Preview

POS421 Week 5 Individual

Better Essays
Open Document
Open Document
1789 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
POS421 Week 5 Individual
Domain Design for Security Worksheet
In the Week 4, a domain model was created for Company Beta. When the domain model was created, it was thought to cover all the security concerns associated with the information contained on the network. Unfortunately, this is not the case. Recently, there has been some compromising activity to allow sensitive information to possibly get into the wrong hands. To help aid in eliminating the possibility of this occurring again, the entire domain model will be re-evaluated. This will provide security enhancements that are not present in the current domain model. In order to re-evaluate the current domain model, there are several aspects that we will have to discuss. These aspects include the type of domain model used for current domain model, the affects subnets may or may not have, how a new domain model can provide better security, how to improve the domain name system, the Internet domain name and its effect on the DNS name-resolution process, and can ISDN be improved. In addition, it will also be noted how domain controllers can be utilized to provide the company with adequate expansion in the future due to user population increase.
Current Domain Model Type
The domain model type currently being utilized by Company Beta is that of a single domain. The overall company is the domain name. The Boston, MA and Toronto, Canada locations are just branches off of the domain root name. This also means that the additional locations, along with their subnets, serviced by the main locations are branches based off of their respective main location.
A single domain is considered one of the easiest domains to implement and one of the cheapest in terms of maintaining. This type of domain has a single domain name. This name then acts as the root to the rest of the forest. With a single domain, any domain controller has the ability to authenticate users within the forest. In addition, directory data also is frequently replicated



References: Chiappetta, M. (2011). Speed up your Internet connection by changing your Domain Name System server. Retrieved from http://www.pcworld.com/article/241219/speed_up_your_internet_connection_by_changing_your_domain_name_system_server.html Donovan, D. (2014). What is ISDN? Retrieved from http://www.ehow.com/about_4902035_what-is-isdn.html Microsoft. (2003). How DNS works. Retrieved from http://technet.microsoft.com/en-us/library/cc772774(v=WS.10).aspx Microsoft. (2003). Single Domain Model. Retrieved from http://technet.microsoft.com/en-us/library/cc737091(v=WS.10).aspx Mitchell, B. (2014). Subnet. Retrieved from http://compnetworking.about.com/od/workingwithipaddresses/g/bldef_subnet.htm Rousseve, D. (2010). 6 ways to improve your Domain Name System. Retrieved from http://www.edtechmagazine.com/higher/article/2010/01/giving-dns-its-due Tech-FAQ. (2014). Subnetting. Retrieved from http://www.tech-faq.com/subnetting.html Tech-FAQ. (2014). Understanding Forests and Domains. Retrieved from http://www.tech-faq.com/understanding-forests-and-domains.html

You May Also Find These Documents Helpful

  • Good Essays

    Proj586 Week 4

    • 660 Words
    • 3 Pages

    What is your total budget for this project? Was the project within the budget as set forth by the board of directors?…

    • 660 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Wiley, J. (2012). Windows Server 2008 Active Directory Configuration. Hoboken: John Wiley and Sons, Inc.…

    • 1426 Words
    • 4 Pages
    Better Essays
  • Better Essays

    This domain is the fastest way for the system to be compromised. I would implement an AUP (acceptable use policy) that will be understood and signed by all employees with access to the network. The employees will also have to go through initial information security training before gaining access to the network. This training will also be required annually in order to maintain their access to the network. The AUP will dictate the requirements for passwords. The requirements will include an eight character alphanumeric password, two uppercase letters, two lowercase letters, two special characters, and two numbers. This will make it more difficult for the password to be breached. The AUP will also state that the company systems will only be used for work related purposes. All social networking sites and many other miscellaneous sites will be blocked. The user will also have to consent to monitoring when signing the…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Good Essays

    This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Pt1420 week 2

    • 320 Words
    • 3 Pages

    1. Design an algorithm that prompts the user to enter his or her height and stores the user’s input in a variable named height.…

    • 320 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Prg421 Week 2 Ia

    • 565 Words
    • 3 Pages

    import java.awt. FlowLayout; import java.awt. GridLayout; import java.awt.event. ActionEvent; import java.awt.event. ActionListener; import java.text.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Active Directory® (AD) is a distributed directory system developed by Microsoft® Corporation to serve a wide variety of organizations from small offices to large multinational corporations. In addition to traditional directory information such as phone numbers and job titles, Active Directory contains the Identification and Authentication (I&A) credentials for the users of a Microsoft Windows® network. AD determines the security boundaries (“domains”), access…

    • 4998 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Oi 361 Week 1 Individual

    • 425 Words
    • 2 Pages

    This is a short summary paper to define the main roles of innovation, design, and creativity while incorporating their importance for a firm to meet their organizational objectives.…

    • 425 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Phl458 Week 1

    • 536 Words
    • 3 Pages

    Opinions are an intensely personal way to express one's judgment of a particular subject. It is one's own thoughts of what they perceive of the matter and how they interpret a belief or truth.…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Security is a fundamental aspect of any network infrastructure. The goal is to always have the most up to date programs and protocols to ensure the protection of the network. No aspect is too small to over look. That could mean the difference between a secure network and a compromised network. The best way to achieve this is to break down every level and approach each one as a separate entity and secure it. Then you can modify it to suit the needs of your network.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Standardsresearch

    • 1197 Words
    • 5 Pages

    In short, Working Groups work to create and write the standard. Working Groups are open to anyone to participate in. For individual standards projects, IEEE or IEEE-SA membership is not required to participate. For corporate standards projects, IEEE-SA corporate membership is required. Overall, Working Groups strive for broad representation of all interested parties and encourage global participation. With project authorization request (PAR) approval, a Working Group is defined and it can officially begin its work to develop or write the standard. (IEEEwg, 2012)…

    • 1197 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lesson 1

    • 457 Words
    • 2 Pages

    5 Windows Server 2008 and Windows Server 2008 R2 include a new DNS feature called the Global Names Zone, Which can resolve single-label names like those used in the NetBIOS namespace.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A structured approach to Active Directory design makes enterprise-scale directory service deployment straightforward and easy to understand. This guide combines business and technical guidance to minimize the time and effort required to implement the Active Directory directory service.…

    • 9617 Words
    • 39 Pages
    Good Essays
  • Satisfactory Essays

    This book in particular, deals with what is known as a ‘Digital Nervous System' (DNS). A DNS, in short, is the corporate, digital equivalent of the human nervous system, providing a well-integrated flow of information to the right part of the organization at the right time. The book deals with the effect DNS has on three main corporate functions; Commerce, Knowledge Management & Business Operations, and how one can maximize efficiency, growth and profits using information.…

    • 736 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Online Portals

    • 557 Words
    • 3 Pages

    Domain name - A domain name represents an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, Internet Corporation for Assigned…

    • 557 Words
    • 3 Pages
    Good Essays