Source: Kim, David. Fundamentals of Information Systems Security. Burlingtion, MA: Jones & Barlett Learning, 2012.
You May Also Find These Documents Helpful
-
1. What is the application ZenMap GUI typically used for? Describe a scenario in which you would use this type of application.…
- 385 Words
- 2 Pages
Satisfactory Essays -
The "Internal Use Only" data classification standard at Richman Investments will include the most basic IT infrastructure domains to include the User Domain, Workstation Domain, and the LAN Domain. This will encompass all users and their workstations, as well their access to the internet and company server databases and any information in between.…
- 471 Words
- 2 Pages
Good Essays -
Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…
- 439 Words
- 2 Pages
Satisfactory Essays -
Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…
- 634 Words
- 3 Pages
Better Essays -
Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…
- 606 Words
- 3 Pages
Good Essays -
For the LAN domain, we need to have training about email scams. Most users know not to access suspicious emails when on our system but a quick training course will help. Also, adding spam filters will help get rid of most of the junk email, so there is much less risk of employees opening emails containing malware.…
- 512 Words
- 3 Pages
Satisfactory Essays -
The workstation domain is where a user can connect to the business network through the local area network. This can be done by laptops, phones, tablets, and desktops. Each workstation requires a user ID and password. To prevent unauthorized access pass word protection should be enabled. A strong password should consist of uppercase, lowercase letters and special characters. If a workstation is idle for a certain amount of time there should be automatic screen lock, which requires the user to reenter their password for access. Certain user should only have the ability to make changes like downloading and installing something to internet access. This along with an anti-virus program will reduce threats like viruses and malware. So if a virus was present on a workstation it will be removed before it spreads throughout the network.…
- 347 Words
- 2 Pages
Good Essays -
Hello everyone at Richman investments, I was s asked to write a brief report that describes the "internal use only" data classification standard of Richman investments. I will list a few of the IT infrastructure domains that are affected by the standard and how they are affecting the domain and their security here at Richman investments.…
- 686 Words
- 3 Pages
Better Essays -
It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops and new Apple IPhone. Since Microsoft has stopped support for Microsoft Windows Operating System XP, and 87 % of our current systems require upgrade to Windows 7. We should take advantage of the newest technologies available to our Corporation. Trinity is a three-factor authentication combines” “something that you know” (password – PIN), with “something that you have” (hardware- token, mobile phone) and/or “something that you are” (biometric technologies), to make sure that the person is who he/she claims to be.”(1)…
- 1848 Words
- 6 Pages
Better Essays -
I have identified at least three IT infrastructure domains affected by the “Internal Use Only” data classification standard.…
- 402 Words
- 2 Pages
Satisfactory Essays -
6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…
- 295 Words
- 2 Pages
Satisfactory Essays -
1. Manages the application pool configuration and for the creation and lifetime of worker processes for HTTP and other protocols.…
- 402 Words
- 2 Pages
Satisfactory Essays -
You must demonstrate the various methods for using the runas utility to allow administrators to reduce the exposure of administrative accounts.…
- 322 Words
- 2 Pages
Satisfactory Essays -
I am addressing the impact of how the “Internal Use Only” should be used in our organization and how by using this term would add to the security of this organization. Of the seven layers IT infrastructure there are three that this policy would differently have an impact on the User Domain, Workstation Domain and the LAN Domain. The User Domain is made up of people who access the system on a daily basis because these are the users or people we have to educate them on how to protect their passwords and critical data for those who will have access to such data. We have an AUP (Acceptable Use Policy) set in place. We have post around the office reminders of how each employee can assist to protect critical information as well we have enable content filtering to prevent users from downloading files that could be malicious to the infrastructure. Workstation Domain are made up of the devices that employee used to connect to the IT Infrastructure with this we must make sure all the tools that are needed to do their jobs must be accessible and secure. The Workstation Domain must be kept as tight as possible without hindering the employee this where they first access the domain at this level also this where the most damage can be done by an employee. We have again educate our employees that a strong password that they can easily remember and no else can easily figure out also set certain policy on the workstations auto lockout after three attempts and workstation lock after idle for a period of time. We can install antivirus and malware software to ensure that our workstations are protected and monitored at all times. The LAN Domain is the one the requires the strongest security because at this level all the hardware and software were are joined together and also this is where the outside world meet the inside world meaning our LAN by connecting…
- 416 Words
- 2 Pages
Satisfactory Essays -
6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…
- 946 Words
- 4 Pages
Good Essays