The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25 workstation computers in the headquarters offices and main warehouse. The network uses workgroups, and users are created locally on each computer. Employees from the regional warehouses connect to the Colorado network via a virtual private network (VPN) connection.
Due to a recent security breach, Always Fresh wants to increase the overall security of its network and systems. They have chosen to use a solid multilayered defense to reduce the likelihood that an attacker will successfully compromise the company’s information security. Multiple layers of defense throughout the IT infrastructure makes the process of compromising any protected resource or data more difficult than any single security control. In this way, Always Fresh protects its business by protecting its information
Project Part 2: Access Controls Procedure Guide
Scenario
Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.
Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:
§ Understand and document the purpose of each access control change request
§ Know what access controls were in place before any changes
§ Get an approval of change by management
§ Understand the scope of the change, both with respect to users, computers, and objects
§ Have evaluated the expected impact of the change
§ Know how to evaluate whether the change meets the goals
§ Understand how to undo any change if necessary
Tasks
Create a guide that security personnel will use that includes procedures for implementing an access control change.
The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.
Ensure that your procedures include the following:
§ Status or setting prior to any change
§ Reason for the change
§ Change to implement
§ Scope of the change
§ Impact of the change
§ Status or setting after the change
§ Process to evaluate the change
Submission Requirements
§ Format: Microsoft Word (or compatible)
§ Font: Arial, size 12, double-space
§ Citation Style: Follow your school’s preferred style guide
§ Length: 2 to 4 pages
SHAPE * MERGEFORMAT
Self-Assessment Checklist
§ I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.
§ I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.
§ I followed the submission guidelines.

The post to increase the overall security of its network and systems appeared first on Homework Aider.


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"