Preview

Procedure Guide to Access Control

Satisfactory Essays
Open Document
Open Document
386 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Procedure Guide to Access Control
Procedure Guide to Access Control

• Explain the need for designing procedures for simple tasks such as creating or modifying access controls o Access controls is an important part of security in any business setting. This insures the protection of sensitive materials from being access from unauthorized users as well as keeping in-house materials in-house and not distributed to unauthorized personnel. o When setting procedures up for creating or modifying access controls you have to take in account the type of personnel that will be implementing the procedures. You may have to use simplified methods to allow the users easy access to correct, add or delete information. At the same time the procedure need to be complex enough that unauthorized users cannot get in and change information on their own. o Proper procedures insure that a system is not compromised or destroyed based on a simple mistake or miss management of access.
• List the steps to satisfy each of the requirements in the assignments instructions:
1. Status or setting prior to change : Start menu, Right click computer, select manage
This will allow you to see what is currently in place and also bring you to the place you need to be in order to make any changes
2. Reason For Change:
The reason for change could be as simple as a new user needs to be added to a particular group to allow them access to certain information so that they are able to do their job
3. Change to implement:
Start, Admin. Tools, Active direct. Users and computers, right click users, add user, follow prompts to add user, right click group, click add users, follow prompts to add user to group
4. Scope of the change:
Log out of admin. Log into user , test access of group information and add and change capabilities
5. Impact of change:
Impact of change either adds access or denies access but over impact is no change.
6. Status or setting after the change :
You back through the same way you access information as the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this lab, you followed the Microsoft approach to securing the CIA triad. You created new user…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It’s imperative that proper user/groups structures are established. Every user will be a member of the group however; every user won’t be an owner of a group. The owner can change attributes and grant access to files within the group they own.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In the final step monitor and evaluate the effects of change one should think this would be a self-explanatory rule however, in any company or organization when implementing new rules and making significant changes the company as a whole should want the progress monitored and this is why human resources have ways of collecting data and information in order to monitor and evaluate any effects the changes have had if…

    • 282 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9 Exercise 1

    • 225 Words
    • 1 Page

    b. Under Deployment Tab – Change whether you want the application to uninstall off computers when you remove the GPO…

    • 225 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Good Essays

    Lab 2

    • 514 Words
    • 2 Pages

    d. Log off and log on as the EntAdmin user. Repeat steps 4b through 4c to determine whether the EntAdmin user has the ability to view and/or modify the schema.…

    • 514 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There are many precautions that can be taken to protect IT systems and data. These are as simple as:…

    • 914 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    The type of access controls and permissions that are probably configured are Modify , Read or Full control.…

    • 503 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Access control rules and procedures are required to regulate who can access IDI information resources or systems and the associated access privileges. This policy applies at all times and should be adhered to whenever accessing IDI information in any format, and on any device.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    You Decide week 5

    • 831 Words
    • 3 Pages

    Good day MS Kim, I would like to explain the available options of Access Control Lists what will do and what types of ACLs there are. Complex ACLs can be tricky but will better for security for the network. There are three different types of ACLs, Dynamic ACL, Reflexive ACL, and Time Based ACL. Each ACL is unique to the type of network we have. Dynamic are also called lock-and-key ACLs which only allow IP traffic only. Also the lock-and-key authenticates the user and permits limited access through the firewall router for a host for a time. Time Based ACLs are a specific time that traffic is allowed on the network. When the device determines that an ACL applies to a packet, it tests the packet against the rules. The first matching rule determines whether the packet is permitted or denied. If there is no match, the device applies a default rule. The device processes packets that are permitted and drops packets that are denied. “ACLs protect networks and specific hosts we would be able to specify certain days and hours of which the user will have access to the network. With this type of ACL there is more control over permitting or denying access to resources. Reflexive ACL allows outbound traffic from the network and limits the inbound traffic. This allows greater control over what traffic is on the network and able to expend the control list. Also, with Reflexive when ACL, an unknown IP address is trying to gain access, it will put the IP address in a temporary ACL group and will await replies from the network and the network will automatically remove the IP address when the session is over. It is probably in the best interest for our network to concentrate on Reflexive ACLs for these reasons;…

    • 831 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    6. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs departmental folders, and data.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Global Groups- Adding each user to a global group account according to their share attributes, the attributes can be geographical or functional.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    lab notes

    • 251 Words
    • 2 Pages

    User-based and groups or role-based controls are two types of access controls for Windows Server 2003 for folders and authentication.…

    • 251 Words
    • 2 Pages
    Good Essays