1 / 5100%
Runningi Head:i ACTIVEi DIRECTORYi i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i 1
Wki 3i -i Apply:i Accessi Controli andi PKI
CYBi 205ii i Infrastructurei Administration
ACTIVEi DIRECTORYi i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i 2
Explaini thei typesi ofi informationi thati cani bei storedi ini ani Activei Directoryi useri record.
Activei Directoryi refersi toi thei directoryi thati encompassesi thei listingi ofi objects.i Iti isi
responsiblei fori storingi informationi pertainingi toi organizations,i computeri systems,i usersi andi
otheri details.i Thei activei directoryi alsoi hasi thei abilityi toi recordi ai diversei rangei ofi informationi
relatingi toi otheri objects.i Iti basicallyi reliesi oni ai standardi protocoli thati isi ultimatelyi responsiblei
fori thei storagei purposei (Algorithmsi andi cryptography,i 2020).i Somei ofi thei maini typesi ofi
informationi thati cani bei storedi ini thei Activei Directoryi useri recordi includei name,i address,i
phonei number,i emaili idi andi otheri personali detailsi relatingi toi thei users.i
Whati arei somei ofi thei additionali tabsi thati arei availablei ini thei Activei Directoryi Usersi andi
Computersi "Advancedi Features"i mode?
Thei Activei Directoryi hasi ai numberi ofi tabsi thati arei availablei fori thei usersi andi computersi ini thei
Advancedi Featurei mode.i Somei ofi themi arei passwordi expiry,i passwordi lasti set,i useri accounti
control,i lasti logoni ori logi off,i etc.i Ini thei useri recordi ofi thei Activei Directoryi therei existi ai
numberi ofi advancedi featuresi suchi asi passwordi replication,i advancedi certificates,i attributei
editori asi welli asi objecti security.i
Whati arei somei ofi thei specifici challengesi andi risksi associatedi withi accounti managementi
ini ai largei infrastructure?
Ai numberi ofi challengesi andi risksi existi relatingi toi accounti managementi ini ai largei
infrastructure.i Somei ofi thei maini issuesi relatei toi controllingi andi resettingi ofi passwords,i andi
identityi managementi i.e.i knowingi thati thei calleri isi whoi theyi sayi theyi are.i Thesei arei somei ofi
thei fundamentali challengesi thati needi toi bei takeni carei ofi ini ai largei infrastructure.i Asi thei scopei
ofi accounti managementi isi prettyi largei ini nature,i therei isi thei needi toi adopti ani end-to-endi riski
managementi assessmenti approachi insteadi ofi simplyi makingi somei kindi ofi modificationsi ini thei
existingi protocolsi andi proceduresi (Algorithmsi andi cryptography,i 2020).
ACTIVEi DIRECTORYi i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i 3
Howi cani inadequatei accessi controlsi ori accessi managementi leavei criticali informationi
vulnerable?
Inadequatei accessi controlsi ori accessi managementi hasi thei abilityi toi leavei criticali informationi
ini ai vulnerablei state.i i Fori instance,i ifi therei doesi noti existi ani appropriatei accessi managementi
system,i onei ofi thei maini issuesi thati couldi arisei isi thei lossi ofi security.i Securityi existsi ini diversei
formsi suchi asi thei accessibilityi ofi ani employee.i Thisi aspecti needsi toi bei managedi byi takingi
intoi considerationi theiri position,i functionsi andi responsibilitiesi ini thei organizationi ati ai specifici
pointi ini time.i Anotheri seriousi issuei thati isi associatedi withi thei adoptioni ofi incorrecti accessi
managementi revolvesi aroundi compliancei andi auditi issues.i Beforei makingi changesi suchi asi thei
removali ofi thei accessi ofi organizationali personneli ati anyi pointi ini time,i iti isi necessaryi toi
properlyi checki thei concurrencyi ofi data.i i i
Whati protectionsi doesi encryptioni offeri andi howi importanti isi keyi managementi toi
keepingi anyi encryptioni systemi secured?
Properi keyi managementi playsi ai cardinali rolei toi keepi ani encryptioni systemi secure.i Privatei andi
publici keysi arei instrumentali wheni iti comesi toi providingi securityi andi thusi thesei keysi improvei
thei leveli ofi complexity.i Thesei keysi needi toi bei optimallyi usedi ini ani organizationi settingi asi
theyi encouragei thei encryptioni ofi datai whichi boostsi itsi leveli ofi security.i Properi keyi
managementi ensuresi thati therei isi ai publici keyi thati isi usedi toi encrypti datai andi ai privatei keyi
thati isi usedi toi decrypti ori decodei thei encryptedi datai (Algorithmsi andi cryptography,i 2020).i
ACTIVEi DIRECTORYi i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i 4
Consideri ai cloud-hostedi Infrastructurei asi ai Servicei (IaaS)i environmenti withi manyi usersi
accessingi thesei systemsi fromi alli overi thei world.i Whati advantagesi ori challengesi mighti
therei bei managingi thesei identitiesi andi associatedi keys?
Ini ai cloud-hostedi Infrastructurei asi ai Servicei (IaaS)i environmenti withi manyi usersi accessingi
thesei systemsi fromi alli overi thei worldi variousi kindsi ofi challengesi arisei relatingi toi thei
managementi ofi identitiesi asi welli asi associatedi keysi ini suchi ani environment.i Ai majori
challengei whilei managingi associatedi keysi isi thei lacki ofi properi iterationi betweeni ai clienti andi
thei topi teami ofi thei contractor.i Somei ofi thei benefitsi ofi cloud-hostedi IaaSi includei practicali riski
activation,i on-sitei visuali managementi asi welli asi changei managementi (Algorithmsi andi
cryptography,i 2020).
Howi thei toolsi andi processesi demonstratedi ini thei labi mighti bei usedi byi ani infrastructurei
administratori toi helpi securei ani environment
Thei toolsi andi processesi thati werei coveredi ini thisi week’si labi cani bei usedi byi ani infrastructurei
administratori toi strengtheni thei securityi ofi ani ITi environment.i Thei toolsi cani alsoi bei usedi byi
securityi professionalsi andi industriali expertsi toi enhancei softwarei securityi leveli asi theyi cani bei
usedi fori measuringi securityi ini thei economicsi relatingi toi insecurei software.
ACTIVEi DIRECTORYi i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i i 5
References
Algorithmsi andi cryptography.i (2020).i
http://www.physics.udel.edu/~msafrono/650/Lecture%207.pdf.i
Cobb,i M.i (2011,i Augusti 8).i Besti practicesi fori audit,i logi reviewi fori ITi securityi investigations.i
ComputerWeekly.com.i https://www.computerweekly.com/tip/Best-practices-for-audit-
log-review-for-IT-security-investigations.i
Students also viewed