COM 520 University of Nairobi Actions for Existing Workgroup Accounts Discussion

User Generated

eja1996

Writing

COM 520

University of Nairobi

COM

Description

APA Format

1-2 Pages

No Plagiarism Please submit to turnitin

All Details in the files attached

Please make sure you understand the scenario before start writing


Unformatted Attachment Preview

Running Head: WORM-RBOT.CBQ 1 WORM-RBOT.CBQ Name of Student Institutional Affiliation Date WORM-RBOT.CBQ 2 On 16th August Microsoft operating systems were attacked by a fast-moving worm that was later identified as worm-rbot.cbq. The worm is said to have been derived from a worm reported earlier over the weekend referred to as the Zotob worm; this connects to a control server, scans the network neighborhoods and tries to infect them all. According to reports from the CNN reveals that worm-rbot.cbq enters the system through a PC connected to unsecured networks after which it infects systems from the inside (CNN, 2005). The attack resulted in a shutdown of computers in Germany, Asia and the united states and affected several organizations including the Caterpillar Inc., CNN, New York Times and ABC, among others. The worm was primarily designed to affect Windows 2000 in which typical symptoms were a recurrent shutdown and rebooting of the computer. During this time, the quick response proposed for the customers was to install windows security updates as fast as possible to help mitigate effects from the attack. It was determined that the worm exploited a vulnerability in Microsoft's plug-and-play service; ideally, the worm spread fast in unpatched machines. Even though the worm proved to be a threat at the time, a report from the FBI indicated that the attack was not designed as part of a bigger attack later. Like any other threat, attacked organizations had to respond quickly and appropriately to minimize the attack's effects. It's recorded that CNN was able to clear up its problems about an hour and a half later; problems had begun at around 5 p.m. in Atlanta and New York. The New York Times, as well, was able to revive their systems in time to keep the newspaper production going on (CNN, 2005). It is most probable that the attack was not widespread owing to the fact that at this time there were improved firewalls and quicker patches. WORM-RBOT.CBQ 3 References CNN. (2005) Worm strikes down Windows 2000 systems. https://edition.cnn.com/2005/TECH/internet/08/16/computer.worm/index.html Source: Course textbook Submission Requirements + Format: Microsoft Word (no PDF) + Font: Arial, size 12, double-space + Citation Style: APA format + Length: 1 to 2 pages Self-Assessment Checklist + I addressed all questions required for the summary report. + I created a well-developed and formatted report with proper grammar, spelling, and punctuation. + I followed the submission guidelines. COM-520 Written Assignment 1 Project Scenario Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia. The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25 workstation computers in the headquarters offices and main warehouse. The network uses workgroups, and users are created locally on each computer. Employees from the regional warehouses connect to the Colorado network via a virtual private network (VPN) connection. Due to a recent security breach, Always Fresh wants to increase the overall security of its network and systems. They have chosen to use a solid multilayered defense to reduce the likelihood that an attacker will successfully compromise the company's information security. Multiple layers of defense throughout the IT infrastructure makes the process of compromising any protected resource or data more difficult than any single security control. In this way, Always Fresh protects its business by protecting its information. Project Part 1: Active Directory Recommendations Scenario Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company's network. Tasks Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network: 1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users? 2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory? 3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory? 4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers (SIDs).) Required Resources + Internet access
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

Running head: SUMMARY REPORT

1

Active Directory
Student’s Name
Institution Affiliation
Professor
Course
Date

SUMMARY REPORT

2
Active Directory

Creating Users
The improvement of technology has enabled many companies to enhance their
security features and reduce the levels of threats they face regularly. However, it has
also enabled hackers to devise sophisticated ways to hack into computers that have
weak security systems. The introduction of the active directory simplifies how
companies structure their user profiles by ensuring that they come from the same
center. With an active directory system, administrators create user-profiles and design
the hierarchy of functioning in one supercomputer (Binduf et al., 2018). They create the
profiles and passwords then allocate them to the users. Active directory can help track
the number of activities from each computer and detect threats early. Exposed systems
can...


Anonymous
Really helped me to better understand my coursework. Super recommended.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags