Preview

Nt2580 Unit 1 Assignment 1

Satisfactory Essays
Open Document
Open Document
285 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt2580 Unit 1 Assignment 1
Impact of a Data Classification Standard
ITT Technical Institute
NT2580
June 20th, 2013

The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain. The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network. The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device. The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device. If we watch these specific areas closer and implement some user policies, I’m certain that we can normalize as well as reduce security threats to our network and in turn, will make our company a more productive and profitable

You May Also Find These Documents Helpful

  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Securing a user workstation with approved updates will help prevent potential system corruption and in house data from being exposed. This domain is also vulnerable and also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The LAN domain includes all data closets and physical as well as logical elements of the LAN. This domain needs strong security, being that it is the entry and exit points to the wide area network, and makes private information easily accessible to anyone. Users will be screened and authorized by the IT department head and given a special access code. The biggest threat to the LAN domain is unauthorized access. This will be monitored closely to make sure all policies are being followed.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the WAN domain, we need to make sure that all firewalls are set up on the network to filter all traffic. A firewall can stop all traffic coming on to our system that is not meant or not wanted on the network.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For the LAN domain, Make sure wiring closets, data centers, and computer room are secure. Use a WLAN network keys that require a password for wireless access. And implement encryption between workstation and WAP to maintain confidentiality.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    People will always be tempted to go onto the network and to browse the web on their own. Employees can dowload music or videos and possibly games which hand affect the security contols sometimes when those who don’t have authorized access to the network, they will continuously try to attempt to connect. Its best to notify anyone who is authorized on the network to know that there is an unauthorized attempt to log in. there are created policies that are made just to inform employees of risk managing and prevention. Notify are very important to the workstation. All employees must be able to know when there is authentication failure. Viewing log files can show all the security events which allow an administrator to check into it and find he root causes.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    From an IT management perspective, setting up a DHCP server would really depend on the size of the company. A DNS server could be recommended in any setting for faster browsing and recognition of sites. If your network is running the same Operating systems and it uses a name resolution method other than DNS, you can continue to use that method without needing DNS. If your network is running different operating systems, or it connects to the Internet, you will want to deploy DNS as the Internet consists of protocols that require DNS. Justifying setting up either server really depends on the admin, but if you think about it managing two computers statically is nothing compared to having to mange twenty computers statically.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The second domain is the workstation, which is a vital part to you internal use as it is your access to the network. With this we have our users at our workstations getting on the network via the NIC (Network Interface Card) to actually get into the LAN. To get into these workstations, there needs to be some type of security such as analog like Passwords and IDs or Biometrics like thumb prints or Swipe Cards.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Classification Standards help Richman Investments to consistently define how this organization should handle and secure our various types of data. This report will focus on the internal use only data and how each of these domains are affected by these standards. Internal use only data refers to information that may or may not be confidential. It is imperative that our organization keep this information in house and away from the public and realize the Domains that need to be addresses with these rigid standards. The three standards that are at the top of the list for our company that will be directly affected are the User, Work Station, and LAN Domains.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Hello everyone at Richman investments, I was s asked to write a brief report that describes the "internal use only" data classification standard of Richman investments. I will list a few of the IT infrastructure domains that are affected by the standard and how they are affecting the domain and their security here at Richman investments.…

    • 686 Words
    • 3 Pages
    Better Essays
  • Good Essays

    IS3110 Quiz 6 2015

    • 600 Words
    • 2 Pages

    2. Using the USER domain, define risks associated with users and explain what can be done to mitigate them. Are related to social engineering. Users can be conned and tricked. A social engineer tries to trick a user into giving up information or performing an unsafe action. You can try to minimize these risks by raising user awareness. Implement acceptable use policies (AUPs) to ensure users know what they should and should not be doing. Use logon banners to remind users of the AUP. Send out occasional e-mails with security tidbits to keep security in their minds. Use posters in employee areas.…

    • 600 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Employers want to limit an employee’s use of e mails or internet usage during work hours for the following reasons; employee productivity, and network safety. If an employee is using e mail or the internet for his or her own personal use rather than business use, it is costing the company the loss of potential revenue. The amount of traffic on a company's network could risk the network's safety and also cause the server to become clogged with personal business rather than business use. If the network safety of secure business information becomes compromised it may cost the business money in lawsuits and bad publicity.…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    © Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not constitute a commitment from Decipher Information Systems of any features or functions discussed and is subject to change without notice. Decipher Information Systems assumes no responsibility or liability for any errors or inaccuracies that may appear in this publication. Last revised: June 2006…

    • 2567 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Cuputer Science

    • 1107 Words
    • 5 Pages

    Intranet is a network which is only available inside an organization or a company. It can be accessed by all the computers that are operated inside the company's premises and is not connected to the Internet. The purpose is to keep information contained inside the organization and prevent leak of information due to employee errors or hacking attempts.…

    • 1107 Words
    • 5 Pages
    Better Essays
  • Good Essays

    student

    • 287 Words
    • 1 Page

    5. Which of the seven domains of a typical IT infrastructure is easy to implement risk mitigation solutions but difficult to monitor and track effectiveness? WAN…

    • 287 Words
    • 1 Page
    Good Essays