Running head: Identifying Potential Malicious Attacks
1
IDENTIFYING POTENTIAL MALICIOUS ATTACKS
2
Identifying Malicious Attacks, Threats, and Vulnerabilities
Identifying Malicious Attacks, Threats, and Vulnerabilities
One law derived from Microsoft's ten immutable laws of security states that if anybody has unrestricted access to your computer, then it ceases to be your computer anymore (Chen, 2012). Having a domain "Everyone" group can prove costly to business since data security would be under threat. In business organizations, security begins with controlling access that employees have in particular domains. In this case, the medium-sized business has unrestricted access to files/folders to every client serving in the network. An essential need for file/folder permissions is, therefore, generated as it would see that data are safe and secure.
The administrator would have full control of the entire network (Bunt, 2004). The business would be divided into levels whereby management would take up the administrative role, while supervisors and employees each have their levels. Permission to access particular types of files would be granted according to the level and domain a certain individual is on. Business unit segregation is essential as it allows users access to resources that are associated with their position. Business is divided into various departments which all have different files/folders. Each department would have access to files that concern their field within the network. The administrator would have to set up an NTFS or a sharing system within the server to establish permissions and resource segregation. Additional installation and configuration of firewalls would ensure the security of data is paramount.
I would employ a strategy derived from Microsoft where a cryptic A-G-DL-P would enable data and resource segregation in the company (Curtin, 1997). The accounts in the network go into the global groups, then into the domain local groups where permission to resources is assigned. The strategy would employ scripting, whereby; domain local groups are given access to certain resources. Multiple assignments are avoided to prevent circumventing efforts of control. Permissions to certain resources would promote data segregation within the business' network.
The NTFS allows individual active user permission to read, write or modify file/folders (Chen, 2012). Usually, the administrator gains the privilege of obtaining permissions to modify. The workers can write, read and execute while assistants can only read and execute. It enables the administrator to obtain full control of the network and makes management efficient. NTFS credits administrators with the task of ensuring operations are conducted efficiently, and orders are effectively followed. NTFS also encourages security, since in this case; data theft would be highly unlikely. The administrator holds files crucial to the business and no client-user can access the ...
Running head Identifying Potential Malicious Attacks1IDEN.docx
1. Running head: Identifying Potential Malicious Attacks
1
IDENTIFYING POTENTIAL MALICIOUS ATTACKS
2
Identifying Malicious Attacks, Threats, and Vulnerabilities
Identifying Malicious Attacks, Threats, and Vulnerabilities
One law derived from Microsoft's ten immutable laws of
security states that if anybody has unrestricted access to your
computer, then it ceases to be your computer anymore (Chen,
2012). Having a domain "Everyone" group can prove costly to
business since data security would be under threat. In business
organizations, security begins with controlling access that
employees have in particular domains. In this case, the medium-
sized business has unrestricted access to files/folders to every
client serving in the network. An essential need for file/folder
permissions is, therefore, generated as it would see that data are
safe and secure.
The administrator would have full control of the entire network
(Bunt, 2004). The business would be divided into levels
whereby management would take up the administrative role,
2. while supervisors and employees each have their levels.
Permission to access particular types of files would be granted
according to the level and domain a certain individual is on.
Business unit segregation is essential as it allows users access
to resources that are associated with their position. Business is
divided into various departments which all have different
files/folders. Each department would have access to files that
concern their field within the network. The administrator would
have to set up an NTFS or a sharing system within the server to
establish permissions and resource segregation. Additional
installation and configuration of firewalls would ensure the
security of data is paramount.
I would employ a strategy derived from Microsoft where a
cryptic A-G-DL-P would enable data and resource segregation
in the company (Curtin, 1997). The accounts in the network go
into the global groups, then into the domain local groups where
permission to resources is assigned. The strategy would employ
scripting, whereby; domain local groups are given access to
certain resources. Multiple assignments are avoided to prevent
circumventing efforts of control. Permissions to certain
resources would promote data segregation within the business'
network.
The NTFS allows individual active user permission to read,
write or modify file/folders (Chen, 2012). Usually, the
administrator gains the privilege of obtaining permissions to
modify. The workers can write, read and execute while
assistants can only read and execute. It enables the
administrator to obtain full control of the network and makes
management efficient. NTFS credits administrators with the task
of ensuring operations are conducted efficiently, and orders are
effectively followed. NTFS also encourages security, since in
this case; data theft would be highly unlikely. The administrator
holds files crucial to the business and no client-user can access
the information.
Using Kerio control as a plan to utilize the active directory and
group objects would prove suitable for securing permissions on
3. business resources. The Kerio control enables login and logout
automation; the authentication process is entirely scripted to
avoid any unauthorized personnel from gaining access. It,
therefore, serves security in two ways: ensuring authentication
and placing a user in a particular domain that has specific
permissions. Using NTFS would come in handy as it would
allocate each domain to specific resources shared within a
certain department.
In conclusion, NTFS would prove useful in the business
organization due to its enhancement of security. Establishing
firewalls prove to be insufficient if every user has unrestricted
access to files/folders. NTFS and a sharing system would prove
useful in file/folder permissions and business unit resource
segregation.
References
Bunt, R. (2004, September 11). Performance and Reliability
Issues in Client-server Environments. Retrieved from
http://www.cs.usask.ca/ftp/pub/discus/MANDAS/overview.ps
Chen, K. (2012). The Role of NTFS in a network. International
Journal of Educational Development, 21, 401-415.
Curtin, M. (1997, March 12). Introduction to Network Security.
Retrieved from http://www.interhack.net/pubs/network-security/