Question

Computer security and system management

Step-By-Step Assignment Instructions less  Assignment Narrative:  Suppose that you were just hired by a medium size company.  You are replacing a previous system admin that really didn't understand what they were doing.  Your supervisor would like you to suggest ways of building and protecting their Linux server environment based off of your interview (based off of what you learned in this course).    They are proposing the following for a new business venture and would like you to help.  The criteria is below.  Proposed business requirements from your supervisor:   The Linux servers will be composed of web servers, user servers, log servers and database servers(we didn't talk about this in the course, however, remember that no matter what type of server that you are building, security still needs to be put in place.)  You will have teams/groups of employees of the following: Sales, Software Development, Accounting, and Information Technology   For auditing purposes, the person that joins workstations into the systems uses three different accounts: one account for the IT department, and one account for each of the remaining departments.  There are local administrators for each of the departments, excluding the IT. These local administrators will use the local administrator account on each department. These local administrators will use a local account in each department for purposes of installing applications, updating/patching software, etc. This local account is not the root account, but a user account that is member of the administrators group.  The Sales and Software Development departments have websites.  They must be able to communicate to each other, but not be publicly.  There is a main company website however.  The Software development team has to have a development space on the internal network.  )They use Linux servers as their platform for development so they must have their own space, but they expect the server to be secure.  How to submit:  You will need to submit a short narrative in the space provided.  Additionally, if you create any diagrams as part of the assignment, these will also need to be attached.

0 0
Add a comment Improve this question Transcribed image text
Request Professional Answer

Request Answer!

We need at least 10 more requests to produce the answer.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the answer will be notified once they are available.
Know the answer?
Add Answer to:
Computer security and system management
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Similar Homework Help Questions
  • Linux security

    There are local administrators for each of the departments, excluding the IT. These local administrators will use the local administrator account on each department. These local administrators will use a local account in each department for purposes of installing applications, updating/patching software, etc. This local account is not the root account, but a user account that is member of the administrators group.

  • Group B Word Pool IL. A computer application that allows the user to enter demographic information,...

    Group B Word Pool IL. A computer application that allows the user to enter demographic information, schedule appointments, maintain lists of computer network data server local area network dumb terminal. insurance payers, perform billing tasks, and generate reports 12 Asystem that links personal computers and peripheral devices to share information and resources router practice management software redundancy Ethernet wide area network 13. Peripheral computer hardware that connects to the router to provide Internet access to the network or computer modem...

  • You are an IT Manager for a team of 11 full-time IT professionals (yourself, 2 network...

    You are an IT Manager for a team of 11 full-time IT professionals (yourself, 2 network administrators, 3 system administrators, 2 software developers, and 3 "secure closed area" administrators). Your team has been together consistently for 6 years, and have a great working relationship. You are also friends outside of work, getting dinner together regularly as well as attending other events as a team. Your IT team supports an infrastructure that serves 400 employees of a company that performs research...

  • please give me clear picture Section 1: DNS nslookup The Domain Name System (DNS) translates hostnames...

    please give me clear picture Section 1: DNS nslookup The Domain Name System (DNS) translates hostnames to IP addresses, fulfilling a critical role in the Internet infrastructure. In this lab, we’ll take a closer look at the client side of DNS. Recall that the client’s role in the DNS is relatively simple – a client sends a query to its local DNS server, and receives a response back. Much can go on “under the covers,” invisible to the DNS clients,...

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • System has a single account, Building Occupancy Cost, in its ledger. The types and amounts of occ...

    system has a single account, Building Occupancy Cost, in its ledger. The types and amounts of occupancy costs recorded in this account for the current period follow. $27,000 40,500 12,000 3,750 4,500 8,250 and land Gas ( cost building occupancy cost equal to this rate times the number of square feet that it occupied costs for heating, lighting, and maintenance). proportion to the square feet occupied (ignoring floor space market values). (Round cost answers to 2 decimal places. Round your...

  • A security analyst performs various types of vulnerability scans. Review the vulnerability scan results to determine...

    A security analyst performs various types of vulnerability scans. Review the vulnerability scan results to determine the type of scan that was executed and if a false positive occurred for each device. Instructions: Select the Results Generated drop-down option to determine if the results were generated from a credentialed scan, non-credentialed scan, or a compliance scan. For ONLY the credentialed and non-credentialed scans, evaluate the results for false positives and check the findings that display false positives. NOTE: If you...

  • Required information [The following information applies to the questions displayed below) National Bank has sever...

    Required information [The following information applies to the questions displayed below) National Bank has several departments that occupy both floors of a two-story building. The departmental accounting system has a single account, Building Occupancy Cost, in its ledger. The types and amounts of occupancy costs recorded in this account for the current period follow NI $ 13,500 20.250 9,250 6,000R R Depreciation-Building Interest-Building mortgage Taxes-Building and land Gas (heating) expense Lighting expense Maintenance expense Total occupancy cost 1,875 2.250 4,125...

  • Management information system Please answer the question correctly QUESTION 16 Which of the following is the...

    Management information system Please answer the question correctly QUESTION 16 Which of the following is the most widely used operating system in business? Linux Mac OS Windows Unix 2.5 points    QUESTION 17 Which of the following is an open-source operating system? Unisys Windows Linux Mac OS 2.5 points    QUESTION 18 Which of the following storage types is volatile? RAM ROM PROM All the choices are volatile. 2.5 points    QUESTION 19 Which of the following best describes the...

  • In this phase of the project you will create an ERD based upon the following requirements and bus...

    In this phase of the project you will create an ERD based upon the following requirements and business rules. Limit your ERD to entities and relationships based on the business rules showed here. In other words, do not add realism to your design by expanding or refining the business rules. However, make sure you include all attributes needed that would permit the model to be successfully implemented, including all primary and foreign keys. 1. Trinity College (TC) is divided into...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT