The first step in order to achieve this is to have a workgroup that will have certain privileges. A workgroup is a group policy that was set up by Microsoft to manage a group of computers. For Sally Chu, there will be a need to create a user workgroup for the computers. This will require that the computers that are used in the organization will be set to have s and passwords for each of the users in the network. The computer administrator will be required to set the s and passwords in each computer so that they will be allowed to access the workgroup (Sanak, 2012).
The procedure for adding users to the workgroup will include going to the control panel and using the User Accounts. After getting to this step, the administrator will Manage user account. Click on Add and then key in the name and the password that is required. After this, the administrator will select the user level that the user will be required to operate from. There are different types of users in this category. There are the administrators and the standard users.
For security to be assured, the current trend is dual authentication process. This is where users provide more than one method of credentials for authentication process. In this case, one can use the mobile phone to undertake authentication. In this method, one will be sent with a code to authenticate the login process. Another method would be to have biometric and password use. This way, the user will be required to have a and password and at the same time have their fingerprints taken for authentication. For the company, Sally Chu would be advised to have staff have cards that will be used to authenticate their login process. The users would have cards with security words or pass codes that they will have to enter to the system together with the passwords they already have. For security to be breached in this case, the attacker will have both the card and the password. It will be hard to break this mechanism (Russinovich, Solomon, & Ionescu, 2012).
There are different authentication methods in Windows 7. One is the use of certificates that is issued by a certificate authority. The use of this method will have the computer authenticate users using certificates which they will have to provide. Another method would be to use the computer and the user who is logged in. with this option, the computer should be able to use Authenticated IP (AUthIP) (Silberschatz, Galvin, & Gagne, 2009).
One modification that I will make for the internet explorer would be to enable protected mode. This will allow local users to modify local settings but restrict internet usage from modification. This will be achieved by using the File>Properties menu. After which I will double click on the Protected Mode. I will then check the protected mode tab.
The firm’s employees can remain protected from the predators of the internet by ensuring that the sites they visit are safe. There should be a firewall set up in the network of the company so that the suspicious sites are not permitted into the network. One of the internet threats is phishing. This can be eradicated by Internet Explorer 8 by giving pop-ups that will warn the users of these mails. There should be security plug-ins installed in the browser that will warn the users. Another internet threat is that of viruses. This can be eradicated by Internet Explorer by installing antivirus plug-in in the browser to detect and keep away these threats.
Security updates can be provided in the network by having the anti-virus on the network download and update the host computers. This is possible with the use of Kaspersky antivirus.
There are two methods of distributions which include share folder that will be accessed by the host computers. Another method is that of having the updates on external storage devices like DVDs and CDs. The preferred method would be that of having a shared folder on the network.
References
Russinovich, M. E., Solomon, D. A., & Ionescu, A. (2012). Windows® Internals, Part 2: Covering Windows Server® 2008 R2 and Windows 7. O'Reilly Media, Inc..
Sanak, M. (2012). Windows 7 Operating System.
Silberschatz, A., Galvin, P. B., & Gagne, G. (2009). Operating system concepts. J. Wiley & Sons.