In your Web browser, enter the following address: http://www.microsoft.com/windowsxp/pro/using/howto/security/acc esscontrol.asp. Read the description of Windows XP access control. Write a two- or three-paragraph summary of how Windows XP implements access control. Create a list of at least five new user groups you would need for a commercial system. Assign privileges to your user groups and explain the purpose of each group.
Explain the importance of and implement the principles of separation of privileges and least privilege ? Utilize the defense in depth strategy to design an effective perimeter protection methodology ? Understand the weaknesses in the “security through obscurity” approach to information security? Write and implement general and specific information security policies for an organization?