I administrator access rights can install database

Info icon This preview shows pages 6–8. Sign up to view the full content.

View Full Document Right Arrow Icon
i. Administrator access rights- Can install database software and maintain the database server. ii. Programmer access rights- Limited to their programming needs. iii. Data entry access rights- read and write access to the database tables. iv. User access rights- read only access II) External security External access takes place through the VPN and is protected by the firewall and DMZ network. ix. Security and Monitoring Server Monitors all the components of the Intranet. It does intelligent updates of antivirus software, security patches and service packs on all the servers and workstations. For example if there is a service pack update from Microsoft it is installed on this server and is then pushed to all other severs and workstations. It also gives a detail report on the user activities on the workstation and administrative activities on the servers. x. Workstations The list below gives some suggestions for security measures that should generally be implemented on all workstations, whether new or existing. Further measures may be implemented as resources allow. This list only gives some starting points; it is not exhaustive. In addition, it only provides information on what to do, not how to do it. 1. Password security is one of your best defenses. Use strong Administrator passwords — i.e. mix upper and lower case, numbers and special characters, and make long — with Windows 2000 you can go longer than 14 characters, which can have its advantages. 2. Default password and account policies are practically non-existent. Implement better user password and lockout policies — consider using passfilt or an alternative for password complexity, set a minimum password length and educate your users. 3. Never make ordinary users members of Administrator groups. 4. Check for copies of the SAM (Security Account Manager) that everyone can read and secure them (e.g. created by backup software.) 5. Turn on auditing and review your logs regularly. 6. If possible, implement the following registry key changes — Restrictions for Anonymous Users LAN Manager Authentication Level Send Unencrypted Password to SMB Servers 7. Where time permits, review NTFS permissions and tighten file system security Montclair State University Fall2004 Catherine Alexis 6
Image of page 6

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Intranet Security (particularly on WinNT; Win2000 is better.) 8. Review Share permissions. 9. Disabled default “Guest" Username. 10. Confirm that non-common passwords are on every user account. Consider non- common user names also. 11. The Administrator Account cannot be disabled. 12. Be careful with permissions. Do not use Guests, Everyone or other unauthenticated users. The everyone group contains people you don't know. Guests, if the account is enabled users from other "trusted" domains can gain access. It is indeed better to set up permissions with "Domain Users" or even "Authenticated Users". Everyone is a wide-open special group that you have very little control over. 13. Disable file/printer sharing for TCP/IP and use only printer and file server. 14. When file sharing is necessary, restrict scope and time available. Turn off when not necessary 15. Review Installation and Boot Process in Event Viewer 16. Set Event Viewer Log Size and Wrap Setting 17. Disable Unnecessary Services 18. Set proper Paging File Sizing and Placement.
Image of page 7
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern