Preview

It255 Introduction to Information Systems Security Impact of a Data Classification Standard

Good Essays
Open Document
Open Document
347 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It255 Introduction to Information Systems Security Impact of a Data Classification Standard
A LAN, or local area network, is a group of computers ranging from small to large within a single office or building. Security and access control has to be robust to secure data, applications, and confidential records. Unauthorized access to the network is a massive security risk for the infrastructure. One way to reduce the risk of access is to implement access doors with key cards to only allow authorized personnel. So if there was a breach in security its only limited to select personnel.
The workstation domain is where a user can connect to the business network through the local area network. This can be done by laptops, phones, tablets, and desktops. Each workstation requires a user ID and password. To prevent unauthorized access pass word protection should be enabled. A strong password should consist of uppercase, lowercase letters and special characters. If a workstation is idle for a certain amount of time there should be automatic screen lock, which requires the user to reenter their password for access. Certain user should only have the ability to make changes like downloading and installing something to internet access. This along with an anti-virus program will reduce threats like viruses and malware. So if a virus was present on a workstation it will be removed before it spreads throughout the network.
The user domain is the employees who access the organization network and IT infrastructure. There should be a policy in place that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and periodic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under watch and have a meeting with their supervisor. Employee’s daily usage should also be supervised periodically to

You May Also Find These Documents Helpful

  • Good Essays

    The Workstation Domain includes all workstations approved on the company network. No personal devices or removable media may be used on this network. All devices and removable media will be issued by the company for official use only. To access any workstation, a user will need to be first verified, then setup with an account to be logged in with a username and pass code adhering to the IT departments set standards. All systems will undergo regular updates and be provided with anti-virus and anti-malware software for system monitoring. Access Control Lists (ACLs) will be drawn up to appropriately define what access each individual will have. Any violations will cause an immediate suspension of privileges and again the person(s) in violation will be subject to company executives decisions and/or the authorities for punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Controlled management of network devices, and user accounts: Having the computers and other network devices managed by authentication through a server will keep unauthorized devices from accessing the network, and ensure the overall integrity of the network as a whole.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    User accounts and passwords provide a level of authentication for employees and is what allows these employees to gain access to a company computer or the ability to log in to a company server or other resource. Each employee should be given a unique username that is different from every other employee, and each employee should create a complex password that is associated with their username. The employee should never give out their password to…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    MGT2 Task3

    • 5037 Words
    • 21 Pages

    Ben Malinda Identify and install the latest security software on all telecommuters' PCs and enforce strict rules for information access including password policy management.…

    • 5037 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has antivirus and malware protection installed on them. Laptops are very vulnerable for loss or theft, so all company laptops should have an encrypted hard drive so that if they are stolen, the data contained on them is not recovered by anyone but the owner.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC 280 Week 4 Case Study

    • 425 Words
    • 2 Pages

    One of the most basic things we need to do at home is to setup a router and firewall. Many people are not aware of the security risks of not using a firewall at home. Firewalls act as shields from unwanted traffic and intrusion. There are many types of packets that a well setup firewall can defend us from without our even knowing. Securing the router with passwords was also something that for a number of years in the early days of home computing that not many people were aware of. As a consequence home networks were left wide open for anyone to connect to and explore. Once inside they will have access to any machine also on that network.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Security Management INF: 325, Telecommunications & Networking Concepts Ashford University Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In approaching preventative mechanisms that are effective against hacking, it is very important that both awareness and attitude is first changed, and then perceptions of information security and how to secure data must be allowed to…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Wired & Wireless Lans

    • 1495 Words
    • 6 Pages

    Answer 1:- Introduction: LAN is a local Area Network and a computer network covering a small physical area, like a home, office, restaurant or small group of buildings, such as a school, a college or an airport. Although a LAN can be used as an isolated network to connect computers in an organization for the sole purpose of sharing resources, most LANs today are also linked to a wide area network or the Internet. A LAN can be one of two types: wired or wireless. A wired LAN requires Ethernet cable to physically connect all computers on the network to a main device called a switch. Below is an example of wired LAN.…

    • 1495 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Local Area Networks

    • 907 Words
    • 4 Pages

    LANs: Local Area Networks Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever-growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a short distance to cover. In most cases a LAN only occupies one or a group of buildings located next to each other. For larger area need there are several other types of networks such as the Internet.…

    • 907 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Internet abuse

    • 1449 Words
    • 5 Pages

    Young, K. S. (2001). Managing employee internet abuse: a comprehensive plan to increase your productivity and reduce liability. Employee Internet Management, 1-37.…

    • 1449 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Information System Security

    • 2782 Words
    • 12 Pages

    Table of contents What is Bandwidth? 1) In computer networks, bandwidth is often used as a synonym for data transfer rate - the amount of data that can be carried from one point to another in a given time period (usually a second). This kind of bandwidth is usually expressed in bits (of data) per second (bps). Occasionally, it's expressed as bytes per second (Bps). A modem that works at 57,600 bps has twice the bandwidth of a modem that works at 28,800 bps. In general, a link with a high bandwidth is one that may be able to carry enough information to sustain the succession of images in a video presentation.…

    • 2782 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    that explains the handling of such incidents. Requirements For users to remotely access data safely on company networks and computers it it important to have an…

    • 430 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A Local Area Network (LAN) is a group of computers and associated devices that share a common communications line and typically share the resources of a single processor or server within a small geographic area (for example, within an office building). Usually, the server has applications and data storage that are shared in common by multiple computer users. A local area network may serve as few as two or three users (for example, in a home network) or many as thousands of users (for example, in an FDDI network).…

    • 373 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Misuse of Internet

    • 1778 Words
    • 8 Pages

    * 7. Implement and publish policies to monitor company e-mail and Internet use. Implement a monitoring system and consider using technology to block employee access to websites that are offensive or unrelated to work. Respond quickly and consistently when inappropriate use is discovered. Managing Internet Misuse What Companies can do?…

    • 1778 Words
    • 8 Pages
    Powerful Essays