Preview

Regional Bank under GLBA Compliance Law

Satisfactory Essays
Open Document
Open Document
447 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Regional Bank under GLBA Compliance Law
LAB 4
Regional Bank under GLBA compliance law.
A. Unauthorized access from the public internet. (Remote Access 1)
B.User Destroys data in application and deletes all files. (User Domain 1)
C. Hacker penetrates your IT infrastructure and gains access to your internal network (LAN D 1)
D. Intra-Office employee romance gone bad. (User D 3)
E. Fire destroys primary data center. (Systems/Application 2)
F. Service provider SLA is not achieved. (Wan Domain 3)
G. Workstation OS has known software vulnerability. (Workstation 2)
H. Unauthorized access to organization owned workstations. (Workstation 1)
I. Loss of production data. (Systems/Application 3)
J. Denial of service attack on organization DMZ and e-mail server. (Systems/Application 2)
K. Remote communications from home office. (Remote Access 3)
L. Lan server OS has a known software vulnerability. (LAN Domain 2)
M. User downloads and clicks on an unknown. (User Domain 2)
N. Workstation browser has software vulnerability. (Workstation 2)
O. Mobile employee needs secure browser access to sales order entry system. (Remote Access 3
P. Service provider has a major network outage.(WAN Domain 3)
Q. Weak ingress/egress traffic filtering degrades performance (LAN to WAN 3)
R. User inserts CD’s and USB hard drives with personal photo’s, music, and videos on organization owned computer. (User Domain 3)
S. VPN tunneling between remote computer and ingress/egress router is needed. (LAN to WAN)
T. WLAN access points are needed for LAN connectivity within a warehouse. (LAN Domain 3)
U.Need to prevent eavesdropping on WLAN due to customer privacy data access. LAN Domain 1
V. DoS/DDoS attack from the WAN/Internet (Wan 1)
Risk Impacts.
User Domain (4 ) B,1: M, 2: R, 3 : D, 3
Workstation Domain. (3) H,1: G, 2: N, 2
LAN Domain. (4) C,1: U, 1: L, 2: T,3
LAN to WAN (2) S, 3: Q,3WAN Domain (3) V,1: P, 3: F, 3
Remote access (3) A, 1: K, 3: O, 3
Systems/Application (3) E,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    NETW410 Week 5 Lab Report

    • 297 Words
    • 2 Pages

    The internal network will use private ip addresses, while the external network will use a public ip addressing scheme. The modems for all sites will use static public ip addresses. This will help to keep the ip address the same at each site and to make it possible to for the sites to connect to one another. All of the computers attached to the network will be using dynamic ip addresses in which will be automatically obtained based on availability. Any networked printers should have dhcp reservations created within the network to hold that ip address and prevent any other devices from obtaining this same ip address. Instructor’s computers will have their own separate vlan to prevent students from accessing sensitive information. The wireless access points will have ip ranges assigned to each type of network, the guest network and student network will be on their own respective vlans. Each device on both of these vlans will automatically obtain an ip address. The internal servers will also be on separate vlans, and will be assigned static private ips. This will make the resources easily accessible. The student portal is being used on the internet through an external website; this will use a public ip address in which will be statically provided by the host.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For the LAN domain, Make sure wiring closets, data centers, and computer room are secure. Use a WLAN network keys that require a password for wireless access. And implement encryption between workstation and WAP to maintain confidentiality.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    LAN domains are a collection of computers connected to one another. Threats for LAN domains include unauthorized access to the LAN, and unauthorized access to systems applications and data. The solutions for these threats are similar to that of the workstation domain. Another major threat are confidentiality of data transmissions via WLAN connections is compromised. Implementation of encryption between…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    7. What method does an attacker use to regain access to an already penetrated system?…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It241 Appendix B

    • 1021 Words
    • 5 Pages

    1 Why is this technology appropriate for this scenario? Users can access data from either building or any location that is part of the WLAN.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cu2479

    • 439 Words
    • 2 Pages

    3.1 To support a work colleague to understand the need for secure handling of service users information and other information I would talk to the individual…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Perform Reconnaissance

    • 299 Words
    • 2 Pages

    2. What was the allocated source IP host address for the TargetWindows01 server, LAN Switch 1, LAN Switch 2, and the IP default gateway router?…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The basic strategies of attack surface reduction are to reduce the amount of code running, reduce entry points available to untrusted users, and eliminate services requested by relatively few users. One approach to improving information security is to reduce the attack surface of a system or software. By turning off unnecessary functionality, there are fewer security risks. By having less code available to unauthorized actors, there will tend to be fewer failures. Although attack surface reduction helps prevent security failures, it does not mitigate the amount of damage an attacker could inflict once a vulnerability is found.[3]…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    4. You have just started a new business. You need to have three to four workstations available for your…

    • 1887 Words
    • 8 Pages
    Good Essays