, and malicious or flawed applications can easily cause failures in system security. The results of several of these projects in this area have yielded a strong, flexible mandatory access control architecture called Flask. This has been mainstreamed into Linux and ported to several other systems, including the Solaris™ operating system, the FreeBSD® operating system, and the Darwin kernel. This provides a mechanism to enforce the separation of information based on confidentiality and integrity requirements and it allows threats of tampering and bypassing of application security mechanisms to be addressed while enabling the confinement of damage that can be caused by malicious or flawed applications. This is simply an example of how mandatory access controls that can confine the actions of any process, including an...
Words: 1522 - Pages: 7
...Rasakan kelajuan laptop anda. Gunalah Sound Effects seminimum yang boleh Disable mana yang patut dengan cara: 1. Klik Start. Pilih search dan taip mmsys.cpl dan Enter 2. Di window Sound (rujuk gambarajah), klik tab Sound 3. Set Sounds scheme kepada ‘No Sounds‘ 4. Anda juga boleh memilih apa-apa jenis Sound untuk ‘disable’kan mengikut kesesuaian anda. 5. Seelok-eloknya disable “Play Windows Startup sound“. 6. Klik Apply dan OK. Disable Outrun Disable UAC. Memang penat setiap kali korang bukak application @ software lepas tu keluar prompt sama ada nak run atau tak. Bagi sapa2 yang tak pasti aku cakap pasal apa korang rujuk gambar bawah ni. Haha..memang bengangkan. Untuk disablekan --> Buka control panel -> User...
Words: 411 - Pages: 2
...classification of a vulnerability is security bug or defect, where a firewall may be out of date or in this case, Windows Defender is significantly out of date leaving the system with a window of vulnerability to attacks. This window would be from when the bug was discovered, access was removed, a fix was available and if or when an attack was disabled. Windows Defender was designed as a free software to defend against unwanted attacks as a combination of Microsoft Security essentials. With proper security patch updating, Windows should have minimal security bug and any other vulnerabilities present in the system. It is still recommended to have some additional Antivirus program depending on the daily use of the system. This means that if the user is downloading a lot of programs, music, movies from the internet, then it is recommended to have good programs defending your system and also to alert you of intrusion. Windows, when designed was not designed with internet...
Words: 986 - Pages: 4
...Policy, DNS, File Services, Remote Services, and WSUS (Windows Server Update Services). These major roles have features that will make Shiv LLC Company’s infrastructure run smoothly. Active Directory Shiv LLC will have sites across a large geographic location. Because of this, a regional domain model should be used. Domains will be broken down into where users are working. For example, currently Shiv LLC has three locations, Los Angeles, Dallas, and Houston. This means there will be three domains, representing each of these cities. This strategy will make sure the network can be maintained by regional administrators, who will only worry about users in their area of the network. With this style of deployment, it can be difficult to decide what will be the forest root domain. The main staff for the company is in two cities, Dallas and Houston. This makes it difficult to make one of these sites the forest root domain. To make this decision neutral, a dedicated forest root domain can be suggested. This domain will be created only to function as the forest root. It will not contain and users, except for service administrator accounts for the forest root. It will not represent any geographical region of the network, and the other domains (each of the three cities) will be the children. The dedicated root will not affect any changes that could be made to other sites, and it is neutral, meaning no region will appear to be a subordinate of another region ("Selecting the Forest Root Domain")...
Words: 466 - Pages: 2
...what would seem to most companies catastrophic errors in releasing products such as Vista. Enough of why Windows can get away with this and let’s jump into some of the features and how Windows 7 became what it is today. Let’s start with the notorious UAC feature. User Account Control is still part of Windows 7. However, Microsoft has tweaked the feature so that it's less intrusive, but it's not clear whether that means you're actually more or less secure than you were in Vista. UAC was one of the biggest changes in Vista. It made the OS overall more secure than previous versions of Windows and that was probably the biggest complaint about other versions of Windows, the security. Overall I feel it was a step in the right direction. There is only so much you can do to secure an OS once it’s in the hands of the user and I think the overall goal of the UAC implementation was to try to get the user to understand what he or she is doing could potentially infect their PC. The feature ended up making everyone from the educated user to the novice mad or frustrated at the fact that you constantly had to enter your log-in information. I feel that they now have it almost where it should be in Windows 7 by giving the user options. Windows 7 was also a success due to the testing that the OS went through before release. The...
Words: 632 - Pages: 3
...Robert Reed; desktop hardware/ Dr.Wofford/ set 2013 Project 2; Installing Windows 7 1. Check and see if your hardware can support the OS. A lot of hardware makers have chosen to not to produce Windows 7. The easiest way to do this is to download, install, and run the Windows 7 upgrade adviser on your machine before you upgrade to Windows 7. If you are not sure that your devises will work under Windows 7, think about setting up a duel boot. A duel boot lets you to install the new OS without messing with the older ones. So you can boot to either OS. After the install, you can test your applications and your hardware. 2. Check for performance warning. Makers are shifting from strategic management to reformate-based management of their information systems. Companies carefully think both strategic advantage and their costs. They use productivity, return on their investment ROI, net present value, and other measures of performance to evaluate the contributions their information systems make to their business. 3. Check the reliability monitor. Performance monitor. Performance monitor can be accessed from your actions center, or a command and prompt. Enter redmon.exe. Use it to view information about how hardware cups, memory, hare drive, and networks are used by processed and services. It can help you identify a performance monitor in one window and call it reliability and performance monitor. 4. Disable the indexer for windows search. Windows 7 does not support indexer...
Words: 506 - Pages: 3
...2011 (.ZIP, 1.8 Mb) Click here to download the MegaStat® User’s Guide (PDF, 3.5 Mb) System Requirements: Operating system (32 or 64 bit): Windows® XP® / Vista® / 7® / 8® and Mac® OS-X® Excel® 32 bit versions: 2007 / 2010 / 2013 and Excel® Mac®: 2011 You must use the version designed for your operating system. If you want more technical details regarding MegaStat® system requirements and the installation process, see the FAQ document posted at www.mhhe.com/megastat. MegaStat® Start-up Instructions How to Install the Windows® version: After clicking on the link above, you will be prompted to run or save the file. Click ‘Run’ and the add-in will install to a default add-ins directory. You will also get a pop-up window for User Account Control. Click Yes to proceed. It is recommended that you accept all default settings as the program prompts during the installation. You must exit Excel® before running the installation program. The file you are running is an executable (.exe). Some firewalls may block .exe files for security purposes. If you receive warnings when you try to download/run this file, please follow the instructions of your firewall program to allow this download. NOTE: You may need administrative rights to install this software on your computer. To activate MegaStat: After running the MegaStat® installer program, you need to get MegaStat® on the Excel Add-Ins ribbon by doing the following steps. You should only have to do this once. 1....
Words: 1007 - Pages: 5