Monday, February 17, 2020

Windows 7 Workgroup Consultation for Sally Chu Assignment

Windows 7 Workgroup Consultation for Sally Chu - Assignment Example Keywords: UAC, user access controls, administrative users, users, Windows 7, workgroup, network Windows 7 Workgroup Consultation for Sally Chu In order for Sally to grant all six of her administrative staff members the same computer-access privileges, to allow them to run applications and use network printers, but not be able to make any accidental changes that can adversely affect their computers, the most effective and efficient way to create user accounts for these employees would be as follows. The first step would be to setup the profile for Sally’s administrators. In order to ensure that the administrators cannot make any changes that would adversely affect the computers themselves, the best bet is to setup the administrators on a standard user profile, instead of an administrator profile, as the administrator profile would have complete access to make any and all changes, while the standard use can use most software and change system settings that do not affect other us ers or the security of the computer itself. Once the standard user is setup, the next step is to setup the parental controls for that standard user, allowing for the use of games to be filtered out, and blocking any specific programs that she does not want the administrators to have access to, by setting the profile to only be able to use the programs from an allowed list, as specified by herself. Once the account is setup, and the parental controls are put in place, the settings in UAC, or User Account Controls, would need to be set, providing notification when programs try to make changes to the computer. This must be done for each profile that needs to be created, for a total of six (Microsoft, 2013). As Sally would like to provide a high level of authentication for her network’s users, she would like a dual authentication process. Two of the different methods that she could use in conjunction with requiring a password for network access are the option to use EAP (Extensib le Authentication Protocol), and setting to allow certain protocols. Selecting â€Å"Use Extensible Authentication Protocol† allows the selection of using one of three protocols for authenticating the VPN connection: Protected EAP (PEAP), EAP-MSCHAPv2, or Smart Card or Other Certificate; all three options will ensure the security and data integrity of the EAP conversation through the use of encryption. The default setting is EAP-MSCHAPv2, which is also known as Secure Password. By selecting the properties for EAP-MSCHAPv2, the ability to configure the connection to use the Windows login credentials in order to authenticate the connection. Selecting â€Å"Allow These Protocols† instead as the other alternative for providing the second level of security to the network connection will allow for the choice between three different connection types, all of which can be set to configure the Windows login credentials to be used; the three different authentication protocols tha t can be used by the connection are PAP, CHAP, or MS-CHAPv2. â€Å"The choice of these three types of authentication methods will only apply to PPTP, L2TP/IPsec, or SSTP tunnels; IKEv2 tunnels can only use EAP-MSCHAPv2 or certificates as their authentication methods† (Sourcedaddy.com, 2008). While there is an advantage into having the user’s use their Windows login credentials, namely that they will not have to remember a third set of login credentials, the disadvantage is that if an unauthorized user obtains that information, that will give them that much more access to the network itself. The user access controls set for the profiles themselves will ensure that the web based applications will run in protected mode, and by allowing the particular programs on the intranet in the

Monday, February 3, 2020

Economics (merit good) education Essay Example | Topics and Well Written Essays - 1500 words

Economics (merit good) education - Essay Example Moreover, education makes one be in a position to acquire employment, obtain income and consequently have an improved way of life (Ver Eecke, 2003, p. 701). Other merit goods include goods and services like health services that the government provides for its citizens for the benefit of the community. This is usually conducted because it would lead to under-provision within the community. It also generates difference between the social and private expenses in addition to the advantages of creation and exploitation leading to the risk of not selling the goods and services (Besley and Ghatak, 2003, p. 235-249). Merit goods are also those goods and services that the government thinks consumers will under utilize, and they ought to be provided free for the entire society. Both private institutions and the government offer education, but in case education was left to be an expense, where parents are expected to pay for education then education would be under-consumed by the members of the society. Poor parents might not understand the importance of education. Similarly, their children might not see the benefits of education (Besley and Ghatak, 2003, p. 235-249). In reality, education should provide peripheral benefits that could not be considered by the open market. The benefits include increasing profits and production for present and future productions and expansion in the work-related movement of the work force, which must assist in the reduction of unemployment and consequently lower welfare expenditure (Dixit, 2002, p. 38). The administration provides this merit good to urge its utilization so those particular optimistic externalities related with merit commodities can be realized (Dixit, 2002, p. 38). They also aim at overcoming the failures of information connected to education, not when the private longer-term benefit of utilization is better than the shorter-term advantage of utilization. The government also believes that consumption