Question

In: Computer Science

How do we separate end-users security policies from the infrastructure security policies on the windows server?

How do we separate end-users security policies from the infrastructure security policies on the windows server?

Solutions

Expert Solution

Answer : Security policies comprises a set of objectives for the company , rules of behaviors for users and administrators , and requirement for system and management that collectively ensure the security of network and computer systems in an organizations. The security policies translates , clarifies and communicate the management position on security as defined  in high level security principles. The security policies act as a bridge between these management objectives and specific security requirement.

There are security policies components and those are:

1) Governing policies - This policy is a high level treatment of security concepts that are important to the company. Mangers and technical custodians are the intended audience.

2) End users policies - This document cover all security topics important to end users. In terms of detail level , end users policies answer the what , who , when and where security policies questions at an appropriate level of details for an end users.


Related Solutions

- What are the Windows Server threats and the security control?
- What are the Windows Server threats and the security control?
- List some of Windows Server threats and the security controls?
- List some of Windows Server threats and the security controls?
- List 10 policies for windows client update and server update
- List 10 policies for windows client update and server update
Cyber security Security Policy: , write a small antivirus policy for the IT infrastructure and users...
Cyber security Security Policy: , write a small antivirus policy for the IT infrastructure and users in a small business an elementary school You may research anti-virus policies of organizations on the web, please use and cite responsibly. Security Recommendation: Rose Shumba manages the IT security for a school. Given the wide range of people who use the school’s computers, it is challenging for Rose to prevent virus infections. She has installed an anti-virus on each machine and has a...
Upgrading from a licensed version of Windows Server 2012 R2 to Windows Server 2016 is cheaper...
Upgrading from a licensed version of Windows Server 2012 R2 to Windows Server 2016 is cheaper than a clean install. Explain the Pros and Cons of upgrading vs a clean install. Specify a scenario where you would advocate for upgrading as opposed to a clean install. Then specify a situation where you would avocate for a clean install over an upgrade. Feel free to use other blog posts and personal experiences to make your point.
we are going to thoroughly discuss the business drivers for using Windows Server and how it...
we are going to thoroughly discuss the business drivers for using Windows Server and how it enables the business to be more efficient and effective (and therefore more successful and profitable). But first we have to understand what exactly Windows Server is. Let's start this discussion by defining what server actually means, what features are included in Windows Server, and how it is packaged and sold by Microsoft to different customers. After this, we'll get into the business requirements and...
One of the regular users defined on a Windows server has been promoted and needs permissions...
One of the regular users defined on a Windows server has been promoted and needs permissions to administer the server. Explain what you would need to do on the server to provide the user with the needed permissions to do all administrative tasks. Be specific and include the details of the utilities you would run and the steps you would take.
Cyber security write a small antivirus policy for the IT infrastructure and users in a small...
Cyber security write a small antivirus policy for the IT infrastructure and users in a small business an elementary school You may research anti-virus policies of organizations on the web, please use and cite responsibly.
Let's look at the auditing system in Windows Server 2008. What are the characteristics? How do...
Let's look at the auditing system in Windows Server 2008. What are the characteristics? How do you set it up?
An organization has decided to move from a windows server environment to a Linux Server Environment....
An organization has decided to move from a windows server environment to a Linux Server Environment. The organization requires to offer email, web, fileshare, printing services to its users which are predominantly using MAc OS and windows clients. These services would be provisioned from the newly created Linux server. a) Outline some of the issues the system administrator needs to consider when designing the solution? b) How would you resolve the issues ? c) What tools would you use in...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT