Preview

NT2580 Unit 1 Assignment 2

Satisfactory Essays
Open Document
Open Document
387 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580 Unit 1 Assignment 2
Impact of Classification Standard

By

student email Student ID#:
Associate of Science degree in Your Degree

Paper submitted in partial fulfillment of the requirements for
NT 2580 Fundamentals of Information Systems Security

ITT Technical Institute –

To: Supervisor of Richman Investment
From: IT Intern As you have requested, here are the “Internal Use Only” data classification standard four the company. I have broken down the IT Infrastructure by its 7 domains, paying particular attention the first 3 which are the Internal Use Only layers. The first domain would be Users, which are the most threatening thing in the IT infrastructure. Here is a personal interaction with your domain; protection usually is from issuing ID logins and Passwords. As you biggest threat, taking precaution to monitor your users lands with your domain Admins. Since your users can access everything in your domain, you must limit them to what they can do and monitor when they logon. The second domain is the workstation, which is a vital part to you internal use as it is your access to the network. With this we have our users at our workstations getting on the network via the NIC (Network Interface Card) to actually get into the LAN. To get into these workstations, there needs to be some type of security such as analog like Passwords and IDs or Biometrics like thumb prints or Swipe Cards. The third domain is the actual LAN or Local Area Network which is basically where all the workstations connect to one another locally. This is the last of the internal use only standard because after this point, TCP and UDP are now affected since from the exit point to the wide area network or WAN, all information sent out is no longer as secure since its now on a openly public network, the world wide web. These are the particular areas of which we can control local and



References: Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, Mass.: Jones & Bartlett Learning

You May Also Find These Documents Helpful

  • Good Essays

    NT1310 Unit 1 Assignment 1

    • 4837 Words
    • 20 Pages

    In order to get some statistical data about the number of formula 1 crashes and their causes, we randomly picked up 1 race from each year starting from 1960 up till 2013, then extrapolated results to the respective entire year, and then calculated average numbers. Based on those figures we compiled the table below.…

    • 4837 Words
    • 20 Pages
    Good Essays
  • Satisfactory Essays

    cout << "You are in factorial program of C++. Please enter a +ve integer:- ";…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The software will be presented in such a way that it is both visually appealing and easy for the user to navigate through the application.…

    • 612 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? ( choose two answers)…

    • 957 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 4503 Words
    • 19 Pages

    From the knowledge gained, the student are requires to draft a new version of OS that include a new name for the OS , LOGO, design principles and so on and prepare for the Report and presentation…

    • 4503 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The changing needs of people led to the development of a means to make tasks a lot easier and more convenient. This is technology. It is a tool that now plays an important role in people’s everyday life. Because of this technology every complicated task is now provided with an equal solution. Hence, the difficulties that people experience in doing tasks are minimized. It is not impossible that in the near future, these difficulties will be eliminated. When this happens, industrial evolution will surely take place.…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Satisfactory Essays

    The LAN to WAN domain is the third layer of the infrastructure. This can also be affected by the internal use only standard. The TCP and UDP are not safe due to the fact that these are the enter/exit points of the network. This layer allows all the private information on the network to be easily accessed from an outside source.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    LAN-TO-WAN DOMAIN: A malicious web sites may be allowed access, malicious software may be downloaded, or firewalls are not configured properly; all of these can compromise a…

    • 614 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Senior UI designer

    • 2702 Words
    • 11 Pages

    It provides leadership in addressing issues that confront the future of the Internet and is the…

    • 2702 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of…

    • 157692 Words
    • 753 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The LAN Domain is the group of computers along with all the switches, routers, servers, firewalls, and cables that incorporate the network. This domain can access systems Company wide from anywhere on the LAN Domain which is why we need very strong security on this domain. The building will have specific badge access and data closets and server rooms will have badge and fingerprint access to prevent any unauthorized entry.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Intranets and extranets are network systems that are used to maximize business productivity. In this case the intranet would be the macro-system and the extranet would be the micro-system. When I think about intranet I think of a business’s personal World Wide Web; although it is not the internet it still has more resources and capabilities than the extranet. One way to look at it is to think on a scale of private and non-private. The intranet is private; it’s like working from home and logging into a company’s VPN only you have access to it. Intranets are usually more secure because they don’t have much connection to the internet. However extranet would be the non-private; it uses the internet as a medium and there is really no control over what other networks connect to it. If you were working for a bank then the network that you use to access the company’s software and tools would be the intranet and is normally protected by a firewall to keep out malicious intruders. On the other hand if you work for an automobile manufacture and you need to log into a venders inventory or website from your company’s website then that extension is considered the extranet. The intranet being a private network within a company and the extranet is its extension for outside users such as vendors and other suppliers. Logically, the network here at Strayer could be considered an intranet system. There are computers networked together on an internal network for the use of education. Thinking about it; maybe the computers that the staff and faculty use would be the intranet because those would be the main computers that house all of Strayer important information about students, staff and faculty. The computers in the labs would be the extranet for us students to use to access Strayer information pertaining to class schedules, grades, curriculums and assignments.…

    • 950 Words
    • 4 Pages
    Good Essays