Preview

Ip Networking

Satisfactory Essays
Open Document
Open Document
327 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ip Networking
Impact of a Data Classification Standard
The “Internal Use Only” data classification includes the User Domain, the Work Station Domain, and the LAN domain. These domains are the most simple IT Infrastructure domains, and they will cover all the users and workstations in the company. The “Internal Use Only” classification will cover information like the company telephone directory, new employee training materials, and internal policy manuals.
The User Domain defines the people who have permissions to a company’s information system. This domain contains all of the user information and will enforce an Acceptable Use Policy (AUP) that will define what each user has permissions to do with any company data that they may have access to. This domain is not the strongest link in any company’s infrastructure.
The Workstation Domain is where all the user information will be confirmed, and an account will be set up. They will need to have a user name and password that is assigned to them by the IT department, before they can access the systems, application or data. No personal devices or removable media will be allowed on the network, and all systems will undergo regular updates, and have anti-virus and anti-malware installed on each workstation for monitoring. There will also be an Access Control List (ACL) drawn up to define what access each individual will have on the network.
The LAN domain includes all data closets and physical as well as logical elements of the LAN. This domain needs strong security, being that it is the entry and exit points to the wide area network, and makes private information easily accessible to anyone. Users will be screened and authorized by the IT department head and given a special access code. The biggest threat to the LAN domain is unauthorized access. This will be monitored closely to make sure all policies are being followed.
Through my research I have found that these three domains will be most

You May Also Find These Documents Helpful

  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    User domain is essentially the people who access the information system. User domains tend to receive risk due to the user’s carelessness due to lack of awareness, not caring for policies, and security violations. These can easily be rectified with training. Conduct security awareness training, display security posters around the office, and send email reminders to keep the policies fresh in the employee’s mind. Another common threat is caused by employee misuse of the system. Employees might insert USB drives, or download photos music and videos. These items might contain virus’s which in turn damages the system. The USB ports should be disabled and content filtering and antivirus scanning should be enabled.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The "Internal Use Only" data classification standard at Richman Investments will include the most basic IT infrastructure domains to include the User Domain, Workstation Domain, and the LAN Domain. This will encompass all users and their workstations, as well their access to the internet and company server databases and any information in between.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    a. By having domains and access rights and permissions, an administrator can achieve confidentiality, integrity, and accountability by controlling what files and resources a user can access.…

    • 518 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the workstation domain, we need to make sure that all workstations have antivirus and malware protection installed on them. Laptops and portable devices are very vulnerable to theft…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Networking basics

    • 519 Words
    • 3 Pages

    Describe what is meant by soft skills and explain why they are important in networking projects…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This section of the paper will take a quick look at the features of Active Directory native to three different Windows operating systems. First, this section will examine Windows 2000 Advanced Server, Windows XP, and then Windows 2003 Server. This section will also look at the active directory features of native to all three Windows operating systems.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Networking

    • 5715 Words
    • 23 Pages

    Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy.…

    • 5715 Words
    • 23 Pages
    Good Essays
  • Good Essays

    Computer Networking

    • 781 Words
    • 4 Pages

    Answer: A networking program usually has clients programs and servers programs, each running on a different host and communicating with each other. The program that initiates the communication is the client. Typically, the client program sends service requests to server and server program provide service to client. Informally, clients tend to be desktop and mobile PCs, Smartphone, and so on, whereas servers tend to be more powerful machines that store and distribute Web pages, stream video, relay e-mail, and so on. Today, most of the servers from which we receive search results, e-mail, Web pages, and videos reside in large data centers. For example, Google has 30–50 data centers, with many having more than one hundred thousand servers.…

    • 781 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Computer Networking

    • 1224 Words
    • 5 Pages

    A firm of architects is installing a data network for use by staff in its offices. The purpose of producing a report is to outline the options for the firm of architects in setting up their data network including details of how the intranet and extranet services will be provided.…

    • 1224 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    networking

    • 3615 Words
    • 15 Pages

    It has been a pleasure to be SAEED AHMED's students. We would like to thank him for giving us the chance to apply the theories of IT in business in the real world.…

    • 3615 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Good Essays

    It Infrastructure

    • 342 Words
    • 2 Pages

    The User Domain is comprised of individuals that are often not aware of the tricks of attackers. For example, networks usually have strong passwords that one must know in order to gain access to the Internet. Nevertheless, social engineers can persuade individuals to give out personal information such as passwords and other types of private information. By giving out such information can cause computer viruses and infections executed by social engineers. Another way in which the User Domain can fall susceptible to attackers is the activities carried out by individuals on the computer. Visiting dangerous websites, downloading malicious files, and installing infected programs all give invitations to attackers to hack computer systems. In addition, inserting infected jump drives into computers can cause an entire computer network to become infected.…

    • 342 Words
    • 2 Pages
    Good Essays
  • Good Essays

    IT205 Week 4 Assignment

    • 641 Words
    • 2 Pages

    The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work.…

    • 641 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Project Part 1

    • 430 Words
    • 2 Pages

    * The Workstation Domain is where employees connect to the network and do their work. The desktop support group is responsible for giving employees the access and hardware/software they require but not more than necessary to do their work. All employees must maintain a password in order to access the system.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The user domain is the first layer of the IT infrastructure I will talk about is affected by the internal use only standard. It is the first and weakest layer in the infrastructure. The user domain is where personal information is created and obtained and stored for internal use. Every person that has the correct permissions on what they can and cannot access. This is to help insure that no one person can mess up or delete anything that isn’t supposed to be.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays