StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Server Security Management - Case Study Example

Comments (0) Cite this document
Summary
The paper "Server Security Management" suggests that Network administrators need to have a way of putting in place controls to help them manage the users of computer systems as well as network resources. This is usually achieved by the use of group and user profiles on the server operating systems…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
Server Security Management
Read TextPreview

Extract of sample "Server Security Management"

Download file to see previous pages The concept of roaming user profiles allows users to have the same settings available to a user irrespective of the computer they log on as long as the computer seats on the same domain on the local area network. Once group policies and domain/user rights have been set by the administrator, the user will typically customize his/her account to suit his/her preferences. For instance, a user may make some desktop settings, hide some toolbars, and make other changes. The Windows NT group of server operating systems is an example of an operating system that allows for roaming user profiles. Network administrators usually employ a variety of mechanisms to implement the group and user profiles.
ACL is an access control list that houses information that specifies whether or not a user or group has certain accesses and privileges. Network administrators usually make use of ACLs to manage user privileges on a system/network. For instance, a user may be denied the right to download and install software on his workstation or make certain system changes (Strebe, 2004).

The use of group policy administration is the easiest way to implement administrative policies. Users that have the same needs are categorized in groups and the administrator simply manages one group. The changes made in the group will automatically affect the members of the group. When a new user is added to the group, the settings of the group automatically apply to his/her user profile (Strebe, 2004).

Password policy is simply the set of written rules that are part of a security policy that dictates specific password requirements of both device and user passwords. This usually involves a minimum length, special characters, maximum password age, and so on. Think of a Windows OS system that requires at least an 8 character length password. Some websites require passwords with upper and lowercase letters along with a special character. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Server Security Management Case Study Example | Topics and Well Written Essays - 2000 words, n.d.)
Server Security Management Case Study Example | Topics and Well Written Essays - 2000 words. https://studentshare.org/information-technology/1759440-server-security-management
(Server Security Management Case Study Example | Topics and Well Written Essays - 2000 Words)
Server Security Management Case Study Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/1759440-server-security-management.
“Server Security Management Case Study Example | Topics and Well Written Essays - 2000 Words”. https://studentshare.org/information-technology/1759440-server-security-management.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Server Security Management

Upgrading server 2003 to server 2008

...Server Security Management... Server Security Management... Full Paper Contents Contents 2 Introduction 4 2 Why Manage Information? 5 3 Previous Works 6 4 Project Deliverables 8 5 Cost: 13 6 Windows Server 2008 15 1 Introduction The examination of data was based on its quality in order to portray real world scenarios to an extent. The system was efficient in demonstrating basic information related to the popular transport modes that were popular among specific genders. For instance, the tube was popular for males along with thirteen men using the tube but they were most popular for females with twenty-two women using the tube. However, to adopt real world scenarios, detailed inputs were required. For instance, weather forecast information,...
15 Pages(3750 words)Research Paper

Client,server scripting/internet security

...Server Security Management... Server Security Management... INTRODUCTION Starting a business nowadays requires being involved in internet marketing. Different companies and different people will require different strategies. Therefore, it’s crucial for new business owners to be aware of how the internet works, and how technical aspects are being managed. In other words, it’s important to have a system for doing internet marketing right. This includes strategy, and establishing and developing the newest types of selling, trading and shipping processes. Over the years, Internet marketing has spread widely, and being noticed requires a huge effort in order to make your business idea appear irresistible. Creativity is one of the key parts to internet ...
8 Pages(2000 words)Essay

Database Management. MSSQL Server Database

...Server Security Management... Server Security Management... head: Database Management Database Management Introduction Navathe (2003) defines database as a collection of programs that enables users to create and maintain a database. It can also be defined as general purpose software for defining, creating, fetching and sharing databases among various users. The flavors of the databases used for e-commerce websites follow a different pattern set for storing data and offer various storage patterns and features to enable it to be distinguished from the competitor. In this case the university requirements deal with a variety of services which requires their data to be stored in a database so that it can be successfully fetched and modified for ...
3 Pages(750 words)Essay

Server consolidation

...Server Security Management... Server Security Management... of the work In its bid to improve operating efficiencies and enhance client services, this leading Indian investment bank called Bank Alpha decided to add 3 new branch servers and upgrade its teller and CSR software at all 6 operational locations within the country. The bank evaluated different software systems and architectures and decided to go in for SuperBlade system to drive its teller and CSR software architecture, a business-critical application accessed by thousands of users nationally that processes some 200000 transactions on a daily basis. Indian banks are getting more proactive when it comes to deploying IT hardware and software. There are a number of factors that have fuel...
4 Pages(1000 words)Essay

Simulation of Server Virtualisation

...Server Security Management... Server Security Management... of Server Virtualisation 1. Introduction and Overview of Server Virtualization 1.1 Introduction: Server virtualization is the method of splitting a server into different virtual servers. Virtualization broadly refers to the abstraction of computer resources. Each virtual server can run on its own as a different operating system and can be independently rebooted. The main intension of server virtualization is to increase the CPU utilization and congestion if any. One of the key factors involved in virtualization of server is to share the resources among servers. This can be done using partitioning of one server into many virtual servers. By doing this we can minimize physical servers i....
58 Pages(14500 words)Essay

Server

...Server Security Management... Server Security Management... Server Introduction With technological advancements, the issue of network security has become of significant concern. It is essential for companies to secure the network infrastructure from vulnerabilities and shortcomings that may arise. This stems from the fact that unauthorized users may gain access to an organization’s computer network or system. Consequently, this may lead to exposure of the secret information belonging to a company. It is common for hackers to target the computer network of a company; this may have significant negative impacts on the company (Gollmann, 2011). The computer network should also be secured from damages that may result from physical factors and dangers...
2 Pages(500 words)Essay

Security Management

...Server Security Management... Server Security Management... Management Security Management Executive Summary Over the past few years, surveys have indicated that security has become one of the top issues in many organizations. Following attacks of 9/11 and other series of attacks and threats of attacks, security features in buildings and sites have become important. While architects and engineers endeavor to use the best skills that ensure optimum building and site security, Information Technology is the other area that IT experts spend a lot of time and resources trying to protect organization information. In all private and public institutions, budget investment has to be justified and the effectiveness of the investment be evaluated...
17 Pages(4250 words)Research Paper

Microsoft ISA Server

...Server Security Management... Server Security Management... ISA SERVER Introduction Microsoft is one of the biggest manufacturers of operating systems but this company is trying to present itself as one of the leading provider of complete IT solutions concerning business beside providing operating systems so, they came up with Internet Security and Acceleration Server (ISA Server). Microsoft introduced ISA Server which is the successor to Microsoft Proxy Server 2.0, it is considered as a part of Microsoft .Net and it offers the significant services of an enterprise firewall along with a web proxy address. The first thing to consider is that the history of ISA Sever is associated with a product named Proxy server 1.0 which was followed by the Prox...
10 Pages(2500 words)Case Study

Performance and Security of Windows Server

...Server Security Management... Server Security Management... 2003 Server Security Windows Server 2003 is the next generation of server operating systems. It is more scalable and delivers better performance as compared with previous server products from Microsoft. By default the server components of Windows Server 2003 are disabled for security purposes. It is also compatible with older applications. It also has an enhanced Active Directory compatibility. The IIS web server has improved performance and security. Windows Server 2003 also allows multiple DFS roots to be installed and configured on a single server. Microsoft has paid more attention to security in Windows Server 2003. One of the key features of Windows Server 2003 security is the Commo...
8 Pages(2000 words)Case Study

Server Virtualization

...Server Security Management... Server Security Management... rise of popularity of networked systems has spurred an increase in client/server applications. Dividing the functionality into clients and servers allows each to be specialized. The average computer user employs client/server applications on a daily basis, whether it is surfing on the web, retrieving email messages, or reading and writing files from a network file server. In any computing system, there is always room for improvement. Existing systems can be made more reliable, more efficient, more secure, or new and innovative features can be added. However, the very nature of client/server applications implies that multiple computers are involved and linked together by standardized pr...
9 Pages(2250 words)Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Server Security Management for FREE!

Contact Us