Preview

Ip Networking

Satisfactory Essays
Open Document
Open Document
327 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ip Networking
Impact of a Data Classification Standard
The “Internal Use Only” data classification includes the User Domain, the Work Station Domain, and the LAN domain. These domains are the most simple IT Infrastructure domains, and they will cover all the users and workstations in the company. The “Internal Use Only” classification will cover information like the company telephone directory, new employee training materials, and internal policy manuals.
The User Domain defines the people who have permissions to a company’s information system. This domain contains all of the user information and will enforce an Acceptable Use Policy (AUP) that will define what each user has permissions to do with any company data that they may have access to. This domain is not the strongest link in any company’s infrastructure.
The Workstation Domain is where all the user information will be confirmed, and an account will be set up. They will need to have a user name and password that is assigned to them by the IT department, before they can access the systems, application or data. No personal devices or removable media will be allowed on the network, and all systems will undergo regular updates, and have anti-virus and anti-malware installed on each workstation for monitoring. There will also be an Access Control List (ACL) drawn up to define what access each individual will have on the network.
The LAN domain includes all data closets and physical as well as logical elements of the LAN. This domain needs strong security, being that it is the entry and exit points to the wide area network, and makes private information easily accessible to anyone. Users will be screened and authorized by the IT department head and given a special access code. The biggest threat to the LAN domain is unauthorized access. This will be monitored closely to make sure all policies are being followed.
Through my research I have found that these three domains will be most

You May Also Find These Documents Helpful

  • Good Essays

    The "Internal Use Only" data classification standard at Richman Investments will include the most basic IT infrastructure domains to include the User Domain, Workstation Domain, and the LAN Domain. This will encompass all users and their workstations, as well their access to the internet and company server databases and any information in between.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Networking basics

    • 519 Words
    • 3 Pages

    Describe what is meant by soft skills and explain why they are important in networking projects…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The Windows tool that allows you to administer granular policies and permissions on a Windows network…

    • 477 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Due to the general nature of employees having access to systems, applications, and data depending upon their defined access rights, employees must conform to staff manuals and policies described within this document. The “Internal Use Only” data classification standards at Richman Investments will include the most basic of IT Infrastructure Domains to include User Domain, Workstation Domain, and LAN Domain. This will encompass all users, their computers; i.e. laptops, desktops access to the Internet, company servers and any information in between. Each Domain will ensue the proper roles and tasks, responsibilities, and accountabilities are adhered to as described here…

    • 1007 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Internet and User Domain

    • 964 Words
    • 4 Pages

    To fully explain the acceptable use policy would mean to begin from the beginning, the user domain. The user domain is the employee or people within an…

    • 964 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Computer Networking

    • 366 Words
    • 2 Pages

    Prepare a detailed report for User Requirements for Question Bank System. The overview of the problem is described as under:…

    • 366 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When considering Linux over Windows operating system, Riordan manufacturing must examine and compare the network infrastructure of the two systems. When looking at the overall picture of both systems, both systems consist of some of the same features in networking. The author of Windows to Linux Road map states the following. “Linux and Windows both support a number of networking protocols, such as TCP/IP, NetBIOS, and IPX. Both support a wide variety of network adapters. Both provide the ability to share resources, such as files and printing, through the network. Both provide capability to perform network services, such as DHCP and DNS (Walden, 2003).” The three areas of interest that has been the primary focus for Riordan are the Protocol Stack, Network management, and Compatibility. These are important points to consider when making the decision to switch over from Windows to Linux.…

    • 606 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Computer Networking

    • 1224 Words
    • 5 Pages

    A firm of architects is installing a data network for use by staff in its offices. The purpose of producing a report is to outline the options for the firm of architects in setting up their data network including details of how the intranet and extranet services will be provided.…

    • 1224 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Networking

    • 477 Words
    • 2 Pages

    13. To represent 1024 colors, we need log21024 = 10 bits. The total number of bits are, therefore, 1200  1000  10 = 12,000,000 bits…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Networking

    • 5715 Words
    • 23 Pages

    Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy.…

    • 5715 Words
    • 23 Pages
    Good Essays
  • Powerful Essays

    Networking

    • 1382 Words
    • 5 Pages

    Cryptography is derived from the Greek words kryptos meaning “hidden” and graphien, meaning “to write/study”. The process of making and using codes to secure the transmission of information is called cryptography. Before modern era cryptography was synonymous to encryption but today cryptography is heavily based on mathematical theory and computer science practice. Cryptography today deals with the ways to transfer information in such a manner that no one beside the recipients can read what was actually sent and also more advanced crypto techniques deal with ensuring that the information being transferred has not been compromised in the transit. Cryptanalysis is the process of obtaining the original message (Plaintext) from an encrypted message (ciphertetext) without knowing the algorithms and keys used in encryption. Crypto is a tool that can be used in both good and bad ways. Some of the good crypto uses are:…

    • 1382 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Computer Networking

    • 781 Words
    • 4 Pages

    Answer: A networking program usually has clients programs and servers programs, each running on a different host and communicating with each other. The program that initiates the communication is the client. Typically, the client program sends service requests to server and server program provide service to client. Informally, clients tend to be desktop and mobile PCs, Smartphone, and so on, whereas servers tend to be more powerful machines that store and distribute Web pages, stream video, relay e-mail, and so on. Today, most of the servers from which we receive search results, e-mail, Web pages, and videos reside in large data centers. For example, Google has 30–50 data centers, with many having more than one hundred thousand servers.…

    • 781 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The user domain is the first layer of the IT infrastructure I will talk about is affected by the internal use only standard. It is the first and weakest layer in the infrastructure. The user domain is where personal information is created and obtained and stored for internal use. Every person that has the correct permissions on what they can and cannot access. This is to help insure that no one person can mess up or delete anything that isn’t supposed to be.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This section of the paper will take a quick look at the features of Active Directory native to three different Windows operating systems. First, this section will examine Windows 2000 Advanced Server, Windows XP, and then Windows 2003 Server. This section will also look at the active directory features of native to all three Windows operating systems.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Good Essays

    INTERNETWORKING

    • 1091 Words
    • 5 Pages

    Local-area networks (LANs) evolved around the PC revolution. LANs enabled multiple users in a relatively small geographical area to exchange files and messages, as well as access shared resources such as file servers and printers.…

    • 1091 Words
    • 5 Pages
    Good Essays