Discuss environments where heightened levels of security are required. Are any of the security measures used in these environments foolproof? Why or why not?© BrainMass Inc. brainmass.com October 25, 2018, 8:31 am ad1c9bdddf
The two biggest environments where security is heightened is Medical and Banks. Medical facilities and anyone dealing with medical information must conform ...
Networking, Internetworking, and Security Windows 2003
You are in the role of a consultant. Provide a document fitting for your client. Include all the information that your client will find useful. Be sure to respond to the questions posed directly. But remember, as in any consulting engagement, the client may not have asked all the questions so make sure you consider the entire project. Include any assumptions that you make with regard to this project. Use a report-like format. Do not use a Q&A format. Your document length should be 3-5 pages. As always, double space your document and include your references using proper citation techniques
You have been hired by a large restaurant called Habibi's. Habibi's has a small network of 20 client workstations and a Windows Server 2003. Seven of those workstations are inside the restaurant and are used by the table servers to place customer orders. Three of the workstations are used by the owner and the management staff, and the rest are in the kitchen for the chef's staff.
During Phase One of this project, your job is to set up the Windows Server 2003 and train two of the management staff on its operation.
1. Currently there is only one restaurant location. In the near future, Habibi's will open another branch. Explain how you would work with the current management staff to determine how to set up groups now that will enable them to be ready for the future expansion. What natural groupings can you identify, and how would you implement them in terms of domain local, global, and universal groups?
2. The chef is very temperamental, and one of the guarantees that have been made is that only he will have access to the server folders that will contain his secret recipes. Using some or all of the following tools, explain how you would set up access and security on his folders.
o User rights
3. The table servers need access to two shared folders that will enable them to place orders from any of the seven workstations available to them. Explain how you would set up security on these folders.
4. The two management staff members need training how to set up shared folders will access permissions and share permission security. Develop a set of instructions to help them understand how to set these up.
Describe the GUI and command line utilities that you might use in creating and managing users, assigning them to global groups, assigning the global groups to domain local groups and granting domain local groups permissions, should Habibi's grow to a national chain of restaurants. Try to envision and describe different scenarios where different utilities might be very useful.The deliverable length should be approximately 4-5 paragraphs. The assignment should not be submitted in the form of a Word document.Don't forget to include your references! These references add credibility to your statements and support your statements. Stating information obtained from other sources requires listing the reference. Re-state that information using your own words. Extracted information must be denoted as such using quotes or some other way to give credit to the original authorView Full Posting Details