Window Security Implementation
Scenario
NextGard Technologies specializes in the network consulting services for small, medium and large organizations inside and outside the United States. Currently, NextGard has approximately 250,000 employees in 5 countries and the company corporate headquarter is located at Phoenix, AZ. However, the company decides to secure and upgrade its current network to enhance organization efficiencies. Currently, the company has 5 district offices at the following locations:
New York City, New York,
Atlanta, Georgia,
Los Angeles, California,
Montreal, Canada,
Bangalore, India.
At the district offices, employees have a combination of mobile computers, desktops computers, and wireless devices. Moreover, the company has the mix of computers operating with the Window 7, Window Vista, Window XP and Window 2000. The company also has Window Active Directory located at the Phoenix office and the Phoenix office has two proxy servers to provide Internet access control and Web cache services for the company since majority of the company applications are web based.
Project Objective
Objective of this project is to upgrade and secure the company current network to enhance organizational efficiencies. However, it is critical to design appropriate access control for the Microsoft Windows to enhance their effective security system.
Appropriate Microsoft Windows Access Controls
Vulnerabilities and security holes in Microsoft software programs are common target of security attacks. However, many attacks are focused on the Microsoft Windows due to their wide use by many organizations. (Smith, 2000).Based on wide vulnerabilities against Microsoft Windows, NextGard is required to take preventive measures and set up the following Window Access Control policies:
First, the NextGard should improve its access control using auto-checking to search for passwords that are more complex for the company IT administrator. Typically, the company should formulate policies to ensure that the administrator uses a very complex and strong password to log into his or her administrative account. The use of a strong password is very critical to deter unauthorized access into the company network account. It is very critical for the company administrator to always use a very strong password that unauthorized individuals will find challenging to crack. Moreover, the company should use SmartCards to securely store personal information and enhance authentication. (Mike, 2008).
Additionally, NextGard should make a policy to ensure that all employees are to use the company computers for only the business communication, and all employees must communicate solely with the company emails and the communication should be strictly based on the NextGard business operations.
Cryptography Methods to protect the Company Information
Cryptography policy is the strategy to protect company information through encryption. NextGard needs to develop a cryptographic policy to enhance integrity, confidentiality, and authenticity of the company information. Cryptographic method involves the use of digital signature encoded by the asymmetric cryptography or public key. As part of the security policy, the company should include digital signature with document transferred electronically whether the document is encrypted or not. To decrypt the digital signature, a user should verify the public key using a secured private key of the document sender. However, the company should employ key management to make both the public key and private key highly confidential.
Data encryption should also be established to protect the company information. Encryption is the strategy by which all data within the organization are converted into unreadable form and only authorized users with decrypted key can only convert the data into a readable form. This strategy will assist the NextGard from preventing unauthorized access to the company data. The encryption system will protect all the company data from an unauthorized access because external intruders will not be able to read the data since they do not have access to the decrypted key. (Bruce, 2005). The company should also use the cryptographic system to protect the data transferred electronically from one computer to the other since an intruder could hijack the company data from the network system using strategy such as eavesdropping and sniffing. Thus, the company should use the cryptographic strategy to protect the company data in transit using the encryption form. However, the company needs to keep the decrypted keys very confidential, and under no circumstances should the decrypted key communicated to third parties or unauthorized individuals.
Method to Thwart Malicious Code and Activity
Trojan horse is the malicious program, which looks like a normal program, however, hides malicious code to gain access into confidential information through remote access. Similarly, viruses manipulate a legitimate user by bypassing access control and authentication to spread malicious...
0 of the Windows.NET Development Framework. From the standpoint of Microsoft Windows Vista being suitable as an enterprise desktop, the inclusion of highly differentiated security features and the reliance on the security development lifecycle will be quickly tested and evaluated by CIOs looking for the increased productivity that Windows Vista claims to provide in conjunction with Microsoft Office applications, for example. For those enterprises with a geographically diverse workforce, the inclusion
This will not only create a higher level of trust in the actual implementation, it will also set the foundation for more effective ongoing support for these users if they have any problems with the systems once they are installed. An effective change management strategy is as important, if not more important, than the technology upgrade and implementation plan itself (Gil, Tether, 2011). In implementing any it Project the concept
Windows Operating System: As one of the mainstream modern operating systems, Windows Operating Systems is commonly used across the globe. The series of Windows Operating Systems are developed by Microsoft and have developed to become the leading operating systems that are used by many people in the globe. The history of this operating system can be traced back to 1981 when it was basically considered as a graphical user interface that
(an in-depth look at WMI and Instrumentation) After this is achieved, a 'ManagementPath is created, wherein it will be bound to the WMI class or the '_ namespace class'. The third step is the creation of the 'ManagementClass' object that is achieved by using the scope as well as the path objects that have already been created, or by creating the ManagementClass object and then directly passing along the path
Windows XP was introduced as a major upgrade to Windows 98 and Widows Millennium. After Microsoft released MS-DOS in the 1980's it developed its revolutionary operating system -- Windows. Newer versions of this operating system were developed over the years, including the release of Windows NT (New Technology) which was aimed at business users and computer servers. After various incarnations of the Windows OS, including Windows 95, 98 and the
SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now