Preview

Unit 5 Exercise 1 Security

Good Essays
Open Document
Open Document
308 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 5 Exercise 1 Security
C
D
B
A
B
E
D
A & D
A & C
A & D
C
C & D
B
A & C
A
A & B
D
C
B
C
From: System Admin
To: Manager
I have read the issues and I would recommend these steps to better manage our business workstations.
This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.
Team leads need to have access to their files from any workstation. Team leads will be assigned standard roaming users.. Due to the level of access and availability of said access, Team Lead passwords will be set to be changed every other year.
Since to Marketing Staff have dedicated work stations, they will be added to whatever type of user permissions needed per staff.
If you would like these actions to be notified to all your employees regarding this system update through email. We will give it 2 Days regarding the system update to notify all groups.
From: System Admin
To: Manager
I have read the issues and I would recommend these steps to better manage our business workstations.
This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.
Team leads need to have access to their files from any workstation. Team leads will be assigned standard roaming users.. Due to the level of access and availability of said access, Team Lead passwords will be set to be changed every other year.
Since to Marketing Staff have dedicated work stations, they will be added to whatever type of user permissions needed per staff.
If you would like these actions to be notified to all your employees regarding this system update through email. We will give it 2 Days regarding the system update to notify all groups.

You May Also Find These Documents Helpful

  • Good Essays

    Explain the issues and policies organisations must consider when planning computer systems maintenance (P1, M1)…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    With R&D, you will need to take a slightly different approach. To allow access to only the server, you have to first create a domain local group that has some administrative rights. Then you will need to add them to a customized admins group that you have control of. You can then assign the permissions and rights as you create and assign them. Remember to limit access to their local machines only. Through the desktop local user account settings, you will be able to do all of this. This is just one of the approaches you can take. If you choose you can take a different approach. If you have any further questions or problems feel free to contact me again.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Most of the salespeople for Old Reliable Life Insurance are visiting customers in their homes or offices. Today, the salespeople carry a laptop computer to show value projections and cash flow summaries for various policies. Many of them also carry a PDA for appointments and a mobile phone. Julie would like to ensure that salespeople have access to the home office server computers while they are making their sales presentations to customers. In order to do this I have prepared three of the best options, to be reviewed, that I believe would benefit the customer as well as the salesperson.…

    • 596 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Adequate training has to be established for all staff members on how to use the system. Training could be done through the internet or done through IT support. To be able to have the adequate training for all staff members would need access to a PC, the new IT system and the internet. Training should take about two weeks. The…

    • 6284 Words
    • 26 Pages
    Powerful Essays
  • Better Essays

    I don’t really see to many issues with the site. I would suggest upgrading all 45 dell laptops to include client computers to Dell XPS laptops. The XPS is better quality than the Dells they have now but will last longer and perform better and I would switch from Microsoft office to 2010. As for the rest of the network goes, I would use Cat-6 cables instead of the Cat-5. Cat-6 is a thicker wire and will carry data longer distances than Cat-5 and…

    • 1877 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Home Computer FASB

    • 1138 Words
    • 5 Pages

    In January 2002, Home Computer announced a plan to restructure its operations (the “Plan”). The Plan was approved by the Board of Directors at a special meeting on February 3, 2002. The details of the Plan are as follows:…

    • 1138 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Lab 1 Essay Example

    • 504 Words
    • 2 Pages

    Read permission, this permission is necessary to allow the user of a group to get information of another department in the business.…

    • 504 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Admins have access to all files, and other users have access to program files/windows only.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 9 - Email

    • 701 Words
    • 3 Pages

    The following is the email I have created that I feel will not only explain the urgency to the managers but also properly prepare them for this technological advancement.…

    • 701 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It’s important that all members of staff are made aware of any new policies or changes to existing policies. Staff are made aware by staff meetings. It will then need to be agreed by the governing body before it takes effect.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    This is a multi-layered security system that consists of the user’s domain. The user is the first and the weakest link in any system. The security is only as strong as the user’s ability to understand what can go wrong. We can implement a training program session for security awareness. Another security measure is to implement a policy to stop employees from bringing in CD’S, DVD’S, and USB’S or other personal devices into the work place that can connect to the network and possibly harming the system. The work station domain is where users first access the system, applications, and the data. The system should be password coded for authentication purposes. Applications and data ought to be monitored and permissions set accordingly. Downloading should also be limited to only those people with the proper permissions. The LAN domain is a collection of computers all connected to a central switch configured to run all of the company’s data. The LAN would have all the standards, procedures, and guidelines of all the users. I would insure all information closets, demark locations and server rooms are locked and secured at all times. Only those with proper ID or authorization would be allowed to access these locations. The LAN to WAN domain contains both physical and logical designs of the security appliances. For this layer you want to apply security protocols on file transfers, scans, and unknown files. The WAN connects the system to remote locations, such as other PC’s on your system i.e. the other 7 locations on our network. URL filters implemented on the system may ensure limited access to the web sites that are undesirable for business use. “The Remote Access Domain connects users to the organization’s IT infrastructure. Remote access is critical for staff members who work in the field or from home.” It is…

    • 775 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    Break down admin responsabilities and only give them the access for what duties they need to perform. PAM command is a great idea in this scenereo.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    With the users assigned to group accounts or OU’s, you can use to assign a set of permissions and rights to multiple users simultaneously, along with making any changes that are needed to individual users. Computer accounts provide a means for authenticating and auditing computer access to the network and to domain resources. Each computer account must be unique.…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computing devices, such as a desktop computer, has become productivity tools for enterprises and their users. A user’s inability to access the computer due to a computer glitch or understand a certain function prevents the user from completing tasks. Glitches diminish productivity in the enterprise and handicap the goal and mission of the business. Supporting computing devices have become a high demand and many enterprises implement the Information Technology department with Help Desk technicians at the front line. The common bottleneck issue within the Help Desk, in relation to a business, stems from the business practice. The Help Desk is commonly blamed for all issues regarding technology. Because the Help Desk’s practices are not business oriented, it is usually plagued with an overwhelming number of work orders. However, the Help Desk lacks training and have poor processing and tracking procedures to meet business standards. Sig-Sigma’s methodology, DMAIC: analyze, improve, and control, will clarify how the Help Desk can improve in this area.…

    • 841 Words
    • 4 Pages
    Good Essays
  • Good Essays

    HNC/HND Computing System

    • 363 Words
    • 2 Pages

    As an IT professional you find the situation frustrating as the systems function is currently overloaded and…

    • 363 Words
    • 2 Pages
    Good Essays