Question

In: Computer Science

Case studies offer a practical problem for which you supply a written solution. There is not...

Case studies offer a practical problem for which you supply a written solution. There is not always a specific right or wrong answer to these cases. They are intended to encourage you to review the chapter material and delve deeper into the topics you have learned.

One of the primary reasons networks were built was to facilitate the sharing of information. Organizations want to share files and printers in Windows, Linux,and Mac OS X. However, organizations need to ensure they maintain secure access to shared files. This is often accomplished using user and group accounts, with assigned permissions. These permissions determine who can access the shared resources and what type of access they have.

Solutions

Expert Solution

Security of shared resources:
Security from a general perspective, and as a whole involves and ensures Confidentiality, Integrity, and Availability (CIA) of the shared resources, where availability of the said resources is restricted to unauthorized users who are not allowed or supposed to access them. Technically, a shared resource or a network share is basically a computer resource that is made available on one host machine to be accessible by other host machines on a computer network. The shared resource could be either, a device or piece of information, or simply data to be remotely accessed from another computer through a Local Area Network (LAN) or an enterprise or corporate intranet. This happens transparently, virtually, and seamlessly as if it were a resource in the local computer or host machine. Examples of sharing resources are computer programs, files, folders, documents, data, storage devices, scanners, printers, etc. Some of the terminologies in this facility are shared file access, file sharing, disk sharing, folder sharing, shared printer access, shared scanner access, etc. The shared resource is a shared disk, shared folder, or a shared document. However, these days file sharing is called peer-to-peer file sharing over the public Internet.

There are security issues related to file sharing and shared resources. A network share could be vulnerable from a security standpoint in case unauthorized users access the shared files in a devious way, where unauthorized users are the people who are not supposed to access them. Many computer viruses and worms have been sent, downloaded, and spread through network shares affecting thousands of o computers, breaching the security and safety of systems, computers, and data. Below are some of the security measures that can be followed to maintain secure access to shared files and resources.
* Shared printer access and shared file access are not allowed in firewalls from computers used by users who are outside the company's LAN or enterprise Intranet.
* Since there might be legitimate users also who would be working from outside the company's LAN or enterprise Intranet who want to access the company's intranet and LAN, they could use Virtual Private Networks (VPN) to securely access shared resources. This VPN would be made available, accessible, will be authorized to be used for certified users working outside the local network.
* For availability and security purposes, a network share would be made accessible to other users and employees marking the desired folder or file as shared or changing the file system permissions or access rights in the properties of the folder.
* Security should be made stringent such that only the user or the owner, system administrators, a certain group of users of the public, or all logged-in users are able to access a file or a folder.
* A special pre-shared folder could be made accessible to all users who have a valid user account and password on the local computer.
* For availability and accessibility purposes network access to the pre-shared folder could be enabled.
* To ensure availability of the shared resources for the legitimate users, shared access mechanism involves synchronization of folder information done automatically as and when a folder is changed on the server being accessed, and could even provide service for server-side file searching.
* Shared file access should support a multi-user environment with concurrency control or a remote file being while a user is editing it, and file system permissions.
* Necessary, strong, and secured measures to be taken when assigning permissions or access rights to specific users and users of a certain group as a whole.
* These file permissions and access rights provide security controlling the users' ability as to what, why, and how they view, edit, read, write, change, navigate, and execute the contents of the file system.
* Access Control Lists (ACLs) need to implement.
* There should be necessary management of user accounts, groups, roles, and permissions.
* This management should include:
* User accounts addition, editing, activation, and deactivation.
* Creation, editing, activation, and de-activation of user groups.
* Creation and editing of roles, and association of appropriate and authorized capabilities for roles.
* Management of permissions for system objects.
* Configuring strong password requirements for the user accounts.
* Management of User Access Control (UAC) that provides the ability for explicitly enabling or restricting the access.
* With respect to UAC, access to an object for a user should be based on those users belonging to a group providing capabilities through roles.
* Access rights should be grouped by role name.
* The roles should be associated with capabilities like view, delete, change, edit, etc.
* Addition of users.
* Creation of user groups.
* Assigning roles to groups.
* Assigning groups to objects providing custom permissions as needed.


Related Solutions

The case studies in your course text Operations Management: An Integrated Approach offer glimpses into the...
The case studies in your course text Operations Management: An Integrated Approach offer glimpses into the real world of business operations, allowing for deeper analysis of issues related to operations management, budgeting, and business strategy. Read the case "Hightone Electronics, Inc.," which begins on page 24 of your text. Then respond to case questions 1 and 2 on page 25. Case: Hightone Electronics, Inc. George Gonzales, operations director of Hightone Electronics, Inc. (HEI), sat quietly at the conference table overlooking...
For each of the following Case Studies, select which carbohydrate source you feel is best. Then,...
For each of the following Case Studies, select which carbohydrate source you feel is best. Then, explain WHY you chose your answer. (these are TWO part questions, make sure you answer both!) An athlete DURING exercise – should they be ingesting monosaccharide’s, disaccharides, or polysaccharides? Should a diabetic’s daily diet include mostly: LOW or HIGH glycemic index foods? (their regular diet, not during an emergency or in diabetic shock [hypoglycemia])? Someone with pancreatic cancer who is suffering from extreme GI...
Why is the potential for bias a particular problem in case-control studies as opposed to other...
Why is the potential for bias a particular problem in case-control studies as opposed to other analytic designs?
Case Studies: include the case study in your response... you may cut and paste it. Case...
Case Studies: include the case study in your response... you may cut and paste it. Case studies/NCPs are NOT a group assignment. Each student completed individually demonstrating knowledge gained and critical thinking skills. Re-read the instructions in the Medical Surgical case studies if you do not remember the correct way to complete case studies and NCPs Essentials of Maternity, Newborn, and Women's Health Nursing Chapter 11: Maternal Adaptation During Pregnancy 1. Jessica and Mike are new clients at your obstetrics...
Case of Studies. “How to do it” is a company which provides information and products for...
Case of Studies. “How to do it” is a company which provides information and products for the DIY (Do-It-Yourself) sector. It has grown significantly in the past few years and turnover has increased from around $3m to over $15m per annum. The company was originally managed by the owners who, as it grew, hired staff from predominantly amongst people that they knew or were already known to other staff. Staff numbers had grown from less than 10 to over 60...
5. Which of the following solutions when mixed will make a practical buffer solution? a) 1...
5. Which of the following solutions when mixed will make a practical buffer solution? a) 1 mole of NaOH and 0.5 mole of HBrO2 in 1L b) 1 mole of HCl and 1.5 moles of NH3(aq) in 1L c) 0.10 mole of sodium acetate and 0.10 mole of HCl in 1L d) None 6. A sample of 25.0 mL of 0.030 M NaOH was titrated with sulfuric acid solution and 16.2 mL of titrant was used. The concentration of the...
Question 1: SDLC Model Case Studies Scenario 1: There is a solution company that basically were...
Question 1: SDLC Model Case Studies Scenario 1: There is a solution company that basically were expert in installing this particular HR management system in big retailers. So let's say company X need to install a well-known HR management system at a big retailer’s headquarter. And the solution company have done this install many times, and similar retailers, big retailers before. So the question is, what model will fit best in this situation? Model Name: Reason: Scenario 2: There is...
how was DMAIC used to solve a specific problem in chapter 7 case studies from the...
how was DMAIC used to solve a specific problem in chapter 7 case studies from the Basics of health care Performance improvement
In your previous studies last semester, you encountered reactions went to completion and were written A...
In your previous studies last semester, you encountered reactions went to completion and were written A + B → C + D. You are now learning about reactions that achieve equilibrium and are written A + B ↔ C + D. Give the definitions of both types of reactions and justify the statement using mathematical relations that "reactions that go to completion are a subclass of the more general equilibrium reaction."
What did you learn from reading about memory processes that can offer practical suggestions for improving...
What did you learn from reading about memory processes that can offer practical suggestions for improving your study skills? Be sure that you identify at least 4 specific suggestions.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT