Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

CYB 2 3 0 Project One Guidelines and Rubric Permission Modification Overview Setting permissions can be a simple but critical aspect of a systems administrator

CYB 230 Project One Guidelines and Rubric
Permission Modification
Overview
Setting permissions can be a simple but critical aspect of a systems administrators role. While setting permissions can sometimes be a straightforward matter of process, this task has much larger implications for information security. Correctly setting permissions means that you are maintaining the confidentiality, integrity, availability, and privacy of data. Authentication is also an important part of maintaining information security within an organization. After you have validated the authorized users credentials, you need to be able to properly identify and authenticate authorized personnel trying to access protected data. This highlights the idea of file system permissions based on use-case requirements for least privilege in a networked environment using common operating systems.
In this project, you will create a user, modify user file permissions, modify user passwords to meet organizational requirements, and validate modified permissions. The project will be submitted in Module Six. You will demonstrate your mastery of the following course competency:
Install and configure common operating systems
Scenario
You are a systems administrator for Helios Health Insurance. Pat Smith, a user in the finance department, has been promoted to human resource (HR) manager, and you are tasked with changing permissions for Pats new role. Your internal Helios network is Windows-based, and each departments folders are located on the network S drive. You will change permissions in the network, specifically removing access to finance-only resources and allowing access to HR resources. Additionally, you will need to create a new account for Pat to access the Linux-based third-party document server where managers store and modify sensitive data. You will perform the following tasks in your lab environment:
Helios Network (Windows)
Remove the users existing permissions to finance folders.
Add the users permissions to human resource folders (allowing access to both user and management-level folders).
Change the password policy in the group policy object (GPO) to increase the complexity to meet organizational requirements for a manager. The requirements are listed in the Helios Password Policy Update Guidelines document, which is linked in the Project One Submission task in Module Six of your course.
Document Server (Linux)
Create a new HR admin user named Pat Smith for the Linux-based document server.
Prompt
Complete the Account Modification Form and open CYB 230 Project One in the InfoSec environment. They are both linked in the Project One Submission task in Module Six of your course.
Specifically, you must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned.
Permission Modification
Complete the following tasks and provide screenshots validating their implementation:
Modify the user file permissions on the Windows PC to reflect access changes based on Pats promotion. Provide two screenshots: one showing the modified finance folder permissions and one showing the modified HR folder permissions.
Modify the user password policy settings to meet organizational requirements for admin users on the Windows PC. Provide evidence of the policy enforcement with two screenshots:
A screenshot of the GPO displaying the new settings
A screenshot of the logon error displayed for a password change that does not meet the password complexity requirements
Create a new HR admin user on the Linux server for Pat and then log in as that user. Provide a screenshot of the console command prompt when you are logged in.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Case Studies In Business Data Bases

Authors: James Bradley

1st Edition

0030141346, 978-0030141348

More Books

Students also viewed these Databases questions