Preview

CIS 333 Week % Lab Assignment 4

Good Essays
Open Document
Open Document
668 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CIS 333 Week % Lab Assignment 4
Lab Assessment Questions & Answers

1. Define why change control management is relevant to security operations in an organization.

Change control is a precision arrangement of managing every change made to a system. This is to ensure that no unneeded changes are done, that every change is documented, and that no service is disrupted unless absolutely necessary, and that all resources efficiently used.

2. What type of access control system uses security labels?

A LBA C Label Base Access Control

3. Describe two options you would enable in a Windows Domain password policy.

Password must meet complexity requirements
Minimum Password length

4. Where would patch management and software updates fall under in security operations and management? Procedures/ The SA or other personnel to be the responsible authority in informing all local authorities about patches that are related to software packages included on the entire inventory of the organizations software.

Also in Procedures/ Additionally, any post-patch update distributions to the Database/Management Configuration Plan will be executed immediately after any patching has been done.
5. Is there a setting in your GPO to specify how many logon attempts will lock out an account?

Yes, The Account Lockout Threshold can be set, this policy determines the number of failed attempts to logon, before the users’ account becomes locked. Once locked, it can not be used unless it is reset by an Administrator, or until the accounts lockout duration expires. A value of up to 999 failed logon attempts can be set, or you may set the value to zero, to allow the account to never be locked out.

Name two parameters that you can set to enhance the access control to the system.

Account Policies/ Password must meet Complexity Requirements.
Also in Account Policies/ Account Lockout Threshold

6. What are some password policy parameter options you

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    10. Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Microsoft SharePoint Server…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. The data link layer checks the data-link trailer to see if the data is in error.…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3

    • 606 Words
    • 3 Pages

    According to my site coordinator she feels as if data security is doing well. She stated that feels this way because the data security makes it hard to get into the system but does not make it difficult to get out. One area she would like to see improvement in is shorter log off times. For example, if an employee walks away from the computer and patient information is still displayed she would like to see a warning appear after 3 minutes of idle time warning that the information will be closed unless clicking the warning box.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Com 135 Week 5 Analysis

    • 678 Words
    • 3 Pages

    Check the user's password strength. Use the Week 3 You Decide as the data for this section.…

    • 678 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It Info 1

    • 420 Words
    • 2 Pages

    ☐ No; we should require a series of security questions at each login attempt to validate the users.…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    The applications, and any access logs are closely monitored to make sure any unauthorized user is not trying to gain access to confidential documents. The application should also restrict users with multiple sets of keys to be used in combination to login and gain access to make sure the authorized user is logging in.…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Icas Inkwell

    • 359 Words
    • 2 Pages

    Change the password on each computer and remind everyone to regularly change it, for instance, every six months. In addition, arrange a meeting with the staff and explain the policy with examples what may happen, if the staff does not comply with the policy. Point out that, if the rules continue to be broken, disciplinary actions would be taken.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Ethics

    • 1702 Words
    • 7 Pages

    In contrast in real life, students log in to university systems by using their user id and pass words. When they leave they should log off their accounts. But sometimes because of their carelessness they forget to do than and leave that as it is. So when situations like that anyone can use their login and do anything they want. (University of Miami, 1997-2008)…

    • 1702 Words
    • 7 Pages
    Better Essays
  • Good Essays

    safety paper

    • 766 Words
    • 4 Pages

    Lock out tag out is very important and every employee should know the rules and regulations with it. The first thing to do with is to place a tag on each disconnecting means so that t de-energizes the machine and or circuits. There all so should be a lock on these disconnects. The most important thing is that only the person who put the tag on the machine or electrical circuit can remove the lock and put the machine back in to operation.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Think for a moment how many buildings or facilities that you know of that don’t have at least a lock on the door. In todays civilized society we unfortunately also have crime and lots of it. Because of this, we must have access control. The main reason for controlling access is to prevent someone from entering that may want to steal and damage property or cause harm to those…

    • 1765 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    limited capabilities until the user registers the program and receives a code to unlock the…

    • 1289 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Sam Implementation Steps

    • 379 Words
    • 2 Pages

    To ensure new software is added to the company‘s software inventory. The steps should cover…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

     Adjust the security…

    • 334 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Goals And Objectives

    • 1500 Words
    • 5 Pages

    5. Develop guidelines for IT administrators to follow which will ensure future changes within ABC Inc.’s network footprint will conform to established software patching practices…

    • 1500 Words
    • 5 Pages
    Good Essays