Running head: DATA SECURITY
Encryption is used to protect connections
between locations within a company
discuss the use of Virtual Private
Networking (VPN) and
Authentication Part 2
In this lesson we're going to spend some time looking at the concept of authentication.
Type 3: Something You Are
The third identification factor is something you are. The user has to provide some unique physical
General Defense Strategy
Let's talk about formulating a general defensive posture, or a general defense strategy, because as a
security administrator you're responsible for protecting your information from the almost limitless
number of attacks
One of the most important jobs of an administrator is to create and manage user accounts.
Windows Server offers powerful tools for managing users.
When creating users:
Each user name must be unique.
It is good policy to use complex passwords and require t
Access control models are academic and mathematical models developed for the analysis of
security that present guidelines for the implementation of system security. Components of these
models have helped shape objectives for real-world security systems an
Identity Management (IDM) is the process of identifying individuals within a system and
controlling the level of access each individual has to resources in that system. IDM associates
rights and restrictions with an identity.
Most organizations are compos
Access control best practices take into consideration the following security principles:
The principle of least privilege states that users or groups are given only the
access they need to do their job (
Authorization is the process of controlling access to resources, such as computers, files, or
printers. When managing access to resources, be aware of the following:
A group is an object that identifies a set of users with similar access needs. Microsoft
Access Control Best Practices
Now let's talk about some access control best practices.
Principle of Least Privilege
First we'll talk about one of the most important security principles in general, the principle of least
General attack strategies include the following steps:
Reconnaissance is the process of gathering information about an organization,
System hardware information
Individual user information
Implementing Discretionary Access Control
In this demonstration, we're going to look at discretionary access controls. A really good example of
how discretionary access controls can be implemented is the NTFS file system, which is the default fi
Managing User Account Properties
In this video, we're going to talk about managing user accounts.
Active Directory Users and Computers
Anything that has to do with user accounts is done in Active Directory Users and Computers. We're
Hardening User Accounts
In this demonstration, we're going to look at some things you can do to harden the Windows
workstations in your network. Specifically, we're going to look at restricting local accounts, and also
securing the default accou
General Attack Strategy
Let's talk about the general attack methodology, or strategy, that are used by threat agents when they
conduct an exploit.
Now no two exploits are the same. You'll find there's radical differences in the way the exploits
Active Directory is a centralized database that contains user account and security information. In
a workgroup, security and management take place on each individual computer, with each
computer holding separate information about users and resources. With
Security Roles and Concepts
In order to be an effective Security Administrator you've got to be familiar with the concepts and the
roles surrounding information security. We're going to talk about those here.
The first concept i
A security plan is gone for reducing risk. It will accordingly have no
less than three objectives, taking into account your risk assessment.
Reducing the level of threat, you are experiencing
Reducing your vuln
I was surprised that my knowledge state is 85% seems I knew more than I thought I did.
Think about your current organization or organization you have worked recently. Which of the following
organizational culture types would define
Week Four DQ: Wireless
WiFi stands for Wireless Fidelity and is the same thing as saying WLAN which stands for
"Wireless Local Area Network." It works off radio frequencies and is sent across the air ways on
radio waves; like you think of ocean waves flow
Week Four DQ: Voice over IP
I like this question; I have worked with VoIP while serving in the military and with local WISP
after I transitioned out to civilian life. Of course its been a long time but its in here
somewhere .lol. This is a service that us
Viewing Implicit Deny
In this demonstration, we're going to practice working with implicit deny. Remember with implicit deny,
the assumption is that nobody has access to a particular resource unless they are specifically granted
access to that r
Active Directory Structure
Now that you understand what the Active Directory Service is and how objects are created and stored
in Active Directory, we next need to look at the structure of Active Directory.
The first structure
Threat Agent Types
Let's discuss the different categories of attackers, or threat agents, that you need to be aware of as
you protect your organization's information. And this is really important because a lot of times Security
Security is the degree of protection against danger, damage, loss, and criminal activity. In regards
to information security, computers, and IT networks, modern day security challenges include the
Access Control Models
Now let's take a look at access control models. We have MAC, DAC, RBAC and a second RBAC.
Let's take a look. So we've got the four models listed here and these are all different ways of
controlling access to resources, acce
Examining the Access Token
In this demonstration, we're going to spend some time working with access tokens. Specifically, we're
going to look at the access token that's granted to a Windows user when that user logs in to a
Access control is the process by which use of resources and services is granted or denied. When
implementing access control, one of several models can be used. The following table lists the
most commonly used access control models:
Using the Simulator
One of the key components of your TestOut training are the lab activities. In this demonstration I will
show you the components of our lab simulator, so that you can successfully complete the lab activities
that are included
Now let's talk about security groups, roles, rights and privileges in relation to access control.
Advantages of Using Groups
Groups allow for much more efficient administration, and more efficient administration makes sec
In this demonstration, we're going to take a look at how to create groups. In order to create groups, we
need to be in Active Directory Users and Computers. You can open that from the Tools menu or the
Start menu, whatever is mos