Explain interaction between security and system usability


Problem

During this topic, the principles of separation, isolation, encapsulation, fail-safe defaults/fail secure, and modularity will be implemented to help the network with layering defense security. This is important for the defense of the network.

Refer to the "Operating System Administration Lab" video to complete this assignment.

Part I

Provide screenshots to illustrate the successful completion of each task, and be sure to include the verification that the AD user restrictions are working. For each screenshot, include 1-2 sentences summarizing what the screenshot is illustrating.

In the virtual sandbox environment you created in Topic 1, configure Windows Server 2019 to do the following:

1. Install patches and updates for the server.

2. In the Active Directory, create security policies as described in the following bullet points, which will adapt the user accounts management and enforce restrictions on account usage.

3. Using the 10 users created in the "Topic 1 Benchmark - Installation of a Virtual Environment Lab," add 3 users to the Research and Development Department group, 3 users to the Human Resources Department group, and the remaining 4 users to the IT Department group.

4. Limit the users in the Research and Development Department group to log-on hours from 9 a.m. to 8 p.m. Monday through Friday. Then enable and push out a group policy to automatically log users off the system when their log-on hours expire.

5. Apply the principle of least privilege to the users in the Human Resources (HR) Department group. Allow HR users to read and write access to all AD user account information.

6. Apply the principle of least privilege to the users in the IT Department group. Allow IT users to reset passwords and force a password change at the next log-on for all AD user accounts.

Part II

Put down a 300 words summary addressing the following:

1. Provide a brief explanation of what you were accomplishing when you installed the operating system.

2. Explain why it is important to install patches and updates as an operating systems administrator.

3. Explain the significance of configuring appropriate authentication policies as part of managing system services and user accounts.

4. Explain the interaction between security and system usability, and the importance of minimizing the effects of security mechanisms.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Explain interaction between security and system usability
Reference No:- TGS03360518

Expected delivery within 24 Hours