This website uses cookies to ensure you have the best experience. Learn more

Information System Security Essay

1267 words - 6 pages

Jose Pelaez
IT 255 – PROJECT PART 2
STUDENT SSCP DOMAIN RESEARCH PAPER

Solution 1:
With Windows Server 2008 Applications, you can make OU’s, Groups and User’s, and you can set GPO’s for the OU’s, Groups and / or Users requirements or restrictions.
Below are some reasons for upgrading to Windows Server 2008 R2 with service Pack 1(SP1). As we go through each one of the issues stated above we address the concerns and exploit Windows Server 2008. With the new technology of today and the improvements with Windows Server 2008, not only is Windows Server 2008 an OSI, but much more than that. So let us take a look at some of the good reasons for upgrading.
Windows Server provides new ...view middle of the document...

Solution 2:
With Windows Server 2008 R2 SP1 Upgrade: Allows the (CEO) usage of BlackBerry devices and all employees with cell phones can email and if need have encryption capabilities. On Windows Server 2008 have application for encryption option and you can apply them to emails and / or ports for security purposes. This allows emails and voice over secured IP addresses. Nor for you to use your BlackBerry you must be running Version 5.0 (BlackBerry Enterprise Server Express for Microsoft Exchange) or higher on Windows Server.

Solution 3:
Using Windows Server 2008 is compatible with all OSI systems to include Mac OSI. To use Mac OSI you must down load a patch from Windows Small Business Server. With a couple clicks of the mouse you get to keep your Mac X machines. Every one of the 5000 computers in the company can run off Windows Server 2008. By setting up groups and users accounts and separating the domains into different trees for manageable security and controls.
Webroot: Web Security Service; Scope of Protection: Webroot AntiVirus with Spy Sweeper is a very comprehensive desktop antivirus package. The software protects from threats from several sources, and the several layers of protection keep your computer safe. Webroot protects PCs from viruses in all forms, as well as worms, Trojans, malware, and rootkits. Webroot monitors and detects all sorts of malicious files and just plain unwanted programs like adware, dialers, cookies, and keyloggers. The integrated Spy Sweeper is amazing standalone anti-spyware software that in itself protects from a variety of computer threats.
Solution 4:
Use the GPO’s to control the usage or prevent users from using USB removable disks (USB flash drives). Using Event Viewer to help maintain control over the Server / workstation connected to the server.
As a variation to Disable USB Disks, you can prevent users from using any portable USB removable disk or flash drive by using a custom .ADM file that can be imported into the Local Group Policy (thus effecting only the local computer) or by using Active Directory-based Group Policy Objects (also known as GPOs). Follow the steps outlined in the Adding New Administrative Templates to a GPO article on general instructions on how to add or remove an .ADM file from the Administrative Templates section in GPO.
Note: This tip will allow you to block usage of USB removable disks, but will continue to allow usage of USB mice, keyboards or any other USB-based device that is NOT a portable disk.
After you downloaded the ADM file (pdf) and installed it read the instruction and download the other two links and follow the instruction and this will enable you to disengage USB or CD/DVD and still keep mouse and keyboard still working.
Event Viewer and Resulting Internet Communication in Windows Server 2008 Benefits and Purposes of Event Viewer. Administrators can use Event Viewer to view and manage event logs. Event logs...

Other Papers Like Information System Security

Cmgt400 Week 4 Individual Essay

1359 words - 6 pages The Role of Information Security Policy A successful Information Security Program is determined by how the security policy for an organization is developed, how it is implemented, and maintained. An effective sound security policy creates a solid foundation for an information system. The policy makers must emphasize that within the organization, the role played by information security is of paramount importance. The system administrator is

Chapter 1 Review Questions

870 words - 4 pages of an information system. Which are most directly affected by the study of computer security? Which are most commonly associated with its study? A. Hardware, Data, People, Software, Procedures, Networks. B. Data is most critical component of an information system, and therefore the most directly affected by the study of computer security. C. The most commonly component associated with the study of information systems, is in fact all of them

It Audit Guide

4838 words - 20 pages IT [pic] Australian Government Department of Defence Information System Audit Guide VERSION 11.1 January 2012 Table of Contents 1. Introduction to Accreditation 4 2. The Information System Audit – Checklist 7 2.1. What is an Information System Audit? 7 2.2. Why is an Information System Certification needed? 7 2.3. Assessing an Information System’s Security Risks 7

Chapter 1-Introduction to Information Security: Principles of Information Security

979 words - 4 pages Chapter 1-Introduction to Information Security: 1. What is the difference between a threat and a threat agent? A threat is a constant danger to an asset, whereas a threat agent is the facilitator of an attack. 2. What is the difference between vulnerability and exposure? Vulnerability: is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or

Principles of Security 5th Edition Chapter 1 Review Questions

844 words - 4 pages make a system weak and open to attacks without protection. 3. How is infrastructure protection (assuring the security of utility services) related to information security? If the infrastructure of a network is exposed and accessible to anyone this leaves the network vulnerable to damage both to hardware and software. The infrastructure must be protected to allow only authorized user to have access to the network. 4. What type of

Course Discription

968 words - 4 pages : Wiley. Article References Barr, J. G. (2012). Business continuity for web sites. Faulkner Information Services, 1-9. Barr, J. G. (2012). Identity management market trends. Faulkner Information Services, 1-10. Barr, J. G. (2013). Common criteria overview. Faulkner Information Services, 1-10. Barr, J. G. (2013). Biometrics market trends. Faulkner Information Services, 1-7. Week One: IT Security Overview Details Due Points

Public Policing Vs Private Security

1153 words - 5 pages one would be able to access information. Public policing and private security of different similarities and differences; however both have common goals in mind and that is to protect and serve. Both of the goals of these agencies intertwine within each other. Both roles play an important role within the criminal justice system. Public policing have to abide by the laws and regulations that affect society that private security do not have to

Linux Security

448 words - 2 pages recognized best practice framework for an information security management system. It helps you identify the risks to your important information and put in place the appropriate controls to help reduce the risk. • Identify risks and put controls in place to manage or reduce them • Flexibility to adapt controls to all or selected areas of your business • Gain stakeholder and customer trust that their data is protected • Demonstrate compliance and gain

Security Breach

1832 words - 8 pages , management support to execute the law will also help the firm to avoid security breach (Roberds & Schreft, 2009). Improve security and lock system: The firm should develop security and lock system to ensure high security of information of the customers. In this, the firm should have effective backup recovery programs and systems that will minimize the chances of security breach at the workplace (Colwill, 2009). Conclusion On the

Information Security

988 words - 4 pages switching off computers that are used publicly. These examples of omission are a threat to the security of information. The second human trait is acts of commission. Parsons et.al (2010) indicates that there are cases whereby individuals miss out on the correct procedure of performing a particular action. There are cases whereby forget to enter their passwords in the correct forms hence creating challenges to the information system security

Computer Security In Education

330 words - 2 pages is having a student’s private information exposed, such as their Social Security number stolen, a nightmare for the individual, but it also causes much additional stress for the university. The higher education system then has to deal with legal issues, public relations fiascos, and various financial losses. In order to avoid any unnecessary headaches, universities go to great lengths to protect their networks from security threats

Related Essays

Information System Security Essay

1538 words - 7 pages . This has been mainstreamed into Linux and ported to several other systems, including the Solaris™ operating system, the FreeBSD® operating system, and the Darwin kernel. This provides a mechanism to enforce the separation of information based on confidentiality and integrity requirements and it allows threats of tampering and bypassing of application security mechanisms to be addressed while enabling the confinement of damage that can be caused

Cap Study Guide Essay

5295 words - 22 pages CAP study guide – 1. Who is responsible for establishing the rules for appropriate use and protection of the subject information (e.g. rules of behavior)? a. System owner 2. Who has the authority to formally assume responsibility for operating an information system at an acceptable level of risk? a. Accrediting Authority 3. Who is responsible for ensuring that the appropriate operational security posture is

Introduction To Information Security Student Essay

1249 words - 5 pages and fast rules regulating the installation of various security mechanisms, nor are there many universally accepted complete solutions. While there are many manuals to support individual systems, there is no manual for implementing security throughout an entire interconnected system. This is especially true given the complex levels of interaction among users, policy, and technology controls. Information Security: Security as Science There are

Top 10 Laws Of Security Essay

1706 words - 7 pages security, the more security level will be gained. 4 Third Law: Security is built from the Core, not on the Edge As a complementary to the second law, security should be applied step by step as we build the system, from requirements to analysis to design to implementation up to termination stage. Most security vendors apply their measures in the boundaries of the system, forgetting that relations among information assets and employees their selves