IT278 IT/278 IT 278 Unit 8 Assignment 2 -{{kaplan}}
IT278 IT/278 IT 278 Unit 8 Assignment 2 -{{kaplan}}
IT278 IT/278 IT 278 Unit 8 Assignment 2 -{{kaplan}}
- No tags were found...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong><strong>IT</strong><strong>278</strong></strong> <strong>IT</strong>/<strong>278</strong> <strong>IT</strong> <strong>278</strong> <strong>Unit</strong> 8 <strong>Assignment</strong> 2 -{{<strong>kaplan</strong>}}<br />
Download here<br />
<strong><strong>IT</strong><strong>278</strong></strong> <strong>IT</strong>/<strong>278</strong> <strong>IT</strong> <strong>278</strong> <strong>Unit</strong> 8 <strong>Assignment</strong> 2 -{{<strong>kaplan</strong>}} In this <strong>Assignment</strong>, you will create a 2 page report consisting of an<br />
embedded Excel spreadsheet and a 1 page summary section for observations and conclusions. Scenario: Your<br />
immediate supervisor, the Vice President of Information Technology, has a major concern. He just returned from a<br />
security conference and his awareness of the need to ensure that the network is fully protected has increased. In<br />
particular, he supposes that your organization does not have the correct processes in place to ensure effective and<br />
secure user management practices on the network and on the associated servers. He has asked you to investigate and<br />
to create a very concise, 2 page report on your findings. Your work will entail conducting an investigation and collecting<br />
valid evidence on user rights, administrative and other privileges from a variety of sources within your organization. You<br />
will utilize the principle of least privilege to inform your best practice analysis. Determine the sources of the data, and the<br />
nature of the data (what attributes the data set contains.) Assume a Windows 2012 Server based LAN, 8<br />
Workstations, 10 current users, 1 Production Application Server, 1 Development Server, 1 Database Server. Use your<br />
imagination and knowledge of Windows 2012 to create appropriate groups and roles for your sample data. All the<br />
workstations belong to a development team. Roles vary, there is a system admin, a team lead for each of the various<br />
projects, and all developers are not assigned to all projects. There is normal turnover of employees in the department.<br />
The LAN is standalone and is not associated with a larger LAN.<br />
Page 1/{nb}