Sally Chu has a business where the computers are setup on a work-group instead of active directory server. Mrs. Chu wants to have the staff to have same computer-access privileges to run application and use network printer but not to a make any changes to the computer. Mrs. Chu also wants to have information on two forms of authentication methods for windows 7 and to know the advantages and disadvantages of both methods. Mrs. Cho has application which will need to run in the protected mode of Internet Explorer (IE) on the local intranet and be able to write to disk space on the computer. A plan will also need to be created to be able to apply updates to the computer in most-efficient and cost effective manner with little drag on the network. When the computers are running sluggishly, the performance of the computers can be monitor to see what is causing the slowness.
Mrs. Chu has six administrative staff which needs access to the computers to be able to run application and print to network printers without having administrative rights to change settings on the computer. If the staff have their own assigned computer then each person can have a local account created on the computer. To add a person as a local user, click on Start, right click on Computer and then left click on manage. This will bring up the Computer Management window and then expand Local Users and Groups. Right click on the User folder and click on new user. Fill in the information such as User name, Full name if needed and create a temp password. Have user much change password click at net login and click on Create. When the staff member logs in for the first time, the staff will have to pick a new password. The local account is created, but needs to make sur...
... middle of paper ...
...saved. The administrator can subscribe to the logs on each of the computers and review them to see what it causing the slowness. If all the computers are slow at the same time and the application runs over the network, in this case the events to customize may be more on the network traffic side of the computer than the computer itself.
Works Cited
Dunn, S. (2006). Spot PC Trouble Early With Windows' Event Viewer. PC World, 24(5), 138-139. Retrieved from https://search-ebscohost-com.libdatab.strayer.edu/login.aspx?direct=
true&db=a9h&AN=20347930&site=ehost-live&scope=site
Johnson, Steve. (n.d.). Biometric fingerprint scanners advantages & disadvantages. Retrieved from http://www.ehow.com/facts_6075837_biometric-fingerprint-scanners-advantages-disadvantages.html
Zacker, C. (2011). Windows 7 configuration. (p. 332). Danvers, MA: John Wiley & Sons, Inc.
Andrews, J. (2010). A+ guide to managing and maintaining your PC (7th ed.). Boston, MA: Cengage Learning.
User Communications. Dartmouth College, Department of Computing Services. "Computer and Network Policy." BlitzMail Bulletin. Wed, 15 Nov 2000 13:36:45.
Santa Barbara Police Department. (2008, December). Police Boost PC Management, Security, User Productivity with Optimized PC Desktop. Retrieved from http://www.microsoft.com/casestudies/Windows-Vista-Enterprise/Santa-Barbara-Police-Department/Police-Boost-PC-Management-Security-User-Productivity-with-Optimized-PC-Desktop/4000003332.
Another recommended solution is to set up access controls. Access control is a security precaution that is used to control who or what can view or use resources in a computing environment. Physical access control limits access to campuses, buildings, and physical IT assets. Logical access limits connections to computer networks, system files and data. There are four basic types of access controls: mandatory, discretionary, role-bases and rule-based.
6. Lemos, Robert, Microsoft developers feel Windows pain, 7 Feb 2002, CNet News.com, 12 Mar. 2004, < http://news.com.com/2100-1001_3-832048.html>
As the internet is becoming faster and faster, an operating system (OS) is needed to manage the data in computers. An Operating system can be considered to be a set of programed codes that are created to control hardware such as computers. In 1985 Windows was established as an operating system and a year earlier Mac OS was established, and they have dominated the market of the computer programs since that time. Although, many companies have provided other operating systems, most users still prefer Mac as the most secured system and windows as it provides more multiple functions. This essay will demonstrate the differences between windows
...e user while using the software applications. This could be word processor documents, spreadsheets, presentations, web pages or game save files. It is important to keep this data secure, as it could include important information such as customer details, employee payroll data or financial information. There are huge amounts of user data stored by businesses that are absolutely vital to the running of the business.it is therefore extremely important to keep a copy of this data that is currently stored on the system.
Please read the article “Security Controls for Computer Systems” at the following URL. http://www.rand.org/pubs/reports/R609-1/index2.html 1.
Distributed access management: In Small ICS organizations, each system can use separate set of user credentials, accounts and roles.
To build a good and stable network is extremely difficult. It takes a team of very knowledgeable engineers to put together a system that will provide the best service and will forfill the need for the companies users and clients. There are many issues that have to be resolved and many choices have to be made. The toughest choices IT managers have to make, are what will be the best server platform for their environment. Many questions must be answered. Which server software offers complete functionality, with easy installation and management? Which one provides the highest value for the cost? What kind of support and performance can be expected from this system? And most important of all is what is more secure? In this paper, Microsoft Windows NT Server is compared to UNIX, in the large commercial environment. The main focus of the comparison is on the areas of, reliability, compatibility, administration performance and security.
Muchmore, Michael. Rev. of Microsoft Windows 7, by Microsoft Corp. PC Magazine. Ziff Davis, Inc, 22 Oct. 2009. Web. 26 Aug. 2011.
Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever-growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a short distance to cover. In most cases a LAN only occupies one or a group of buildings located next to each other. For larger area need there are several other types of networks such as the Internet.
Malware protection is another factor to appreciate, as this vice can lead to significant losses to an organization as it corrupts available data for use. The various networks that are used by business firms should consider adhering to network design principles that uphold the security standards set in place. The organizational staff using the different accounts of the company should be limited, and very few individuals should only access the administrator database. Moreover, the various user activities should be regularly monitored and consider changing of account passwords or deleting none existing accounts (Wolden et al., 2015).
Microsoft Windows is a graphical operating system that was developed by Microsoft. Microsoft has designed and developed a series of these operating systems since they opened shop. Since Microsoft began developing operating systems they have grown remarkably in terms of usability, graphical interface, speed, and most importantly security. In this paper we are going to take a closer look at the security features that are built in the latest windows operating system which is the Windows 8 operating system. We will also discuss the security services that are provided by the Information Security discipline. Furthermore we will discuss how the Windows 8 features are categorized to the security services provided by the ISO 7498-2. Before we take a look at windows 8 let us go through a short background of the windows operating system from start to date. We will then briefly look at the security features of these earlier versions of operating systems and compare them to the windows 8 security features.
There are a wide variety of ways to protect confidential information, security software, encrypting files, requiring authorization, restricting access just to name most common forms of protection. Many companies require employees to use an employee ID card to scan into the building and go in certain areas of the building or use certain equipment. Companies also have systems where employees must request access to certain computer programs or systems that need a manager’s approval and for the IT department to get them set up and