Lucerne Publishing

Read Complete Research Material



Lucerne Publishing

Lucerne Publishing

Windows Server 2008

It is important to make the experience of end user smoother and, there are two improvements in which client or network administrator can make a smoother way in order to make easy access of clients from different locations and, this may also includes remote printing, and default printing solutions. Sever 2008 provides efficient ways of access especially with the Terminal Services Easy Print. I choose server 2008 to be connected because, it provides the efficient remote connectivity for corporate computers through the use of Direct Access features. This is the secure access and, provides secure connectivity for private and public computers and, this also improves the performances by virtualized desktop integration. This connection may have the high fault tolerance of connectivity in between sites.

Types of Access to support virtual office staff

Basic Access Control 

Basic Access Control provides the authentication method described between an inspection system and a machine readable passport to permit encrypted data exchange. The authentication method used is a challenge-response authentication (SANDHU and SAMARATI, 1994) .The procedure requires that the document holder be travel document (e.g. passport ) submitted for inspection. This ensures that sensitive data cannot be read without the consent of the passenger.

Authentication

Username and Password

Adopt an appropriate policy for password validation or authentication of users is the first and most important control to prevent unauthorized access or misuse of users of information systems in the organization (SANDHU and SAMARATI, 1994) . Therefore; we must develop a Policy Information Security mandatory (Hancke, 2006). It must by establishing automated measurements; the following rules apply in the generation and use of passwords:

Passwords must be a minimum of x alphanumeric characters (alphabetic, numeric and special such as% $ & and () "!). The length depends on the importance of protected information usually of 8-12 characters.

When the user is identified for the first time in the system it will force you to make a change your password.

By recording and preservation of historic user passwords the computer system will prevent the use at least in recent passwords.

The User may change his password whenever deemed necessary.

Before a password change the computer system will request the last password in order to validate it.

I do not think it takes to comment on the security of these systems, so we will not go into details about it, if anyone is interested or doubts the ability of Unix face these environments, you can check any of the comparative or articles published on the subject by ...