Preview

Nt1330 Unit 1 Case Study

Good Essays
Open Document
Open Document
825 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 1 Case Study
Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.

When configuring windows networking, two major approaches are valid to secure all the network resources, the workgroup approach and the Domain approach. The workgroup approach is simply to create a windows peer-to-peer network with a decentralized security system. This workgroup security approach
…show more content…
Some advantages of using this type of scenario include the ability to manage windows workgroup since has a small number of computers that can be managed individually. Application servers, services or workstation software can be run off one or few machines rather than employing extensive active directory schema changes to be accomplished in a domain model. Complying with third party vendors' software and hardware can be achieved in a simple manner and migrating or installing new operating systems is an easy task that it would not be an option in a Windows Active Directory domain.

This simplicity comes to a price since by deploying a windows workgroup, other functionality and advantages of a Domain model is lost or not applicable and security can be compromised. For example, when deploying a patch or fix, each workstation has to be configured individually. Another example is that installing a new application in each computer requires the installation and configuration of each machine. Furthermore, in this model when user connect via VPN if they transmit copies of their files unencrypted, the security of the network and information is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 4 Case Study

    • 294 Words
    • 2 Pages

    A) Thingamajigs and Things has total assets of $45,000 and $9,000 in liabilities. This gives a current ratio of 5.00:1. Wannabees has total assets of $150,000 and $85,000 in liabilities. This gives a current ratio of 1.76:1. Thingamajigs and Things is more likely to be approved for a loan, because it has a higher current ration. This means that their assets are higher than their liabilities (what they owe), and they are more likely to be able to make payments.…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Case Study

    • 747 Words
    • 3 Pages

    Because of the specific words used that sentence they would have to use a direct distribution method.…

    • 747 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Check the linearity of the Black Box by connecting the DC Power Supply to the input of the Black Box, and the Multimeter to the output of the Black Box, then change the input voltage regularly and notice the changing in the output voltage of the Black Box.…

    • 237 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 2 Review Paper

    • 1508 Words
    • 7 Pages

    9- Which of the following stress or strength parameters is used in the computation of the force in an extrusion operation (one best answer): (a) average flow stress, (b) compression strength, (c) final flow stress, (d) tensile strength, (e) yield strength?…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    IS3110: Unit 1 Role Scenario 1) Identify threats to the seven domains of IT within the organization: A. User: Destroy data B. Workstation: Loss of data, not updated C. LAN: Unauthorized user, weak password D. LAN –WAN: Hackers, weak traffic filtering E. WAN- FTP anon uploads, DoS/DDoS F. System Application: Fire, DoS/DDoS, SQL injection corrupting data G. Remote: user virus, remote from office unsecure, VPN tunnel hack 2) Identify vulnerabilities in the seven domains of IT within the organization. A. User: Infected media, social engineering B. Workstation: OS vulnerability, browser vulnerability C. LAN: Worms, LAN OS vulnerability D. LAN-WAN: malicious websites, unblocked ports E. WAN: network outages F. System Application: ISP…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. One can differentiate between the terms health record and health information by identifying their main purpose in the health community. Health records are the type of information regarding family history, diagnosis, complaints, or patient’s medications. Health information requires analyzing medical information and provides protection.…

    • 211 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ISO 17025 Certification, the general requirements for the competence to carry out tests and calibrations, including sampling. It handles testing and calibration carried out using standard methods, non-standard methods and laboratory-developed methods. It applies to all organizations that tests and calibrations. These include, first, second and third - party laboratories, and laboratories where testing and calibration forms part of inspection and product certification.…

    • 498 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    · S/W Environment: Minimum one Web Browser should be installed before PC installation, Use IE 5.5 or higher, Go to Tools > Internet Options > Security tab and click on Custom Level button and make sure that under the Scripting section the Active Scripting is set to “Enable”.…

    • 1858 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Case Study

    • 685 Words
    • 3 Pages

    What can you do to benefit the server: Starting off, I would take care of the chat for the server so that the environment is family friendly. Later on, I would attempt to deal with more blatant rule breakers such as hackers and or people whom abuse glitches or bugs to take advantage of anything. If anyone breaks the rules with the exception of hackers (instantly taken action against) I will first give them a verbal warning so they know they shouldn't repeat what they just did. If did again, either action or another verbal warning will be issued but the third time will call for immediate action. Considering the timezones, I can catch the more 'blatant' rule breakers whom could be ruining the experiences of players in my timezone where other staff aren't online or…

    • 685 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    There are many administration advantages for Windows Servers. One aspect is domain operations which are an important resource available on the network through Window Server. Making Window Server a domain controller adds security and the ability to add local and group policies to the network (Garza, 2010). If Window Server is not promoted to the status of a domain controller, then it can run simple network operations using peer-to-peer structures (Garza, 2010). These are workgroups, and they can only block or allow access but do not provide control features for the network. The numbers of applications that are available to run in the Window Server environment are numerous these include financial apps, database programs, and e-mail exchange operations as well as web server and Internet programs (Garza, 2010). Windows Server local policies have the ability to perform certain operational commands. These are operations available to the domain controller network system. This means that Window Server can centralize user and computer access. Only one machine needs to be configured as the Domain Controller rather than all machines on the network.…

    • 3411 Words
    • 14 Pages
    Better Essays
  • Better Essays

    Sales and marketing are not the only ones that will benefit from an intranet network at Dirt Bikes, human resources would be able to upload and store their employee related information such as employee policies, handbooks, benefits, meetings and schedules. This would reduce a great amount of paper being used at the company plus reduce the risk of losing or misplacing this information. Employees that are new could download this information onto their desktops and read from their instead of having a desk full of booklets or…

    • 1204 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Riordan Enterprises has requested to look into the possibility of adding wireless capabilities to their existing network. The need for wireless is understandable. It enables employees to be productive from anywhere. If they need to travel to a potential customer in Montana, or are at a plastics conference in Hawaii the ability to connect to the Riordan’s intranet is vital. Not only does it allow the employee to continue to stay connected with work, it also allows them to share the intranet and all it has to offer to potential clients, as well as offering those potential clients use of the system for easier ordering and up to date financial and tracking information regarding their purchases. This is why a Virtual Private Network would be a good tool to add to the Riordan tool bag. It will allow the current network to stay intact as well as adding the ability to access the network from anywhere. This adds in the efficiency and productivity of Riordan and its many employees and global locations.…

    • 2267 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    With the Active Directory service of Windows® 2000, organizations can simplify user and resource management while creating a scalable, secure, and manageable infrastructure for deploying additional important and emerging technologies.…

    • 9617 Words
    • 39 Pages
    Good Essays
  • Powerful Essays

    While managing applications in distributed environments, you need to secure the network applications from unauthorized access by applying the security policies and restriction levels. Applying security policies and restriction for the applications will enable you to control access to the applications and prevent data from being modified by unauthorized users. In this topic, you will set up security policies and restrictions.…

    • 10897 Words
    • 44 Pages
    Powerful Essays