This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Computer

 Control Access in Computer System

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 Control Access in Computer System

Explain types of information that can be stored in active directory user record: The information stored in the active directory pertains the sites, computer, shares, groups, or network items. To determine which file or holders to access or changes to make on the computer a user account is used by the window. Also, it tracks some personal favourites which include the screen saver or the wallpaper of the desktop. Standard account is used to do everyday task on the computer limited to what it can do while the administrative accounts are used to provide full regulator on the system. Local computer is accessed by the local user and the resources stored on the local security account manager.

Additional tabs which are available in the Active Directory User and Computer Advanced features mode: These tabs include the logoff: the user period of the logon and logoff can be observed. (Lethbridge,2016).  Password last set: displays the period when the user’s password was changed. Password expires: it displays when the password will expire. User account locked: the account status is displayed whether the account is locked, enabled or disabled.

Don't use plagiarised sources.Get your custom essay just from $11/page

What are some of the specific challenges and risks associated with account management in a large infrastructure? The large infrastructure requires the maintenance and flexibility to respond to unexpected changes regarding the lifecycle project thus, it needs end to end risk management assessment. Hence the mitigation abilities result to risk account management in the large infrastructure.

How can inadequate access control or access management leave critical information vulnerable? Inadequate access control results to lose of the security data the main problem with inadequate access is the compliance problem and the audits. (Singh,2017).  Including the network vulnerability and the penetration test. To avoid cyber-crime, one should ensure that the technical controls are working.

What protections does the encryption offer and how important is key management to keeping any encryption system secured? Protection offered by encryption key, the private and the public key advances complexity. (Hicks,2015) it inspires the organization to encrypt the data, moveable media such as tapes and mobile devices.it offers the public key that encrypts the data and the private key that decrypt the information.

Consider a cloud-hosted infrastructure as a service environment with many users accessing these systems from all over the world. What advantages and challenges might there be managing these identities and associated keys? The main advantage with the users using the system is proactive risk activation. Furthermore, the onsite visual management and change handling can be conducted in the cloud-hosted infrastructure.  System log files for known attacks can be noticed by monitoring the network traffic. thirdly, consistency over management approval of any changes. With the increase of the cyber-crime, it is vital to monitor capabilities other than to rely on the preventive control measures.

Finally, conclude the week assignment with a page explaining how the tools and processes demonstrated in the lab might be used by an infrastructure administrator to help secure an environment. To secure an environment, the tool must comprise a set of rules to regulate the access gain of a subject. The users should be recognized. When the system has accessedhas accessed the access should be determined by the person attempting to access and the level of authorized, he or she possesses. Tools are used to measure the security of insecure software’s. data should be kept protected and secure so that the effect of security can be controlled. Finally, the system should have a distinct security plan.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask