COM520 Systems Security Management

COM520 Systems Security Management

Module 1 Written Assignment

COM520 Written Assignment 1

Assignment: Adding Active Directory

In this assignment, you will answer questions relating to the impact of adding Active Directory to the Ken

7 Windows Limited environment.

Assignment Requirements

This assignment builds on the scenario of Ken 7 Windows Limited given as the last section of this

document. For this assignment, imagine yourself to be a security administrator working for Ken 7

Windows Limited. You have been asked to evaluate the option of adding the Active Directory to the Ken 7

Windows network. Here are some facts to help you work on this assignment.

Ken 7 has just purchased a new enterprise resource planning (ERP) software package and will place the

workstation computers which will use this ERP software at eight different locations on the shop floor. The

ERP software requires two database servers, four application servers, and two Web servers, all of which

run a Windows operating system. All above-mentioned servers and the shop floor workstations are new,

but there are 22 workstations, already in place, which work with an older software that Ken 7 used to

manage the manufacturing and accounting processes. The existing 22 workstations are grouped into

three workgroups: accounting, planning, and purchasing. Before you add the Active Directory to the

network, you have been asked to examine the effects of the Active Directory in several key areas.

Tasks

Provide the answers to the following questions to satisfy the key points of interest to the Ken 7 Windows

Limited management regarding the addition of the Active Directory to the network.

1. Currently, system administrators create Ken 7 users in each computer where users need access.

In the Active Directory, where will system administrators create Ken 7 users?

2. How will the procedures for making changes to the user accounts, such as password changes, be

different in the Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting

to the Active Directory?

4. How will the administrators resolve the differences between the user accounts defined on the

different computers? In other words, if user accounts have different settings on different

computers, how will the Active Directory address that issue?

5. How will the procedure for defining access controls change after converting to the Active

Directory?

Submission Requirements

? Format: Microsoft Word

? Font: Arial, Size 12, Double-Space

? Citation Style: APA Style

? Length: 1–2 pages

Self-Assessment Checklist

? I have described with proper justification that the Active Directory user rights and permissions

take precedence over the local user accounts.

? I have explained with proper justification that the Active Directory and local users have different

security identifiers (SIDs)—even if the user accounts names are the same.

COM520 Written Assignment 1

Case Scenario for Rationale: Importance of Windows Access Control and Authentication

Ken 7 Windows Limited is a manufacturer of Windows for residential and commercial builders. Ken 7

Windows Limited carries a variety of Windows and related products. It supplies builders with all of the

tools and supplies to install finished Windows in any type of building.

Ken 7 Windows Limited has just purchased a new enterprise resource planning (ERP) software package

to help control costs and increase both quality and customer responsiveness. The ERP software collects

and stores information including:

? Raw material costs

? Labor costs

? Materials and labor requirements for products

? Purchasing requirements

Ken 7 Windows Limited has identified six basic roles for users in the new ERP software:

? Administrators—maintain ERP data and system operation.

? Planners—run planning software and generate requirements reports.

? Shop Floor users —enter operational data (receiving, shipping, and product progress

during manufacturing).

? Managers—manage department personnel.

? Purchasing users—generate purchasing documents based on planning requirements.

? Accounting users—maintain cost and accounting data.

Access controls limit what users or roles can do with different types of data. For example, consider the

following types of data:

? Cost information—raw materials and labor costs, including the cost of finished goods.

? Manufacturing details—cost, amount of labor, and time required to produce finished

goods.

? Purchasing requirements—rules for determining when raw materials, components, or

supplies should be purchased.

Through access control:

? Cost information can be viewed only by Accounting users.

? Manufacturing details can be viewed only by Shop Floor users.

? Purchasing requirement can be viewed only by Purchasing users.

During the analysis phase of the ERP implementation, Ken 7 Windows Limited raised concerns about

users being able to access restricted data.

? Accounting users are able to login to shop floor computers.

? Purchasing users are able to access human resource (HR) applications and data.

The ERP implementation team suggested the following access control measures to protect restricted

data.

? Create an organizational unit (OU) in Active Directory for shop floor computers.

? Deploy Group Policy Objects (GPOs) to restrict shop floor users to the shop floor OU.

? Define data access controls in the ERP software to deny access for all non-HR users to

restricted data.

Implementation of several access control measures helped Ken 7 Windows Limited to restrict the data

access. Hence access control and authentication is important, as it helped Ken 7 Windows Limited in

reducing costs and increasing profits.

COM520 Systems Security Management

Module 2 Written Assignment

COM520 Written Assignment 2

Assignment: Recommendations for Access Controls

Assignment Requirements

In the lab for Module 1, Configure Active Directory and implement Departmental and User Access

Controls, you defined the groups, users, and listed access controls necessary to fulfill specific access

requirements. In this assignment, you will evaluate how each control affects users’ access to files and

folders. You will also examine how changing access controls can affect your users’ ability to access files

and folders.

Here are the users and groups you defined in the lab:

User Member of Groups

SFuser01 ShopFloor

SFuser02 ShopFloor

SFmanager ShopFloor, Manager

HRuser01 HumanResources

HRuser02 HumanResources

HRmanager HumanResources, Manager

In the lab, you considered access requirements for four folders:

? C:ERPdocuments – This folder will contain miscellaneous shared files for the ERP software.

? C:ERPdocumentsHRfiles – Folder for shared HumanResources user files.

? C:ERPdocumentsSFfiles – Folder for shared ShopFloor user files.

? C:ERPdocumentsMGRfiles – Folder for shared Manager user files.

Here is a suggested list of access controls with basic permissions for each of the four folders your users

will need to access:

Folder Who Can Modify

Who Can Read and

Execute

Who Can List Folder

Contents

C:ERPdocuments Manager Manager Manager, ShopFloor,

HumanResources

C:ERPdocumentsHRfiles HumanResources Manager,

HumanResources

Manager,

HumanResources

C:ERPdocumentsSFfiles Manager, ShopFloor Manager, ShopFloor Manager, ShopFloor

C:ERPdocumentsMGRfiles Manager Manager Manager

Based on the requirements stated above, answer the following questions:

1. The access requirements in the table above are based on reference groups. However, should

Windows access controls to implement these requirements be based on groups or individual

users? Explain.

2. How would you provide a human resource (HR) manager with the ability to modify files in

C:ERPdocumentsHRfiles without giving the same ability to other managers?

3. Describe what would happen if you removed HR from the ‘List folder contents’ permission for

C:ERPdocumentsHRfiles?

4. Describe what would happen if you added Shop Floor to the ‘Modify’ permission for

COM520 Written Assignment 2

C:ERPdocumentsHRfiles?

Submission Requirements

? Format: Microsoft Word

? Font: Arial, Size 12, Double-Space

? Citation Style: APA Style

? Length: 1–2 pages

Self-Assessment Checklist

? I have explained how access controls affect the ability of different users to access objects.

? I have explained with proper reasoning the impact of changes made in the worksheet on users’

access and which users would encounter problems if the changes were implemented.

COM520 Systems Security Management

Module 3 Written Assignment

COM520 Written Assignment 3

Assignment: Identifying Types of Malware Infection

Assignment Requirements

You have learned that any computer or device can be vulnerable to malware. Vulnerabilities differ

depending on how the computer or device is used and what software is installed. For each of the

scenarios listed on the worksheet, select the most likely type of malware that is present on the computer

or device and provide a rationale for doing so.

Select from:

a. Virus

b. Worm

c. Trojan horse

d. Rootkit

e. Spyware

Suspected malware scenarios:

_________ 1. You notice that your computer is getting slower each day. You have terminated

unneeded programs, disabled unneeded services, and have recently defragmented

the disks. Your computer has plenty of memory but it still seems slow. Since it only

started getting slow within the last two weeks—you suspect malware. You have

carefully examined each of the programs running but there are no unusual programs.

However, you do notice that there is a substantial disk activity, even when no

programs are running that should be using the disk. What kind of malware do you

think is present in your computer?

_________ 2. You downloaded a new program to display the current weather on your desktop.

Since you installed the weather application, you noticed a lot of network activity, and

your computer is getting slow. When you terminate the weather application your

computer speeds up. What kind of malware do you think is present in your computer?

_________ 3. Within a week after ordering a new widescreen television (TV) from an online retailer,

you start getting many e-mail messages advertising products related to TVs. What

kind of malware do you think is present in your computer?

_________ 4. You downloaded a new game to your personal mobile device that runs Windows

Mobile. You notice on your mobile service bill that several charges appeared for calls

to premium numbers that started three days after loading the new game. What kind

of malware do you think is present in your computer?

Submission Requirements

? Format: Microsoft Word

? Font: Arial, Size 12, Double-Space

? Citation Style: APA Style

? Length: 1–2 pages

Self-Assessment Checklist

? I have matched correctly each type of malware with each scenario.

? I have provided a sound rationale for each answer.

COM520 Systems Security Management

Module 4 Written Assignment

COM520 Written Assignment 4

Assignment: Security Audit Procedure Guide

Assignment Requirements

This assignment requires you to prepare a procedure guide for a security audit in Ken 7 Windows Limited.

Ken 7 Windows Limited has acquired several new servers and workstations to support the new enterprise

resource planning (ERP) software. You want to ensure the new computers comply with Microsoft’s initial

secure baseline. You choose to use the Microsoft baseline security analyzer (MBSA) tool to assess the

basic security for all of your Windows computers. MBSA will identify many of the basic vulnerabilities

found in Windows environments. MBSA’s vulnerability report provides a good starting point for securing

new and existing Windows computers. You need to develop procedures to ensure that each computer in

your environment has no reported vulnerabilities.

Using the format below, describe the steps to follow to scan multiple computers for security vulnerabilities

using MBSA. Include steps to research and address any reported vulnerabilities. Assume you plan to run

MBSA on a new server that does not have MBSA installed.

Fill in the details for each procedural step to audit each computer and address discovered vulnerabilities.

1) Acquire and install MBSA.

2) Scan computers.

3) Review scan results.

4) Identify vulnerabilities you need to address.

5) Document the steps to address each vulnerability.

Submission Requirements

? Format: Microsoft Word

? Font: Arial, Size 12, Double-Space

? Citation Style: APA Style

? Length: 1–2 pages

Self-Assessment Checklist

? I have properly organized the steps necessary for malware-free environment.

? I have given a proper justification of the following steps in the security audit procedure guide:

o Download and install MBSA.

o Use MBSA to scan multiple computers.

o Review the scan results.

o Identify vulnerabilities to mitigate.

o Document the steps necessary to mitigate selected vulnerabilities.

COM520 Written Assignment 4

Case Scenario:

Ken 7 Windows Limited is a manufacturer of Windows for residential and commercial builders. Ken 7

Windows Limited carries a variety of Windows and related products. It supplies builders with all of the

tools and supplies to install finished Windows in any type of building.

Ken 7 Windows Limited has just purchased a new enterprise resource planning (ERP) software package

to help control costs and increase both quality and customer responsiveness. The ERP software collects

and stores information including:

• Raw material costs

• Labor costs

• Materials and labor requirements for products

• Purchasing requirements

Ken 7 Windows Limited has identified six basic roles for users in the new ERP software:

• Administrators—maintain ERP data and system operation.

• Planners—run planning software and generate requirements reports.

• Shop Floor users —enter operational data (receiving, shipping, and product progress during

manufacturing).

• Managers—manage department personnel.

• Purchasing users—generate purchasing documents based on planning requirements.

• Accounting users—maintain cost and accounting data.

Access controls limit what users or roles can do with different types of data. For example, consider the

following types of data:

• Cost information—raw materials and labor costs, including the cost of finished goods.

• Manufacturing details—cost, amount of labor, and time required to produce finished goods.

• Purchasing requirements—rules for determining when raw materials, components, or supplies

should be purchased.

Through access control:

• Cost information can be viewed only by Accounting users.

• Manufacturing details can be viewed only by Shop Floor users.

• Purchasing requirement can be viewed only by Purchasing users.

During the analysis phase of the ERP implementation, Ken 7 Windows Limited raised concerns about

users being able to access restricted data.

• Accounting users are able to login to shop floor computers.

• Purchasing users are able to access human resource (HR) applications and data.

The ERP implementation team suggested the following access control measures to protect restricted

data.

• Create an organizational unit (OU) in Active Directory for shop floor computers.

• Deploy Group Policy Objects (GPOs) to restrict shop floor users to the shop floor OU.

• Define data access controls in the ERP software to deny access for all non-HR users to restricted

data.

COM520 Written Assignment 4

Implementation of several access control measures helped Ken 7 Windows Limited to restrict the data

access. Hence access control and authentication is important, as it helped Ken 7 Windows Limited in

reducing costs and increasing profits.

COM520 Systems Security Management

Module 5 Written Assignment

COM520 Written Assignment 5

Assignment: Network Security Controls

Assignment Requirements

Securing Windows networks requires recognizing potential vulnerabilities and selecting the best control to

address that vulnerability. You as a network administrator working for Ken 7 Windows Limited have been

given the task of reviewing the current network security policy and recommending the best network

security control to satisfy the policy. You can select from a short list of network security controls.

For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated

requirements and provide a rationale.

Required Resources

? Case Scenario for Rationale: Importance of Windows Access Control and Authentication (see

below)

? Worksheet: Network Security Requirements Policy (see below)

Submission Requirements

? Format: Microsoft Word

? Font: Arial, Size 12, Double-Space

? Citation Style: APA

? Length: 1–2 pages

Self-Assessment Checklist

? I have selected appropriate network security controls for each domain of the Ken 7 IT

environment.

? I have provided rationale for my choices by explaining how each control makes the environment

more secure.

? I have followed the submission requirements.

COM520 Written Assignment 5

Case Scenario for Rationale: Importance of Windows Access Control and Authentication

Ken 7 Windows Limited is a manufacturer of Windows for residential and commercial builders. Ken 7

Windows Limited carries a variety of Windows and related products. It supplies builders with all of the

tools and supplies to install finished Windows in any type of building.

Ken 7 Windows Limited has just purchased a new enterprise resource planning (ERP) software package

to help control costs and increase both quality and customer responsiveness. The ERP software collects

and stores information including:

• Raw material costs

• Labor costs

• Materials and labor requirements for products

• Purchasing requirements

Ken 7 Windows Limited has identified six basic roles for users in the new ERP software:

• Administrators—maintain ERP data and system operation.

• Planners—run planning software and generate requirements reports.

• Shop Floor users —enter operational data (receiving, shipping, and product progress during

manufacturing).

• Managers—manage department personnel.

• Purchasing users—generate purchasing documents based on planning requirements.

• Accounting users—maintain cost and accounting data.

Access controls limit what users or roles can do with different types of data. For example, consider the

following types of data:

• Cost information—raw materials and labor costs, including the cost of finished goods.

• Manufacturing details—cost, amount of labor, and time required to produce finished goods.

• Purchasing requirements—rules for determining when raw materials, components, or supplies

should be purchased.

Through access control:

• Cost information can be viewed only by Accounting users.

• Manufacturing details can be viewed only by Shop Floor users.

• Purchasing requirement can be viewed only by Purchasing users.

During the analysis phase of 

We are the Best!

course-preview

275 words per page

You essay will be 275 words per page. Tell your writer how many words you need, or the pages.


12 pt Times New Roman

Unless otherwise stated, we use 12pt Arial/Times New Roman as the font for your paper.


Double line spacing

Your essay will have double spaced text. View our sample essays.


Any citation style

APA, MLA, Chicago/Turabian, Harvard, our writers are experts at formatting.


We Accept

Secure Payment
Image 3