Kris Corporation's parent domain (kris.local) and child domain (corp.kris.local) for the organization's AD infrastructure are running on Server 2008. The following are concerns related to AD: (1) Kris Corporation is concerned about running multiple domains, and (2) automobile manufacturers are asking Kris Corporation to use a single identity to procure orders in real time. The company has five locations in Atlanta (GA), Baltimore (MD), Chicago (IL), Seattle (WA) and San Diego (CA). The manufacturing plants are in Atlanta and Seattle. Disaster recovery is a big concern. Physical space for servers is an issue at the Atlanta location. Most of the IT staff is in Atlanta, which is the company's headquarters, but other locations have significant IT personnel as well. Business personnel are similarly distributed across the company's locations. Since all locations are independently connected to the internet, file sharing is difficult among sites.
Introduction
Kris Corporation needs to migrate from the Windows Server 2008 to Windows Server 2012 Active Directory (OS) to help solve most of the issues and concerns it currently faces. Active Directory is a database that will ensure that Kris Corporation is able to track all its user accounts and passwords. The database enables passwords and user accounts to be stored and protected in a single location; this enhances the company's security. An Active Directory can comprise of at least 1 domain. Every domain in an Active Directory acts as a security boundary.
A domain controller (DC) is a server used to host each domain. The DC is responsible for managing all the passwords and user accounts for a domain stored in one location. AD has a feature that allows the network administrator to set baseline password parameters, for instance, minimum length, password complexity, password change interval, maximum number of wrong attempts and the lock out feature. These passwords have the ability to enhance security and reduce chances of successful attacks like the brute force attack.
Since Kris Corporation is a large company, Active Directories enable the company's network administrators to simplify processes involved in maintaining its complex network. Updating a single AD object in one process performs an automatic update instead of the network administrator performing manual updates. Network administrators can also give or deny access to particular applications by end-users via the network trees based on Active Directories. Large networks like that of Kris Corporation can be maintained and organized through Active Directories, eliminating the need to conduct every task through a single process.
Active Directories can be highly complex as they support distributed networks (like that of Kris Corporation); therefore, there's need for a network administrator who is knowledgeable in this kind of technology. Without AD, Kris Corporation would find it very hard to effectively store data and information on its vast network. Each of the five company locations is connected on a domain, which stores all information in a central location (the DC), not on the hard drive of each computer. A global catalog (kris.local) controls each domain, keeping track of all the registered network devices. It stores computer names, IP addresses and users to enable the global administrator to monitor and manage everything that occurs on the domain. Since everything is linked on the backend, all a user needs to find any computer on the network is its name.
The domain controller permits everything when using AD, meaning the DC has already assigned permissions to every user in the domain. As a result, users in the Kris Corporation network can experience efficient digital communication as information is available and everything in the network accessible.
Atlanta (DC, Global Catalog Servers, Root Domain -- Kris.local)
Cloud
BaltimoreSeattle Chicago San Diego
Figure 1: A Typical Image of a Single Domain for Kris Corporation Showing How the Four Locations Link to the Headquarter (Atlanta -- acting as the DC & Global Catalog Server) through the Cloud
1. Active Directory
Why and How Should the Company Migrate to 2012 AD?
Why Should the Company Migrate to 2012 AD?
Kris Corporation should migrate from Windows Server 2008 to 2012 AD because it comes with a more advanced AD infrastructure. Windows Server 2012 comes with features optimized for the cloud. It comes with a range of features to enable Kris Corporation deploy highly available applications stored in the cloud; this helps solve the issue of the Atlanta location lacking enough physical space for servers. Hyper-V, Powershell 3.0, SMB 3.0 and the improved virtualization hypervisor are just some of the feature the company needs to exploit to overcome the challenges it has been facing throughout its five locations (Desmond, 2013).
PowerShell 3.0 comes with extra 2,300 cmdlets to give additional granular control over the OS. The company can enjoy a wider data center control through commands executed...
Private IP Address The use of a private IP address on a business computer network has a number of advantages, one being an improved network security as well as a corporate social responsibility of conserving public addressing space. These IP addresses are commonly used on local networks and are good for businesses that share data as well as voice information. The company's computer network will not connect to the internet with this
Voice over IP (VoIP) Security Voice over Internet Protocol or VoIP refers to making use of telephone services over that of the computer networks. During the first part of the process, the VoIP makes an analog signal which is evolved from the speaker's voice. It is then transferred to a digital signal and further transfers over that of an IP network and this is well inclusive of the Internet. Voice over
Organizational security strategies must be designed for agility and speed through the use of state-of-the-art systems that can quickly be reconfigured to match changing roles in an organization. Organizational security will be defined through role-based access, configurable through authenticated, clearly delineated processes that can be administered at the administrator level (Hone, Eloff, 2002). The organizational security strategy will also be designed on the empirically validated Confidential, Integrity and Availability (CIA)
The management control area of authorize processing including certification and accreditation has been defined within Coyote Systems through the use of roles-based logins and access privileges and the use of certification of role-based access to ensure security. The company has found that through the use of role-based security authentication and the defining of rights by role, the certification and accreditation audits are far more efficient in being completed, and provide
However, this still relatively young application of internet technology does come with a wide array of security concerns that highlight the ethical and legal responsibilities facing these handlers of sensitive information. With identify theft and hacking of open source network activities real threats in the internet age, it is increasingly important for online shoppers bankers to be aware of the risks and for online financial institutions to be armed to
Security Audit for FX Hospital EHR/EMR Systems The study carries out the security audits for the FX Hospital EHR/EMR information systems to identify the vulnerabilities in the systems. The study uses the BackTrack as an auditing tool to penetrate the website, and outcomes of the auditing reveal that the website is not secure and can be subject to different vulnerabilities. After carrying out the auditing, the study is able to collect
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now