Question
The review will continue with the hypothetical (but real-world) scenario of Ken 7 Windows Limited which we utilized in earlier Real-World Exercises. Ken 7 Windows
- The review will continue with the hypothetical (but real-world) scenario of Ken 7 Windows Limited which we utilized in earlier Real-World Exercises. Ken 7 Windows Limited's new enterprise resource planning (ERP) software expands the size and scope of their computing environment, and this expanded infrastructure means more computers and more users. This larger, more complex environment requires a more formal approach, so you will utilize the Plan-Do-Check-Act cycle to help organize your efforts. In this activity, you will consider a list of security administration tasks, then identify which phase of the Plan-Do-Check-Act cycle it belongs to. As part of this process, you will explore why the task belongs to the phase you chose and determine how each task makes your environment more secure.
- Write password policy to enforce complex passwords.
- Identify settings that have changed for a specific computer by analyzing the output of a baseline comparison, then list settings that should be changed.
- Use Microsoft baseline security analyzer (MBSA) to scan for current software versions.
- Lock the door to the data center.
- Use a packet sniffer to see if network traffic is encrypted.
- Develop daily server backup procedures.
- Apply software security patches.
- Update antivirus signature databases.
- Monitor log files.
- Using MS Word, develop a report in which you consider the list of security administration tasks provided and evaluate them in light of the Plan-Do-Check-Act cycle. Consider the list of security administration tasks outlined in the Background Information section. Then do the following:
- After each task, tell which phase of the Plan-Do-Check-Act cycle it belongs to.
- Briefly describe why the task belongs to the phase you chose and how each task makes your environment more secure.
Scenario Information:
For this real-world exercise, we are continuing with the hypothetical scenario from Ken 7 Windows Limited. The Ken 7 Windows Limited new enterprise resource planning (ERP) software expands the size and scope of the Ken 7 Windows Limited computing environment. The new infrastructure means more computers and more users. You know that the process of administering a larger, more complex environment requires a more formal approach. You have decided to implement the Plan-Do-Check-Act cycle to help organize your efforts.
To prepare for this activity, consider the list of security administration tasks below:
Instructions
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started