Active Directory Security: Risks, Solutions, and Centralized Control

Verified

Added on  2023/06/04

|4
|541
|318
Report
AI Summary
This report examines the security aspects of Active Directory, a directory service by Microsoft for Windows operating systems. It identifies potential security problems such as the propagation of malicious software through workgroup software and privacy concerns arising from unencrypted data transmission. The proposed solution involves utilizing Active Directory's domain structure, where all information is stored centrally and managed by a global administrator, enabling better control and resourcefulness. The domain controller authorizes access, enhancing security and ensuring readily available information. References to relevant academic papers support the analysis of security issues and proposed solutions.
Document Page
1
STUDENT NAME
COURSE
INSTITUTION
DATE
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2
Introduction.
Active Directory is a directory service developed by Microsoft for Windows operating systems
that ensure there is a uniform manner in which complex and different network resources are
interconnected. A variety of network directories is connected to resources related to information
which is organized and maintained by a common interface provided by the directory service.
(Panda et al. 2016).
Potential Security Problems.
One of the potential problems is that malicious software can propagate and also utilize a protocol
for communication. The workgroup software will make outgoing connections to the centralized
directory or other servants since the computer firewall does not generally block it. A client gets
information from a centralized directory once an outgoing connection is made. Furthermore,
existing workgroup client’s configuration can easily be changed by a nasty software (Huang et
al. 2015).
Another potential problem is the privacy concern whereby network security can be compromised
by the use of workgroup software. The workgroup software can easily bypass the restrictions of a
configured firewall since it makes outward connections rather than allow incoming connections.
Outside systems can easily obtain computer files if users misuse or configure the workgroup
software. Confidential information can easily be transferred even though the workgroup network
is adequately set since the information passed along the network is unencrypted. A network-
sniffing program can easily obtain such information (Sobel & Satish 2013).
Proposed solution and benefits
All information is stored in a central location called a domain upon the use of the active
directory. All of the devices registered to the network are tracked by a global catalog which
controls the domain. The global administrator will oversee everything in the domain including
items in the global inventory such as IP address, computer names, and users.
The domain controller will permit everything when using Active Directory. This means that the
domain controller has been authorized to assign what to each user by the network administrator.
Document Page
3
This enables the message to be extra resourceful since everything is easily accessible and the
information is readily available (Subashini & Kavitha 2011).
Document Page
4
References.
Huang, W., Ganjali, A., Kim, B.H., Oh, S. and Lie, D., 2015. The state of public infrastructure-
as-a-service cloud security. ACM Computing Surveys (CSUR), 47(4), p.68.
Panda, A., McCauley, J.M., Tootoonchian, A., Sherry, J., Koponen, T., Ratnasamy, S. and
Shenker, S., 2016. Open network interfaces for carrier networks. ACM SIGCOMM Computer
Communication Review, 46(1), pp.5-11.
Subashini, S. and Kavitha, V., 2011. A survey on security issues in service delivery models of
cloud computing. Journal of network and computer applications, 34(1), pp.1-11.
Sobel, W.E. and Satish, S., Symantec Corp, 2013. Secure network cache content. U.S. Patent
8,584,234.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]