Preview

Unit 1 Assignment 2 Impact of a Data Classification Standard

Satisfactory Essays
Open Document
Open Document
416 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 1 Assignment 2 Impact of a Data Classification Standard
Unit 1 Assignment 2: Impact of a Data Classification Standard

To: Richmond Investments
From: Anthony Jones, Networking Intern

I am addressing the impact of how the “Internal Use Only” should be used in our organization and how by using this term would add to the security of this organization. Of the seven layers IT infrastructure there are three that this policy would differently have an impact on the User Domain, Workstation Domain and the LAN Domain. The User Domain is made up of people who access the system on a daily basis because these are the users or people we have to educate them on how to protect their passwords and critical data for those who will have access to such data. We have an AUP (Acceptable Use Policy) set in place. We have post around the office reminders of how each employee can assist to protect critical information as well we have enable content filtering to prevent users from downloading files that could be malicious to the infrastructure. Workstation Domain are made up of the devices that employee used to connect to the IT Infrastructure with this we must make sure all the tools that are needed to do their jobs must be accessible and secure. The Workstation Domain must be kept as tight as possible without hindering the employee this where they first access the domain at this level also this where the most damage can be done by an employee. We have again educate our employees that a strong password that they can easily remember and no else can easily figure out also set certain policy on the workstations auto lockout after three attempts and workstation lock after idle for a period of time. We can install antivirus and malware software to ensure that our workstations are protected and monitored at all times. The LAN Domain is the one the requires the strongest security because at this level all the hardware and software were are joined together and also this is where the outside world meet the inside world meaning our LAN by connecting

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -In reference to previous network plan U1A1 GPO and AD will be created and upheld for the internal network. GPO will be in place to provide username and password security policy for external network users. (System/Application Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Good Essays

    BIS 320 Week 4 DQs

    • 385 Words
    • 2 Pages

    BIS 320 Full Course Business Information Systems (Version 1) + Final Exam (30 Questions with answers)…

    • 385 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The plan to secure the workstation domain enforces a strong password policy on each workstation and also enables screen lockout protection for inactive times. Keeping all workstations with an up to date antivirus is essential. Furthermore, content filtering features will arrange access of specific domain names according to AUP definitions. In addition, workstations will have up-to-date application software and security patches conferring to company guide lines. As part of the workstation security strategy IT will disable the auto-play feature and will enable automatic scan for any external devices that may be connected to the machine. This measure will ensure the content is secure.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A cell phone is a two-way radio that sends and receives radio signals to and from cell site base stations. When a person talks on a cellular phone, the voice message gets converted into radio waves. The radio waves travel through air until they reach a base station close by. The base station sends the call across the communication network after which the call reaches the intended receive…

    • 390 Words
    • 2 Pages
    Good Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Hi Kristin, the context diagram that you have posted truly represents most of the high level external entities needed for the Scale2 project. This particular context diagram presents sensors and alarms as well as the building alarm as two separate entities or terminators. I wonder if they are redundancies that could be combined into one in order to enhance your work. The other wonder is on the health monitoring device in relationship to the information medical records database and the mobile devices and/or tables; can I consider them been an aggregate of the health monitoring device and/or you do not believe they are high level enough for the context diagram? In my context diagram I represent database health records and mobile devices as two…

    • 147 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    IT205 Week 4 Assignment

    • 641 Words
    • 2 Pages

    The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work.…

    • 641 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The User Domain is the most important because the user can easily create a problem within the network, therefore can be considered the weakest link. The user domain defines the people who access an organizations network and IT infrastructure. In the user domain you will find an acceptable use policy, also known as an AUP. An AUP defines what a user can and cannot do within the organization. Some of the don’ts include but are not limited to malicious emails to and from other co-workers, breaking security policies by entering co-workers workstations, inappropriate web browsing that can lead to viruses, as well as uploading and downloading music,…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cons putting a limitation to web surfing may cause the employee to lack independence of finding information. What if they need to look up an answer to a customers’ question and has to find it on the web?…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    For the workstation domain, password policies should be in place in the event a user does not do what they should. The workstations should be set up to require a certain complexity of passwords, as well as an inactivity timeout and failed password lockout to prevent brute force attacks. Each workstation should also have regular OS patches in place, as well as an up-to-date antivirus and application based firewall. This can be accomplished by setting up the proper GPOs in Active Directory for enforcement across the entire domain.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate…

    • 272 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To secure against attacks from the internet and the external networks the use of a strong antivirus software and internet security software in all the workstations, hosts and servers is important. In addition to this it is important to have a network security policy that will clearly stipulate the use of the Library property and also provide the guidelines on using personal resources in the library network. Since the network is private a white list of all authorised wireless networks should be maintained to avoid unauthorised access from external wireless networks. It is also important to ensure that all hardware and software is in secure zones and environments to avoid physical damage (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays