9/16/2013
Unit 1 Assignment 2: Impact of a Data Classification Standard The user domain is the first layer of the IT infrastructure I will talk about is affected by the internal use only standard. It is the first and weakest layer in the infrastructure. The user domain is where personal information is created and obtained and stored for internal use. Every person that has the correct permissions on what they can and cannot access. This is to help insure that no one person can mess up or delete anything that isn’t supposed to be. The work station domain is the second layer in the infrastructure. This is also affected by the internal use only standard. In this layer the user can access the network and any applications or information on the system with proper credentials. This requires a user login and password set up or some other form of authentication such as CAC card. This is to be done before the person can access any information. This is a set up that can help stop people from getting information that there not supposed to have access to. The LAN to WAN domain is the third layer of the infrastructure. This can also be affected by the internal use only standard. The TCP and UDP are not safe due to the fact that these are the enter/exit points of the network. This layer allows all the private information on the network to be easily accessed from an outside source. I feel that these three problem areas should be monitored and maintained to the highest standard. I think that Richman Investment should watch these closely and set a stricter guideline for accessing all information.
You May Also Find These Documents Helpful
-
The Workstation Domain includes all workstations approved on the company network. No personal devices or removable media may be used on this network. All devices and removable media will be issued by the company for official use only. To access any workstation, a user will need to be first verified, then setup with an account to be logged in with a username and pass code adhering to the IT departments set standards. All systems will undergo regular updates and be provided with anti-virus and anti-malware software for system monitoring. Access Control Lists (ACLs) will be drawn up to appropriately define what access each individual will have. Any violations will cause an immediate suspension of privileges and again the person(s) in violation will be subject to company executives decisions and/or the authorities for punitive action.…
- 471 Words
- 2 Pages
Good Essays -
Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…
- 634 Words
- 3 Pages
Better Essays -
The User Domain defines the people who have permissions to a company’s information system. This domain contains all of the user information and will enforce an Acceptable Use Policy (AUP) that will define what each user has permissions to do with any company data that they may have access to. This domain is not the strongest link in any company’s infrastructure.…
- 327 Words
- 2 Pages
Satisfactory Essays -
In the WAN domain, we need to make sure that all firewalls are set up on the network to filter all traffic. A firewall can stop all traffic coming on to our system that is not meant or not wanted on the network.…
- 492 Words
- 2 Pages
Satisfactory Essays -
When developing a multi-layered security plan, you must look at each of the seven domains of the IT infrastructure and increase security on each of those domains. The seven domains are user domain, workstation domain, LAN domain, LAN to WAN domain, WAN domain, and remote access domain. Increasing the security on each of those seven domains will increase the overall security of the system and create a multi-layered security plan.…
- 386 Words
- 2 Pages
Satisfactory Essays -
The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.…
- 1461 Words
- 6 Pages
Good Essays -
User domain is essentially the people who access the information system. User domains tend to receive risk due to the user’s carelessness due to lack of awareness, not caring for policies, and security violations. These can easily be rectified with training. Conduct security awareness training, display security posters around the office, and send email reminders to keep the policies fresh in the employee’s mind. Another common threat is caused by employee misuse of the system. Employees might insert USB drives, or download photos music and videos. These items might contain virus’s which in turn damages the system. The USB ports should be disabled and content filtering and antivirus scanning should be enabled.…
- 606 Words
- 3 Pages
Good Essays -
User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…
- 4134 Words
- 12 Pages
Better Essays -
The Classification are assigned to only specific people, for example a manager would have access to restricted information, as for an employee would not have that type of authorization. The employee would only have access to public information. It is important to have these types of data classification polices to prevent classified information from leaking. To ensure adequate quality standards, the classification process has to be monitored by an expert.…
- 288 Words
- 1 Page
Satisfactory Essays -
Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…
- 254 Words
- 1 Page
Satisfactory Essays -
The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device.…
- 285 Words
- 2 Pages
Satisfactory Essays -
The second domain is the workstation, which is a vital part to you internal use as it is your access to the network. With this we have our users at our workstations getting on the network via the NIC (Network Interface Card) to actually get into the LAN. To get into these workstations, there needs to be some type of security such as analog like Passwords and IDs or Biometrics like thumb prints or Swipe Cards.…
- 387 Words
- 2 Pages
Satisfactory Essays -
Data Classification Standards help Richman Investments to consistently define how this organization should handle and secure our various types of data. This report will focus on the internal use only data and how each of these domains are affected by these standards. Internal use only data refers to information that may or may not be confidential. It is imperative that our organization keep this information in house and away from the public and realize the Domains that need to be addresses with these rigid standards. The three standards that are at the top of the list for our company that will be directly affected are the User, Work Station, and LAN Domains.…
- 789 Words
- 4 Pages
Satisfactory Essays -
Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network.…
- 390 Words
- 2 Pages
Satisfactory Essays -
LAN – WAN is where the IT infrastructure links to a wide area network and internet.…
- 360 Words
- 2 Pages
Satisfactory Essays