Enhancing Security in System Administration
• Imagine you are a Windows server systems administrator, working in an Active Directory domain environment. Your employer, MegaCorp, is planning to spend a large amount of money in the near future, upgrading from Windows 2003 and Windows XP to Server 2008 and Windows 7, to take advantage of the many new features offered by those operating systems. The area receiving the most attention is system security. The MegaCorp principals are keenly aware of the increasing frequency, size, and cost of data breaches occurring worldwide. The MegaCorp CIO believes that past and current deployments of the enterprise information system have not supported system security well. The CIO wants you to develop, document, and assess best practices for server deployment and administration, which enhances the security of the enterprise IS.
Write a ten to fifteen (10-15) page paper in which you:
1. Propose how to enhance security:
a. before server deployments
b. during server deployments
c. after server deployments
2. Propose how to enhance security:
a. before the implementation of a domain environment (i.e., AD DS)
b. during the implementation of a domain environment (i.e., AD DS)
c. after the implementation of a domain environment (i.e., AD DS).
3. Propose how to enhance security:
a. before infrastructure, application, file, and print services
b. during infrastructure, application, file, and print services
c. after infrastructure, application, file, and print services
4. Propose how to enhance security:
a. before the implementation of storage and high availability solutions
b. during the implementation of storage and high availability solutions
c. after the implementation of storage and high availability solutions
5. Determine how to enhance security via the:
a. management of enterprise server systems
b. monitoring of enterprise server systems
c. backup of enterprise server systems
6. Create a supporting diagram using Visio or a substantially similar freeware application such as Dia, demonstrating how the domain will be organized, including what services and structures you will need to provide, to create an overlapping (logical and physical) defense-in-depth. Note: The graphically depicted solution is not included in the required page length.
7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
ORDER THIS ESSAY HERE NOW AND GET A DISCOUNT !!!