Please annswer question 6 -10. For Question 6 thru 10, you are to research any o
ID: 3908526 • Letter: P
Question
Please annswer question 6 -10.
For Question 6 thru 10, you are to research any one operating system of your choice - desktop, server, or smart device and investigate how the following access and account management controls are implemented and used: 6. Access Control . Updates and patches 8 Event Logging 9 Backup and Restoring Data 10. Two factor authentication Here's an example: Answer 10. For two factor authentication (2FA), which relates to having at least two verifiable independent secrets for access, the Android OS set up allows you to add a phone number to receive and confirm a 6-digit code under "two-step verification".Explanation / Answer
I have chosen Sever(Windows) –
6. Access control:
User management systems for servers are a critical part of an organization’s IT infrastructure. Servers should require a unique login per user rather than any shared accounts. Additionally, each account needs to be managed with the proper permission levels. As an organization grows, there should be bands or levels of access.This simplifies server access control and helps IT manage and organize access.
User access should be audited for a couple of reasons-
7. Update and patches:
A computer software patch or a sever patch can be applied to a program or operating system to repair an exposed flaw.
Here’s what patches can do:
Implementation and used
First step to securing your network? Understanding exactly what’s on it (this can be a challenging). Start by taking inventory of all of your systems and applications, including what hotfixes and patches are installed. A solution such as Spiceworks Network Inventory can help you do the following to secure your network:
8. Event logging:
These are some powerful policy settings that allow you to configure five settings for Application, Security, Setup, and System event logs.
Implementation and used
9. Backup and restore:
Backing up and restoring data must be customized to a particular environment and must work with the available resources. Therefore, a reliable use of backup and restore for recovery requires a backup and restore strategy. A well-designed backup and restore strategy maximizes data availability and minimizes data loss, while considering your particular business requirements.
Designing an effective backup and restore strategy requires careful planning, implementation, and testing. These include the following:
10. Two-factor is an authentication:
This method is based on something you know (a password) and something you have (a one-time token).Two-factor authentication ensures that even if a password is stolen, a malicious user can’t sign into Secret Server. It helps confirm that a user is who they say they are and not a malicious user impersonating them.
Implementation and used
There are smartphone, tablet, mobile phone, hardware token etc. physical devices that you can use to provide the second factor of two-step authentication. Each device has one or more authentication methods available. For example-
Smartphone
Authentication can be done by any of the following-
Supported by iOS, Android, Windows Mobile
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.