IS3340: Week 1 Assignment 1: Adding Active Directory Bob Johnson IS3340: Windows Security 11/02/2014 Arthur Salmon When evaluating the current set up for all of the PCs that we have at Ken 7 Windows and the purchase of a new enterprise resource planning (ERP) software package, I would definitely recommend that we use Active Directory (AD). There are several reasons to use AD. I will give a few reasons why we should use AD. My first reason is that with the purchase of the new servers
Words: 469 - Pages: 2
56 Lab #3 | Configure BitLocker and Windows Encryption LAB #3 – ASSESSMENT WORKSHEET Configure BitLocker and Windows Encryption Course Name and Number: IS3340 Windows Security Student Name: Daniel Longo Instructor Name: Dakrouni Lab Due Date: 10/4/2013 Overview In this lab, you used the Microsoft® Encrypting File System (EFS) to encrypt files and folders on a Windows Server 2008 machine. You documented the success or failure of your encryption efforts. You also installed
Words: 279 - Pages: 2
ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine
Words: 2305 - Pages: 10
IS3340-WINDOWS SECURITY | Recommendations for Access Controls | Unit 2 Assignment 1 | | [Type the author name] | 4/3/2014 | | Access Control is the defined as “the selective restriction of access to a place or other resource”, in the RFC 4949. “The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.” Simply put the ability to read, write, modify, or deleting information or files is what Access Control is. It is more
Words: 436 - Pages: 2
IS3340-WINDOWS SECURITY | BEST PRACTICES IN MANAGING CHANCES TO WINDOWS SYSTEMS AND APPLICATIONS | UNIT 10 DISCUSSION 1 | | | 5/29/2014 | | Just as Ken 7 Windows Limited is experiencing Denial of Service attacks, many corporate websites have suffered from illegal DoS attacks more than once. Companies that learn how to turn these experiences to their advantage go a long way to ensuring it doesn't happen again. The summary of what is being seen on the infrastructure is
Words: 435 - Pages: 2
IS3340-WINDOWS SECURITY | Auditing Tools for Windows System | Unit 4 Assignment 1 | | | 5/1/2014 | | 1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2008 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been installed. Which tool would be the best choice?. MBSA
Words: 271 - Pages: 2
IS3340-WINDOWS SECURITY | Lab #2 | Assessment Worksheet | | [Type the author name] | 4/3/2014 | | 1. What is the Principle of Least Privilege? Providing only the necessary access required to carry out a task. 2. What does DACL stands for and what does it mean? Discretionary Access Control List is the list of access control rules (ACL’s). 3. Why would you add permissions to a group instead of the individual? Management of the permissions (add/remove) is easier
Words: 331 - Pages: 2
IS3340-WINDOWS SECURITY | Encryption and BitLocker Activity | Unit 3 Assignment 1 | | | 5/1/2014 | | 1. One of the shop floor computers that is connected to your network is commonly used by the floor manager. You want the floor manager’s files to be encrypted on that computer. Although the floor manager’s documents folder is on a central server, there are some local temporary files that could contain sensitive information and should be encrypted at all times. Which Windows
Words: 294 - Pages: 2
IS3340-WINDOWS SECURITY | Security Audit Procedure Guide | Unit 5 Assignment 3 | | [Type the author name] | 5/1/2014 | | This document outlines the required steps to follow, inorder to properly scan the necessary hardware (servers and workstations) in the Ken 7 Windows Limited Domain for security vulnerabilities. 1) Acquire and install MBSA •Download MBSA. Download MBSA from the MBSA home page, and then install it to the default directory. •Updates for MBSA. If both the computer
Words: 487 - Pages: 2
IS3340-WINDOWS SECURITY | Minimizing Recovery Time Strategies | Unit 6 Assignment 1 | | | 5/5/2014 | | This document outlines the required steps to follow, in-order to properly scan the necessary servers and workstations in the Ken 7 Windows Limited Domain for security vulnerabilities. 1) Acquire and install MBSA(Microsoft Baseline Security Anaylizer) •Download MBSA. Download MBSA from the MBSA home page, and then install it to the default directory. •Updates for MBSA
Words: 487 - Pages: 2