Premium Essay

Unit 7 Assignment 1 Ad Password Policy Planning

In: Science

Submitted By jventura
Words 470
Pages 2
Unit 7 Assignment 1 AD Password Policy Planning
TO: Client

I can understand you’re concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose productivity over trying to secure your networks information. Simple measure like user names and passwords can be used to protect less sensitive information however how strong you make those usernames and passwords can have a great effect on how well your information is protected. I’m going to give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, retinal scanners, etc. but I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the “Active Directory Users and Computers” in the Domain icon in the left pane click on the “Users” icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “JVentura10415867@Domain*%$.Local” if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I recommend that they be alpha numeric and what this means is that they should be at least eight characters long, be composed of upper...

Similar Documents

Free Essay

Unit 7 Assignment 1

...Unit 7 Assignment 1: AD Password Policy Planning TO: Client I can understand you’re concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose productivity over trying to secure your networks information. I’m going to give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, and retinal scanners.   I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the “Active Directory Users and Computers” in the Domain icon in the left pane click on the “Users” icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I......

Words: 388 - Pages: 2

Premium Essay

Cmit 495 Implementation Plan

...World-Wide Trading Company: Project Implementation Plan Group 3 Kristine Bird (AD Forest Domain OU, Groups and GPO Implementation) Ryan Bonisch (Contact list and LAN Implementation Tasks) Anthony Campo (Configuration of Routers, Switches, and VLANs) Gerald Casanada (Voice VLAN, Wireless, DHCP and DNS) Jennifer Coleman (AD Implementation and Tasks lists for AD Policies) Billie Jo Derouin (Security Implementation) Raymond Mack (Security Technology and Timeline) University of Maryland University College CMIT 495 Professor Sam Musa February 28, 2016 Table of Contents Introduction 2 Purpose 3 Implementation Requirements 3 Project Contact List 3 Tool List 3 Equipment Installation Plan 5 Project TimeLine 6 Lan Implementation task 7 Security Implementation task 11 Configuration Routers 41 Switches 46 VLAN Configurations 49 Voice VLAN and Wireless 51 DHCP and DNS 54 Active Directory Implementation Task 56 Active Directory Policies 58 AD Forest Domain OU formation/AD Group Formation/AD GPO Implementation 68 Security Technologies 88 Introduction The implementation of the WWTC is crucial to keep the business functioning and growing. To ensure that new office installation goes smooth group 3 will create a functional implementation plan from the design we proposed to WWTC over the last 7 weeks. Purpose The purpose of this plan is to provide a step by step guide on the network designed......

Words: 13687 - Pages: 55

Free Essay

Active Dir

...trademarks are the property of their respective companies. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. © Microsoft Corporation 2010. All rights reserved. Disclaimer At the time of writing this document, Web sites are referenced using active hyperlinks to the correct Web page. Due to the dynamic nature of Web sites, in time, these links may become invalid. Microsoft is not responsible for the content of external Internet sites. Page ii Active Directory – Design Guide Prepared by Microsoft, Version 2.0.0.0 Last modified on 26 February 2010 Prepared by Microsoft TABLE OF CONTENTS 1 2 Executive Summary .......................................................................................................................1 Introduction ....................................................................................................................................2 2.1 2.2 Value Proposition ......................................................................................................................2 Knowledge Prerequisites...

Words: 43732 - Pages: 175

Premium Essay

Section 5 Internal Control over Financial Reporting

...internal control Qver Financial Reporting CASES INCLUDED iN THIS SECTiON 1. Simply Steam, Co. 155 Evaluation of Internal Control Environment 2. Easy Clean, Co. 155 Evaluation of Internal Control Environment 3. Red Bluff Inn & Café 165 Establishing Effective Internal Control in a Small Business 4. St. James Clothiers 169 Evaluation of Manual and IT-Based Sales Accounting System Risks 5. Collins Harp Enterprises 177 Recommending IT Systems Development Controls 6. Sarbox Scooter, Inc. 185 Scoping and Evaluation Judgments in the Audit of Internal Control over Financial Reporting 7. Société Générale 195 How a Low-Risk Trading Area Caused a $7.2 Billion Loss case5.!-2 Easy Clean/Simply Steam, Co. Evaluation of Internal Control Environment Mark S. Beasley • Frank A. Buckless • Steven M. Glover • Douglas F. Prawitt INSTRUCTIONAL OBJECTIVES 1] To reinforce aspects relevant to the internal control environment. 2] To illustrate the degree of judgment involved in making internal control environment evaluations. 3] To provide students experience in making subjective evaluative judgments. 4] To provide a forum to discuss inquiry techniques as well as inquiry as a form of audit evidence. 5] To provide students direct experience with, and discovery of, issues surrounding the control environment, making inquiries, and the framing (e.g., positive or negative) of information provided by management. 6] To......

Words: 23599 - Pages: 95

Premium Essay

Monicah

...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written......

Words: 139691 - Pages: 559

Premium Essay

Server 2008 for Dummies

...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written......

Words: 139691 - Pages: 559

Free Essay

Information Technology Management

...INT401I/202/0/2013 Tutorial Letter 202/0/2013 Information and Technology Management IV INT401I Year module School of Computing This tutorial letter contains the model answers to assignment 1 & 2, and the Oct/Nov 2013 examination and Jan/Feb 2014 supplementary examination preparation notes. Bar code CONTENTS 1 TUTORIAL MATTER THAT YOU SHOULD HAVE RECEIVED TO DATE .................................. 3 Plagiarism ................................................................................................................................... 3 2 THE MODEL ANSWERS TO ASSIGNMENT 1 ........................................................................... 3 3 THE MODEL ANSWERS TO ASSIGNMENT 2 ........................................................................... 6 4 THE OCT/NOV 2013 EXAMINATION AND JAN/FEB 2014 SUPPLEMENTARY EXAMINATION PREPARATION NOTES ............................................................................................................12 2 INT401I/202 1 TUTORIAL MATTER THAT YOU SHOULD HAVE RECEIVED TO DATE Title Description TUTORIAL LETTER 101/0/2013 Tutorial letter 101 contains important information about your module. VERY important information. TUTORIAL LETTER 201/0/2013 TUTORIAL LETTER 202/0/2013 Tutorial letter 202 contains the model answers to assignment 1 & 2, and the Oct/Nov 2013 examination and Jan/Feb 2014 supplementary examination preparation notes (this tutorial letter). Plagiarism NB: Plagiarism is the act of taking......

Words: 4310 - Pages: 18

Premium Essay

Jinnnnnnnnnni

...PART TWO RECRUITMENT AND PLACEMENT | | |CHAPTER | |T Five | |Personnel Planning |5 | | |and Recruiting | | | |Lecture Outline | | | |Workforce Planning and Forecasting |In Brief: This chapter explains the process of | | |Strategy and Workforce Planning |forecasting personnel requirements, discusses | | |Forecasting Personnel Needs (Labor Demand) |the pros and cons of methods used for recruiting| | |Improving Productivity Through HRIS |job candidates, describes how to develop an | | |Forecasting the Supply of Inside Candidates |application form, and explains how to use | | |Forecasting the Supply of Outside Candidates |application forms to predict job......

Words: 5358 - Pages: 22

Premium Essay

Human Resources Information Systems

...UNIT 8 HUMAN SYSTEMS RESOURCE INFORMATION Structure 8.0 8.1 8.2 8.3 8.4 8.5 8.6 8.7 8.8 8.9 Objectives Introduction Information: Some Basic Guidelines Human Resource Information at Macro Level Human Resource Information at Micro Level Effective Human Resource Information System: Some Approaches Why Computerise Personnel Records and Information Systems? Computer Applications in Human Resource Management: An Overview Let Us Sum Up Clues to Answers 8.0 OBJECTIVES After having read this Unit, you should be able to: • understand the dynamics of information system and its use as a tool for measurement, • examine the significance of information in human resource management, • appreciate the approaches to the information system at the macro and micro levels, • consider the shortcomings of manual information system, and • discuss merits of computerisation and its applications in effective Human Resource Information System. 8.1 INTRODUCTION Human Resource Planning is concerned with the controlled utilisation of human resources to achieve pre-set objectives, both short-term and long-term. It has three main features: 1) Demand work involving analysing, reviewing, and attempting to forecast the number in terms kind, level, functions, etc. 2) Supply work attempting to predict what action is, and will be needed to ensure that the required numbers are available. 3) Designing the interaction between demand and......

Words: 4923 - Pages: 20

Premium Essay

Human Resource Information System

...UNIT 8 HUMAN SYSTEMS RESOURCE INFORMATION Structure 8.0 8.1 8.2 8.3 8.4 8.5 8.6 8.7 8.8 8.9 Objectives Introduction Information: Some Basic Guidelines Human Resource Information at Macro Level Human Resource Information at Micro Level Effective Human Resource Information System: Some Approaches Why Computerise Personnel Records and Information Systems? Computer Applications in Human Resource Management: An Overview Let Us Sum Up Clues to Answers 8.0 OBJECTIVES After having read this Unit, you should be able to: • understand the dynamics of information system and its use as a tool for measurement, • examine the significance of information in human resource management, • appreciate the approaches to the information system at the macro and micro levels, • consider the shortcomings of manual information system, and • discuss merits of computerisation and its applications in effective Human Resource Information System. 8.1 INTRODUCTION Human Resource Planning is concerned with the controlled utilisation of human resources to achieve pre-set objectives, both short-term and long-term. It has three main features: 1) Demand work involving analysing, reviewing, and attempting to forecast the number in terms kind, level, functions, etc. 2) Supply work attempting to predict what action is, and will be needed to ensure that the required numbers are available. 3) Designing the interaction between demand and......

Words: 4923 - Pages: 20

Premium Essay

Beacuse I Have to

... INTRODUCTION FOR STATEWIDE INFORMATION SECURITY MANUAL ...... 1 GUIDANCE FOR AGENCIES .............................................................................. 1 CHAPTER 1 – CLASSIFYING INFORMATION AND DATA ................................ 2 CHAPTER 2 – CONTROLLING ACCESS TO INFORMATION AND SYSTEMS. 7 CHAPTER 3 – PROCESSING INFORMATION AND DOCUMENTS ................. 32 CHAPTER 4 – PURCHASING AND MAINTAINING COMMERCIAL SOFTWARE ..................................................................................................... 107 CHAPTER 5 – SECURING HARDWARE, PERIPHERALS AND OTHER EQUIPMENT .................................................................................................... 122 CHAPTER 6 – COMBATING CYBER CRIME ................................................. 146 CHAPTER 7 – CONTROLLING E-COMMERCE INFORMATION SECURITY 153 CHAPTER 9 – DEALING WITH PREMISES RELATED CONSIDERATIONS . 173 CHAPTER 10 – ADDRESSING PERSONNEL ISSUES RELATING TO SECURITY ........................................................................................................ 185 CHAPTER 11 – DELIVERING TRAINING AND STAFF AWARENESS .......... 192 CHAPTER 12 – COMPLYING WITH LEGAL AND POLICY REQUIREMENTS .......................................................................................................................... 197 CHAPTER 13 – DETECTING AND RESPONDING TO IS INCIDENTS........... 206 CHAPTER 14 – PLANNING FOR BUSINESS CONTINUITY .......................... 217 CHAPTER...

Words: 65255 - Pages: 262

Premium Essay

Computerized Scholarship Profiling System Document

...INTRODUCTION PROJECT CONTEXT Everyone in the business world is looking for a way to increase the efficiency of their business. Today, most of the schools are using manual processing of their transaction that causes many problems. In using manual system, they will need a lot of papers, spend more time and effort in writing the data on the log book. To minimize these problems, scholarship profiling system to be developed will improve the processing of papers for the scholar students and lessen the workload of the personnel. The usage of existing manual system is indeed a time consuming way of filing of applicant into a logbook and record by the personnel. In that way, it takes a long time and thread for the employee as well as the students before they can fully accomplish it. Developing a system will make a better result and give reliable source for the fastest and easiest way of processing. Automating the ISU-R scholarship profiling system is a new way of modernizing the present manual system used by the school for managing and processing of paperwork. The system that is responsible for letting the user view the list for scholars both old, new and renewal. It will also increase the security of the properties within the company. The system has an ability to sort files to distinguish the different scholarship proposal granted for every student. The Isabela State University, Roxas campus is currently using a manual system, in time processing paperwork for scholars are......

Words: 5078 - Pages: 21

Free Essay

Ccnp Bsci 642 901

...Systems Inc. All rights reserved. This publication is protected by copyright. Please see page 73 for more details. [3] ICONS USED IN THIS BOOK CCNP BSCI Quick Reference Sheets Icons Used in This Book Si Router 7507 Router Multilayer Switch with Text Multilayer Switch Communication Server Switch I DC Internal Firewall IDS Web Browser Database App Server © 2007 Cisco Systems Inc. All rights reserved. This publication is protected by copyright. Please see page 73 for more details. [4] CHAPTER 1 CCNP BSCI Quick Reference Sheets The Evolving Network Model The Hierarchical Design Model Cisco used the three-level Hierarchical Design Model for years. This older model provided a high-level idea of how a reliable network might be conceived, but it was largely conceptual because it didn’t provide specific guidance. Figure 1-1 shows the Hierarchical Design Model. FIGURE 1-1 Core Si This...

Words: 24928 - Pages: 100

Free Essay

Assignment

...GROUP PROJECT April, 2012 Executive Summary: Information Technology has become a necessity and inseparable entity of any organization. Whether large or small, any organization if it seeks to achieve efficient and effective performance and thus leading to high productivity and profitability, it has to implement and deploy optimal ICT practice. The report examines the ICT infrastructure that is utilized and deployed at Bahrain Polytechnic, which is one of the leading and well-established public universities in Bahrain. It attempts to provide a comprehensive overview of how ICT is implemented within the institution in regard to the physical infrastructure, systems, applications, networking and all other technical issues that are relevant to the ICT implementation and operations. Through the journey of investigating all aspects and concepts of ICT at Bahrain Polytechnic, this report tries of shed light on and assess the ICT services provided to the staff as well as to the customers who are the students. As it is the case to any organization, Bahrain polytechnic’s main aim of implementing best ICT practices is to ensure the best learning environment to the students and improve their performance and achievement as well as facilitate the performance of both the tutors and other staff. All this can maintain the institution’s competitive edge and place it amongst the most distinguished and pioneering universities in Bahrain. By carrying out surveys, observations and......

Words: 6680 - Pages: 27

Premium Essay

Security

...www.GetPedia.com National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 93588 - Pages: 375