Preview

student

Good Essays
Open Document
Open Document
795 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
student
IS3110
Unit 1 Roles Scenario

Mike Edmondson, Bruno Rodriguez
9/23/2014

1. Identify Threats to the seven domains of IT within the organization.

USER DOMAIN: sharing passwords. Not protecting your computer properly or sharing access with other individuals will allow threats from a user end.
Workstation Domain: if computer has not been updated with latest upgrades, patches or antivirus.
LAN domain: network has not secured with appropriate access controls, hubs must be upgraded with switches. And have limited access to switches or network controls.
LAN-WAN Domain: if users are allowed to visit malicious websites they can accidentally download software
WAN Domain: Dos attacks and DDos attacks uploads done to the network.
Remote access Domain: infected devices getting remotely connected to the network.
System/Application Domain: applications infected or database attacks.
2. Identify Vulnerabilities in the seven domains of IT within the organization
USER DOMAIN: people can access or steal passwords to do malicious things
Workstation Domain: download viruses or not install current patches or upgrades
LAN domain: someone connecting directly to the local network from a switch or a network drop can jeopardize the company’s integrity confidentiality and availability
LAN-WAN Domain: LAN is company controllable but the WAN is a wide area that most hackers seem to try to breach via HTTP port 80
WAN Domain: WAN is a wide area that most hackers seem to try to breach via HTTP port 80 DoS and DDoS attacks can be the biggest vulnerability
Remote access Domain: infected people connecting to the network can affect to whole network or someone giving other people connectivity without the right credentials.
System/Application Domain: applications can often affect the network if accidentally download a virus or any type of malware. System and application is one of the most often seen part of the system that has open windows of vulnerability.



References: Managing Risk in Information Systems( Book) : by Darril Gibson

You May Also Find These Documents Helpful

  • Good Essays

    The LAN Domain will include all data closets, physical elements of the LAN, as well as logical elements to be designated by authorized personnel. Authorized personnel will be properly…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The best network design to ensure the security of Corporation Techs internal access while retaining public Web site availability consists of several layers of defense in order to protect the corporation’s data and provide accessibility to employees and the public.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    The User Domain is the most important because the user can easily create a problem within the network, therefore can be considered the weakest link. The user domain defines the people who access an organizations network and IT infrastructure. In the user domain you will find an acceptable use policy, also known as an AUP. An AUP defines what a user can and cannot do within the organization. Some of the don’ts include but are not limited to malicious emails to and from other co-workers, breaking security policies by entering co-workers workstations, inappropriate web browsing that can lead to viruses, as well as uploading and downloading music,…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    In this case, it is likely that a remote access Trojan with keylogger capabilities at minimum, with possible…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The remote production facilities are connected to headquarters via routers T-1 (1.54 mbps telecomm circuit) LAN connections provided by an external ISP and share an internet connection through a firewall at headquarters. They do have firewalls in place; however there are still threats in place. Anyone could breach this firewall and use their system since it’s an external ISP.…

    • 388 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A security breach has been identified within a small Microsoft workgroup LAN. The workgroup consists of three primary workgroups which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 4 Questions IS3110

    • 398 Words
    • 1 Page

    DoS/DDoS attack from the WAN/Internet: buy more bandwidth, denial of service, and good load balancing.…

    • 398 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The workstation domain is where most users connect to the IT infrastructure. The workstation can be a desktop computer, laptop computer, or any other devise that connects to a network. The staff should have the access necessary to be…

    • 686 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Ing Life Case Study

    • 449 Words
    • 2 Pages

    Improper network configuration can leave parts of the system vulnerable. Once a component of the system is compromised, hackers can use the newly gained access to their advantage in obtaining access to other parts of the system. A security breach in the system can take it all down.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Five vulnerabilities for the workgroup LAN based on the Microsoft Security Advisories are 2755801, 2719662, 2854544, 2846338, and 2847140. 2846338 involves privilege elevation, vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.…

    • 551 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    One or more computers are servers. Network administrators use servers to control the security and permissions for all computers on the domain. This makes it easy to make changes because the changes are automatically made to all computers. Domain users must provide a password or other credentials each time they access the domain.…

    • 518 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Student

    • 292 Words
    • 2 Pages

    In music, a song is a composition for voice or voices, performed by singing. A choral or vocal song may be accompanied by musical instruments, or it may be unaccompanied, as in the case of a cappella songs. The lyrics (words) of songs are typically of a poetic, rhyming nature, though they may be religious verses or free prose.…

    • 292 Words
    • 2 Pages
    Good Essays