Preview

Hollis IS3230 Unit 3 Lab3

Good Essays
Open Document
Open Document
766 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hollis IS3230 Unit 3 Lab3
Lab Assessment Questions and Answers

1. What is the Data Classification Standard used in the U.S. Department of Defense (DoD)/Military?Google “Data Classification Standard + DoD”. Summarize the different data classifications.

Top Secret- The highest security level. Information is classified Top Secret if unauthorized disclosure would cause "exceptionally grave damage" to national security

Secret- This is the second-highest classification. Information is classified Secret when its unauthorized disclosure would cause "serious damage" to national security. Most information that is classified is held at the secret sensitivity.

Confidential- This is the lowest classification level of information obtained by the government. It is defined as information that would "damage" national security if publicly disclosed, again, without the proper authorization.

Public Trust- Certain positions which require access to sensitive information, but not information which is classified, must obtain this designation through a background check. Public Trust Positions can either be moderate-risk or high-risk.

Unclassified- Is not actually a classification level, it is the lack of classification level. It is used for information that the government has not classified under the security classification system

2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.

Create a new domain wide GPO and enable "Deny logon locally" user right to the source domain user accounts and disable multiple logon. Teach strong password use and force change through Password GPO.

3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?

List Folder/Read Data, Read Attributes, Read Extended Attributes, Create Files/Write Data, Create Folders/Append Data, Write Attributes, Write Extended Attributes, Read Permissions,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    The benefits of Data classification policy, is it can reduce costs and administration overhead. It helps business discover what data they hold, where it’s located, and who can have access to it and how long it must be retained, as well as what level of protection it should receive and what type of media it should be retained to meet legal and regulatory requirements. Data classification is something that should be well planned especially when working with large amounts of data and be able to discover them.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    iv. Users or workforce members must not allow another user or workforce member to use their unique user identification or password.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The term confidentiality means whatever information you give will not be shared or passed on.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    You will learn how to determine the impact of a data classification standard on an organization's IT infrastructure.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The CIA refers to the triad of three concepts included in the information sharing and communication within and outside the organizations. this CIA is the short term for the Confidentiality, integrity and Availability. these three concept are also the three properties of the CIA. the confidentiality is actually related with the fact that any piece of information that is an importance resource of the organization like one of its trade secret or any of the reason behind its competitive advantage should not be leaked out of the company in an unethical or corruptive manner. the information must be tried to keep safe with high responsibility and importance must be given to protection of confidentiality. the integrity refers to the moral values in…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Clearance Info

    • 8089 Words
    • 33 Pages

    The Defense Industrial Security Clearance Office (DISCO) is part of the Defense Security Service (DSS), an…

    • 8089 Words
    • 33 Pages
    Powerful Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    groups that suited the requirements in the scenario. Finally, you applied those security groups to the folder…

    • 336 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (TCO 1) Each _____ has one or more access control entries (ACEs) that state which objects have permissions to the file or folder and what permissions they have.…

    • 2202 Words
    • 36 Pages
    Satisfactory Essays
  • Powerful Essays

    sgbrsgsr

    • 7754 Words
    • 50 Pages

    NOTES FOR THE TEACHER CHAPTER 2: SECTORS OF THE INDIAN ECONOMY An economy is best understood when we study its components or sectors. Sectoral classification can be done on the basis of several criteria. In this chapter, three types of classifications are discussed: primary/secondary/tertiary; organised/ unorganised; and public/private. You can create a discussion about these types by taking examples familiar to the students and relate them to their daily life.…

    • 7754 Words
    • 50 Pages
    Powerful Essays
  • Good Essays

    sensitive item

    • 294 Words
    • 1 Page

    Operational security is a process that denied critical information to an adversary. If one were to obtain the information presented it could be used against friendly forces. Utilizing all assets to maintain and secure sensitive items and classified information promote proper operational security and soldier readiness. Not securing items of sensitive nature acquire the risk of loss by being intercepted by unauthorized persons. All personnel should maintain accountability of all sensitive material to allow full utilization by themselves and anyone involved with the mission and still maintain operational security. Operational security can be compromised through the loss of sensitive items due to loss of equipment used for operational planning, or items used for support missions. Depending on the sensitive item that is being classified it could fall under a different level of security as it is deemed by the U.S. Government. The levels included in the term classified (withheld from general circulation for reasons of national security) are RESTRICTED (public disclosure could have undesirable effects or do some harm), CONFIDENTIAL (unauthorized disclosure could damage national security e.g. compromise information that indicates the strength of armed forces or disclosure of technical information about weapons), SECRET (unauthorized disclosure could seriously damage national security) and TOP…

    • 294 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    With respect to governmental information, any government may distinguish which materials are public or protected from disclosure to the public based on classification of information as sensitive, classified or secret and being otherwise protected from…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Trade Secrets

    • 2228 Words
    • 9 Pages

    * The information must be secret (i.e. it is not generally known among, or readily accessible to, circles that normally deal with the kind of information in question).…

    • 2228 Words
    • 9 Pages
    Best Essays