Create a security matrix spreadsheet and security strategy


Assignment

Use the following scenario for the Week One through Four individual assignments:

You are the systems administrator for Cybixx, a manufacturer and distributor of vending machines. Cybixx currently has three facilities and is looking to expand to a fourth.

As a Systems administrator, you are responsible for all server hardware and software, all client desktop hardware and software, and all networking equipment. You are also responsible for the creation and maintenance of the documentation for all systems.

Cybixx current infrastructure and facilities:

Atlanta, Georgia - Headquarters. Cybixx uses a partially centralized IT infrastructure. The systems location at the Atlanta office include:

• 5 physical Windows 2012 R2 servers
• 10 HYPER-V Windows 2012 R2 hosts running 78 Windows 2012 R2 guests
• DNS Services
• DCHP Services
• Active Directory Services
• A network 20 Mbs connection to the Cybixx MPLS cloud
• A 100 Mbs internet connection
• 25 Windows 10 desktops

Boise, Idaho. Cybixx has a Distribution Center located in Boise, Idaho. The Distribution Center include:

• 2 physical Windows 2012 R2 servers for file service and printing
• 10 Windows 10 desktops
• A 10 Mbs network connection to the Cybixx MPLS cloud

Boulder, Colorado. Cybixx has a Distribution Center located in Boulder, Colorado. The Distribution Center include:

• 2 physical Windows 2012 R2 servers for file service and printing
• 10 Windows 10 desktops
• A 10 Mbps network connection to the Cybixx MPLS cloud

Future Expansion: Cybixx has purchased a building for new Distribution Center in Akron, Ohio. It is the Systems Administrator's job to extend IT services to this location and update the company's IT landscape appropriately.

Assignment:

This assignment is a continuation from the Week Four assignment.

In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and configured.

Create a security matrix spreadsheet and security strategy summary. Include the user roles and matching security rights that would be expected to be created for the Akron site. Be sure to include the following user roles, as well as any others that may be deemed necessary:

• Administrative
• Accounting
• HR
• Warehouse Manager
• Warehouse Supervisor
• Janitorial User

Your strategy will be a 1-page summary of your matrix discussing the security strategy and how it will be applied to your matrix.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Create a security matrix spreadsheet and security strategy
Reference No:- TGS02298061

Now Priced at $40 (50% Discount)

Recommended (99%)

Rated (4.3/5)