Control Access in Computer System
Explain types of information that can be stored in active directory user record: The information stored in the active directory pertains the sites, computer, shares, groups, or network items. To determine which file or holders to access or changes to make on the computer a user account is used by the window. Also, it tracks some personal favourites which include the screen saver or the wallpaper of the desktop. Standard account is used to do everyday task on the computer limited to what it can do while the administrative accounts are used to provide full regulator on the system. Local computer is accessed by the local user and the resources stored on the local security account manager.
Additional tabs which are available in the Active Directory User and Computer Advanced features mode: These tabs include the logoff: the user period of the logon and logoff can be observed. (Lethbridge,2016). Password last set: displays the period when the user’s password was changed. Password expires: it displays when the password will expire. User account locked: the account status is displayed whether the account is locked, enabled or disabled. Don't use plagiarised sources.Get your custom essay just from $11/page
What are some of the specific challenges and risks associated with account management in a large infrastructure? The large infrastructure requires the maintenance and flexibility to respond to unexpected changes regarding the lifecycle project thus, it needs end to end risk management assessment. Hence the mitigation abilities result to risk account management in the large infrastructure.
How can inadequate access control or access management leave critical information vulnerable? Inadequate access control results to lose of the security data the main problem with inadequate access is the compliance problem and the audits. (Singh,2017). Including the network vulnerability and the penetration test. To avoid cyber-crime, one should ensure that the technical controls are working.
What protections does the encryption offer and how important is key management to keeping any encryption system secured? Protection offered by encryption key, the private and the public key advances complexity. (Hicks,2015) it inspires the organization to encrypt the data, moveable media such as tapes and mobile devices.it offers the public key that encrypts the data and the private key that decrypt the information.
Consider a cloud-hosted infrastructure as a service environment with many users accessing these systems from all over the world. What advantages and challenges might there be managing these identities and associated keys? The main advantage with the users using the system is proactive risk activation. Furthermore, the onsite visual management and change handling can be conducted in the cloud-hosted infrastructure. System log files for known attacks can be noticed by monitoring the network traffic. thirdly, consistency over management approval of any changes. With the increase of the cyber-crime, it is vital to monitor capabilities other than to rely on the preventive control measures.
Finally, conclude the week assignment with a page explaining how the tools and processes demonstrated in the lab might be used by an infrastructure administrator to help secure an environment. To secure an environment, the tool must comprise a set of rules to regulate the access gain of a subject. The users should be recognized. When the system has accessedhas accessed the access should be determined by the person attempting to access and the level of authorized, he or she possesses. Tools are used to measure the security of insecure software’s. data should be kept protected and secure so that the effect of security can be controlled. Finally, the system should have a distinct security plan.