1. What does DACL stand for and what does it mean? It is a type of access control defined by the Trusted Computer System Evaluation Criteria as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject (unless restrained by mandatory access control)". 2. Why would you add permissions into a group instead of the individual? What policy definition do you think is required to support this type of access control implementation? User accounts are designed for individuals. Group accounts are designed to make the administration of multiple users easier. While you can log on to user accounts, you can't log on to a group account. Group accounts are usually referred to simply as groups. You use groups to grant permissions to similar types of users and to simplify account administration. If a user is a member of a group that can access a resource, that particular user can access the same resource. Thus, you can give a user access to various work-related resources just by making the user a member of the correct group. Note that while you can log on to a computer with a user account, you can't log on to a computer with a group account Adding…
The components consist of a Central processing unit, a Server and a Network. Central processing unit, referred to as CPU is the main processing component of a computer system (O 'Brien & Marakas, 2011, p. 93). The CPU makes every click or keystroke possible, it handles and processes all of the instructions given. Many will refer to the CPU as the brains of the computer. The Server is a device on a network that performs different functions. Mainly, a Server performs as a storage unit for files.…
Ideally server hardware should be replaced every four to five years. The server at the Hastings i-SITE is now a decade old and is beginning to fail. This document investigates three options for replacing or removing this aging hardware and recommends which option the Network Infrastructure Support team recommends. Background Hardware The industry standard recommendation is to replace hardware after three to four years. In practise this replacement window could be shorter or longer depending on…
DirectAccess is new to the Windows 7 operating systems. DirectAccess enables a remote user to work on their corporate network when they are away from the office without the need of a VPN. As long as the remote user is connected to the Internet, DirectAccess will automatically connect the remote user to the corporate network without the need of any user intervention. When a user’s DirectAccess - enabled laptop is connected to the Internet, a bidirectional connection is automatically established…
9. When granting access for the Human Resources group to access the HRfiles within the HRfiles folder, what must be configured within Active Directory? That groups’ access must be limited to that particular folder, also being a human resource group, access to this groups shares must be very restricted from other groups. 10. Explain how C-I-A can be achieved down to the folder and data file access level for departments and its user’s using Active Directory and Windows Server 2008 R2 access…
This policy applies to all users of DW&C’s owned or leased buildings, property and assets (Windel, D, 2008). Internal system resources include: network devices: routers, switchers, firewalls, load balancers, other network devices; servers: both the physical and virtual servers, operating systems and their applications; any other system resources and subsidiary assets considered in scope (Windel) External system resources include those assets that are owned and operated as well as maintained by…
coding. Users can use templates from Wordpress template list and use them as is or customize to their needs. Wordpress offers over 500 free as well as premium templates that are responsive and work efficiently on all devices such as desktop, tablets and smartphones. A user can buy premium templates that range from $10 - $80. But, the hosting costs quickly add up and hosting a serious website can cost from $15 - $25 a month. Wordpress can be accessed at www.wordpress.com. Users get a custom url…
It is a multiprocessing system capable to support up to 200 simultaneous users. Minicomputers stand-alone computers and are smaller in size than mainframes and bigger than the microcomputers. (Anon., 2014) Types & Description Models Functions Support Multiprocessing? Environment to Used Mid-range servers Medium-sized computer that can handle large scale processing of Business and Scientific applications. (Bytes notes, 2013) ADM Opteron Servers • Multi-gigabytes of RAM and multi-terabytes of…
surveys were used to obtain a sense of how these individuals felt regarding the topic of computer use in preschools. Two different surveys were given containing 19 questions (Anđelić1 et al., 2014). Both open-ended and close-ended questions were used in the surveys. The questions ranged from demographics to the computer usage of the individual and their personal thoughts or feeling on the implementation of computers in preschool classrooms. Having both open-ended and close-ended questions mean…
This site defines cookies and some of the ways they are used. The site states, "a ‘cookie’ is a small text file placed on your local computer sent by a web server so that your data can later be read back from that website." This file will tell the Internet information specific to the user’s computer, and if the user ever visits that site again. The video, on the referenced site, goes on to explain in more detail the different areas where a cookie can be used. Some of the things that can be done…