StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Best Plan for Transnational Railway - Assignment Example

Summary
This assignment "The Best Plan for Transnational Railway" proposes a plan that will allow all the SCs access to the networked transport control module and other resources in the HQ domain while preventing them from accessing other resources in all other domains besides their own…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
The Best Plan for Transnational Railway
Read Text Preview

Extract of sample "The Best Plan for Transnational Railway"

Question a. Propose a plan that will allow all the SCs access to the networked transport control module and other resources in the HQ domain while preventing them from accessing other resources in all other domains besides their own. The best plan for transnational railway should be a forest plan. It is the forest windows that will allow the controller full control of his resources but no accessibility to others. On the other hand no one else can access his account as well. Each supervisor will be able to access and work in the system with such channels as Users_ global groups-Universal groups-domain local groups-permission to resources. b. Explain why Microsoft’s AGUDLP approach is either advantageous or disadvantageous in this situation. AGULP provide several advantages the user especially supervisors in this case. It will allow quick and efficient access to resources by each member while at the same time there is no interference among the supervisors. The system is easy to handle as it has reduced complexities the user hence the controllers can easily manage their resources easily. The central location of resources at the same time provides good opportunities for the super visors to check their utilization. 2. TR has gone on a hiring spree and need s to immediately create hundreds of new user accounts. The new employees will all be working at the company’s headquarters in various departments. These employees must be added quickly and efficiently as possible. a. Explain at least two (2) tools that windows 2008 provides that can help you efficiently create multiple users and groups The two common tools for the application include dsmod command. The command allows one to change membership in cases there is need /as the distinguished names follows addmbr to the list of members provided. The command follows channel of dsmod group then followed by groupdn then addmbr and finally dn’s taken from the account that need additions. Additionally, chmbr can be used; however, the two gives totally different results. These modes are generally referred to as automation methods. Adilfe is another tool that can be used to create entry in the system. Adilfe as well allows modifications on the accounts. It is a command opened from C-drive root and produces idigroupout which is txt file. The second command line tool is dsadd command. It has several scopes which includes group type, scope also member of. However, distinguished name is the most vital aspect. b. Explain why you would choose these tools for this situation. The above tools are easy to manage that the supervisors will not have a lot of problems to manage the system as opposed to several other applications. Learning of using the tools as well is very easy. Specific changes can easily be managed without taking too much time across the whole group. 3. TR’s Network Administrator has asked you with ensuring the security of the company’s highly sensitive transportation infrastructure data. She knows that a secure network starts with ensuring the highest level of user account security. She has asked you to develop a plan to educate users on the importance of network security. a. Create a three (3) slide presentation that can be used as part of a campaign to communicate the importance of network security to the corporation’s broad range of employees using Microsoft power point. (Represented in the slide). b. Explain how the approach you have taken to educate broad users will differ from the specialized education needed for higher –level security (i.e., securing the use of an administrator account). Public users can be trained by adoption of several means; among this is the use of media materials. The materials need to be aimed at getting majority of users. The materials such as cartoons on papers can effectively be put across when the targeted audience has been I identified i.e. their understanding of internet security and their internet usage. From there, common security measures can be made through the media in short advertisement such as in radio or paper cartoons. In case of the specialised education program will different as more vigorous training program will be required. The program will focus more on gateway management which include aspects such as e-bussiness management, firewall interface, LAN channel, remote VPNs management and public hosting. To manage these, the administrators are supposed to be taken through the management process under the guidance of experts who ascertains that their lessons are well covered and examined. These are lessons covered under Information Security Management System (ISMS). 4. You have been asked to create new organizational Units (OU) for many of the newly hired employees. Many of these newly hired employees are expected to shift to different departments within the next few months. a. Describe two (2) benefits of creating OUs to represent different functional departments. Reduction in organization ownership cost: Ownership cost of management can significantly be reduced with employment of OUs these includes interaction of management policies, available settings and creating of inheritance options, which normally makes system very complex are reduced. Creation of standardization: OUs allows creation of careful designs, planning, deploying and testing based on the on the organization requirement. The end result is achievement of quality standardized work in the organization out put. c. Propose a way you can easily move users between OUs to help support the expected shift of employees to different departments. ADSI provides the best mechanism for renaming and shifting objects within the domain, this can be executed with MoveHere command in the IADS container. To carry out these there must be valid administrators’ permission. 5. You have created OUs to group users and computers by department. The network administrator has decided to use Group Policy Objects (GPOs) to help strengthen the security of the network. She has asked you to contribute to strengthening the network’s security. She is especially concerned about security and event auditing. a. Choose and discuss two (2) domains –wide account policies that you believe would be effective to implement. The following can be used in GPOs Password Policy Setting; Users can be allowed to put strong password system on their machines. To achieve a strong password users are recommended to apply 10 characters of mixed letters, numbers and symbols. This way the computers will be safe from non-administration and users application. Use of account lockout policy: The system determines the length of time that a locked account will automatically unlock. It is functionality relies on the administrators need. b. Explain at least (2) implications to planning an auditing strategy. Auditing planning and strategy is vital for an organization as is the surest way to check whether all the security measures are in place. Additionally, problems such as security defaults can easily be detected to reduce chances of unforeseen danger and costs. Auditing draws mitigation measures and monitoring strategies of security system. Bibliography Minasi, Mark, Rhonda Layfield, and John Mueller. Mastering Windows Server 2008 Networking Foundations. Indianapolis, Ind.: Wiley, 2008. Print. Minasi, Mark. Mastering Microsoft Windows Server 2008 R2. Indianapolis, Ind.: Wiley Pub., 2010. Print. Tomsho, Greg. MCTS guide to Microsoft Windows Server 2008 Active Directory configuration: exam 70-640. Boston, MA: Course Technology/Cengage Learning, 2010. Print. Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us