Preview

NT2580 Unit 1 Assignment 2

Satisfactory Essays
Open Document
Open Document
387 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580 Unit 1 Assignment 2
Impact of Classification Standard

By

student email Student ID#:
Associate of Science degree in Your Degree

Paper submitted in partial fulfillment of the requirements for
NT 2580 Fundamentals of Information Systems Security

ITT Technical Institute –

To: Supervisor of Richman Investment
From: IT Intern As you have requested, here are the “Internal Use Only” data classification standard four the company. I have broken down the IT Infrastructure by its 7 domains, paying particular attention the first 3 which are the Internal Use Only layers. The first domain would be Users, which are the most threatening thing in the IT infrastructure. Here is a personal interaction with your domain; protection usually is from issuing ID logins and Passwords. As you biggest threat, taking precaution to monitor your users lands with your domain Admins. Since your users can access everything in your domain, you must limit them to what they can do and monitor when they logon. The second domain is the workstation, which is a vital part to you internal use as it is your access to the network. With this we have our users at our workstations getting on the network via the NIC (Network Interface Card) to actually get into the LAN. To get into these workstations, there needs to be some type of security such as analog like Passwords and IDs or Biometrics like thumb prints or Swipe Cards. The third domain is the actual LAN or Local Area Network which is basically where all the workstations connect to one another locally. This is the last of the internal use only standard because after this point, TCP and UDP are now affected since from the exit point to the wide area network or WAN, all information sent out is no longer as secure since its now on a openly public network, the world wide web. These are the particular areas of which we can control local and



References: Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, Mass.: Jones & Bartlett Learning

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Internal Use Only

    • 373 Words
    • 2 Pages

    2. Workstation Domain: The Workstation domain is the second layer of the infrastructure that “Internal use only” standard affects. The Workstation Domain is where users first access the systems, applications, and data. This layer requires a login and password authentication before access is allowed to view information because unauthorized access can Infect the workstation with viruses. At Richman Investments, we provide very secure access for the employee workstations with a username and password. A security protocol requires the password to be changed every 30 days. All computers maintain regular updates and continuous antivirus protection for monitoring. Additionally, no personal devices are allowed on the network.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Unit 4 Assignment 1 SMTP Security Best Practices List and describe three SMTP server security threats.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Unit 5 assignment

    • 340 Words
    • 2 Pages

    Kurtis Galaba 2/7/14 NT2580 Unit 5 Assignment 1 BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2. BitLocker will not encrypt hard drives for Windows XP, Windows 2000 or Windows 2003. Only Windows 7, Vista and Server 2008 include BitLocker. BitLocker drives can be encrypted with 128 bit or 256 bit encryption, this is plenty strong to protect your data in the event the computer is lost or stolen.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    6. The domain the represents the greatest risk and uncertainty to an organization would be the System/Application Domain. This is where the servers and monetary data are located.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    An intranet is a private network that is contained within an enterprise. Unlike the Internet, intranets are private and restrict access to employees (Stroman, Wilson, Wauson 2012). Organisations can allow access to their intranet, for customers’ if required via an extranet. An extranet is part of an intranet that is accessible by outside parties, for access to documents that they may require (e.g. order forms, pricing documents, product brochures and updated terms and conditions).…

    • 640 Words
    • 3 Pages
    Good Essays
  • Better Essays

    POS421 Week 5 Individual

    • 1789 Words
    • 5 Pages

    Domain Design for Security Worksheet In the Week 4, a domain model was created for Company Beta. When the domain model was created, it was thought to cover all the security concerns associated with the information contained on the network. Unfortunately, this is not the case. Recently, there has been some compromising activity to allow sensitive information to possibly get into the wrong hands. To help aid in eliminating the possibility of this occurring again, the entire domain model will be re-evaluated. This will provide security enhancements that are not present in the current domain model. In order to re-evaluate the current domain model, there are several aspects that we will have to discuss. These aspects include the type of domain model used for current domain model, the affects subnets may or may not have, how a new domain model can provide better security, how to improve the domain name system, the Internet domain name and its effect on the DNS name-resolution process, and can ISDN be improved. In addition, it will also be noted how domain controllers can be utilized to provide the company with adequate expansion in the future due to user population increase.…

    • 1789 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Workgroup and Domain

    • 381 Words
    • 2 Pages

    |etc. can be used. |server end. | |7.Workgroup can be given a name like sales, HR, accounts etc. |7.Domain can also given a name like xyz.com, abc.com etc. |…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    LAN-TO-WAN DOMAIN: A malicious web sites may be allowed access, malicious software may be downloaded, or firewalls are not configured properly; all of these can compromise a…

    • 614 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Wonder of Technology

    • 4410 Words
    • 18 Pages

    Bibliography: (1) (2) (3) (4) (5) (6) (7) (8) (9) Vandome, Nick. 1999. Teach Yourself Intranets. Hodder & Stoughton Educational [WWW1] http://www.cio.com/WebMaster/sem3_overview.html [WWW2] http://www.sedonamg.com/intranets.asp [WWW3] http://www.whatis.com/lan.htm Comer, Dougles E. 1999. Computer Networks and Internets. Alan APT [WWW4] http://www.zdnet.com/pcmag/issues/1520/pcmg0030.htm [WWW5] http://www.whatis.com/browser.htm [WWW6] http://www.zdnet.com/pcmag/issues/1520/pcmg0030.htm [WWW7] http://crilt.canberra.edu.au/intranets/settingUp/settingUp.html…

    • 4410 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    This procedure is essential to the separating of duties within the company, and imperative to the type of access users are granted within a restrictive domain. If users’ access to data is dependent on the role they play within the organization, it may be necessary to consider a domain forest, especially in a company with different locations, for the preservation of effective security that is designed around domain trees that share a contiguous namespace.…

    • 1172 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Project Pt 1

    • 338 Words
    • 2 Pages

    The Seven Domains of a typical IT infrastructure are as follows, with the corresponding security proposed for each domain.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    LAN Domain - Any data on the network that is not secured with appropriated access controls is vulnerable. Weak passwords can be cracked. Permissions that aren't assigned properly allow unauthorized access…

    • 5836 Words
    • 24 Pages
    Good Essays
  • Good Essays

    What is the Difference between Intranet and Extranet? Intranets and extranets are network systems that are used to maximize business productivity. In this case the intranet would be the macro-system and the extranet would be the micro-system. When I think about intranet I think of a business’s personal World Wide Web; although it is not the internet it still has more resources and capabilities than the extranet. One way to look at it is to think on a scale of private and non-private. The intranet is private; it’s like working from home and logging into a company’s VPN only you have access to it. Intranets are usually more secure because they don’t have much connection to the internet. However extranet would be the non-private; it uses the internet as a medium and there is really no control over what other networks connect to it. If you were working for a bank then the network that you use to access the company’s software and tools would be the intranet and is normally protected by a firewall to keep out malicious intruders. On the other hand if you work for an automobile manufacture and you need to log into a venders inventory or website from your company’s website then that extension is considered the extranet. The intranet being a private network within a company and the extranet is its extension for outside users such as vendors and other suppliers. Logically, the network here at Strayer could be considered an intranet system. There are computers networked together on an internal network for the use of education. Thinking about it; maybe the computers that the staff and faculty use would be the intranet because those would be the main computers that house all of Strayer important information about students, staff and faculty. The computers in the labs would be the extranet for us students to use to access Strayer information pertaining to class schedules, grades, curriculums and assignments.…

    • 950 Words
    • 4 Pages
    Good Essays