Preview

Nt2580 Unit 1 Assignment 1

Satisfactory Essays
Open Document
Open Document
285 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt2580 Unit 1 Assignment 1
Impact of a Data Classification Standard
ITT Technical Institute
NT2580
June 20th, 2013

The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain. The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network. The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device. The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device. If we watch these specific areas closer and implement some user policies, I’m certain that we can normalize as well as reduce security threats to our network and in turn, will make our company a more productive and profitable

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The software will be presented in such a way that it is both visually appealing and easy for the user to navigate through the application.…

    • 612 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 3253 Words
    • 14 Pages

    For this you need to edit the /etc /network/interfaces file and you need to add the…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Data Classification Standards help Richman Investments to consistently define how this organization should handle and secure our various types of data. This report will focus on the internal use only data and how each of these domains are affected by these standards. Internal use only data refers to information that may or may not be confidential. It is imperative that our organization keep this information in house and away from the public and realize the Domains that need to be addresses with these rigid standards. The three standards that are at the top of the list for our company that will be directly affected are the User, Work Station, and LAN Domains.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 883 Words
    • 4 Pages

    Name Entity (NE) is an expression that refers to proper names such as persons, locations, and organizations. For example: Arafat Awajan is a full professor at Princess Sumaya University for Technology in Jordan, then Arafat Awajan, Princess Sumaya University for Technology, and Jordan would be identified as reference to person, an organization, and location, respectively. The task that attempts to locate, extract, and automatically classify named entities into predefined classes or types in open-domain and unstructured texts, such as newspaper articles, was called Name Entity Recognition (NER)[Shaalan 2014].…

    • 883 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The changing needs of people led to the development of a means to make tasks a lot easier and more convenient. This is technology. It is a tool that now plays an important role in people’s everyday life. Because of this technology every complicated task is now provided with an equal solution. Hence, the difficulties that people experience in doing tasks are minimized. It is not impossible that in the near future, these difficulties will be eliminated. When this happens, industrial evolution will surely take place.…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Satisfactory Essays

    2. Describe the activity, detail the age level that it addresses, the exact location of the activity (Book, Website, Workbook), copy the activity or copy and paste it into this document.…

    • 459 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    People will always be tempted to go onto the network and to browse the web on their own. Employees can dowload music or videos and possibly games which hand affect the security contols sometimes when those who don’t have authorized access to the network, they will continuously try to attempt to connect. Its best to notify anyone who is authorized on the network to know that there is an unauthorized attempt to log in. there are created policies that are made just to inform employees of risk managing and prevention. Notify are very important to the workstation. All employees must be able to know when there is authentication failure. Viewing log files can show all the security events which allow an administrator to check into it and find he root causes.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    student

    • 287 Words
    • 1 Page

    5. Which of the seven domains of a typical IT infrastructure is easy to implement risk mitigation solutions but difficult to monitor and track effectiveness? WAN…

    • 287 Words
    • 1 Page
    Good Essays
  • Better Essays

    Cuputer Science

    • 1107 Words
    • 5 Pages

    Intranet is a network which is only available inside an organization or a company. It can be accessed by all the computers that are operated inside the company's premises and is not connected to the Internet. The purpose is to keep information contained inside the organization and prevent leak of information due to employee errors or hacking attempts.…

    • 1107 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    © Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not constitute a commitment from Decipher Information Systems of any features or functions discussed and is subject to change without notice. Decipher Information Systems assumes no responsibility or liability for any errors or inaccuracies that may appear in this publication. Last revised: June 2006…

    • 2567 Words
    • 11 Pages
    Powerful Essays