The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course.
Graded Assignment Requirements
Assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the assignments and submitting them for grading.
Instructors must remind students to retain all hand outs and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units.
Unit 1 Assignment 1: Adding Active Directory
Learning Objectives and Outcomes
You will learn the impact of adding the Active Directory to an existing network in a Windows environment.
This assignment builds on the scenario of Ken 7 Windows Limited, which was introduced earlier in this unit. For this assignment, imagine yourself to be a security administrator working for Ken 7 Windows Limited. You have been asked to evaluate the option of adding the Active Directory to Ken 7 Windows network. Here are some facts to help you work on this assignment.
Ken 7 has just purchased a new enterprise resource planning (ERP) software package and will place the workstation computers which will use this ERP software at eight different locations on the shop floor. The ERP software requires two database servers, four application servers, and two Web servers, all of which run a Windows operating system. All above-mentioned servers and the shop floor workstations are new, but there are 22 workstations, already in place, that work with an older software Ken 7 used to manage the manufacturing and accounting processes. The existing 22 workstations are...
Unformatted text preview: IS3340 Majero Unit 9 Assignment 2 R SA Archer Incident Management system centralizes and streamlines the case management lifecycle for cyber and physical incidents and ethics violations. This web-based incident-management software lets you capture events that may escalate into governance, risk management, and compliance (GRC) incidents, evaluate incident criticality, and assign responders based on impact and regulations. Additionally, this handles Whistleblower capability which supports anonymous reporting of incidents and ethics violations in accordance with the Sarbanes-Oxley, EU Data Privacy, and U.S. Public Disclosure Acts. The Application for Incident Response Teams is a web-based application that has been designed and developed to support the day to day operations of a computer security incident response team. The application supports highly automated processing of incident reports and facilitates coordination of multiple incidents by a security operations center....
View Full Document