NT2580 Unit 1 Assignment 2

Satisfactory Essays
Impact of Classification Standard

By

student email Student ID#:
Associate of Science degree in Your Degree

Paper submitted in partial fulfillment of the requirements for
NT 2580 Fundamentals of Information Systems Security

ITT Technical Institute –

To: Supervisor of Richman Investment
From: IT Intern As you have requested, here are the “Internal Use Only” data classification standard four the company. I have broken down the IT Infrastructure by its 7 domains, paying particular attention the first 3 which are the Internal Use Only layers. The first domain would be Users, which are the most threatening thing in the IT infrastructure. Here is a personal interaction with your domain; protection usually is from issuing ID logins and Passwords. As you biggest threat, taking precaution to monitor your users lands with your domain Admins. Since your users can access everything in your domain, you must limit them to what they can do and monitor when they logon. The second domain is the workstation, which is a vital part to you internal use as it is your access to the network. With this we have our users at our workstations getting on the network via the NIC (Network Interface Card) to actually get into the LAN. To get into these workstations, there needs to be some type of security such as analog like Passwords and IDs or Biometrics like thumb prints or Swipe Cards. The third domain is the actual LAN or Local Area Network which is basically where all the workstations connect to one another locally. This is the last of the internal use only standard because after this point, TCP and UDP are now affected since from the exit point to the wide area network or WAN, all information sent out is no longer as secure since its now on a openly public network, the world wide web. These are the particular areas of which we can control local and



References: Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, Mass.: Jones & Bartlett Learning

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Hutchison, John 6/28/15 NT2580 Unit 2: Assignment 2 - Microsoft Environment Analysis 1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them. Answer: 2755801, 2719662, 2854544, 2846338, 2847140. 2. Do any vulnerabilities involve privilege elevation? Is this considered a high-priority issue? Answer: 2846338 involves privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority. 3. Identify…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Impact of a Data Classification Standard ITT Technical Institute NT2580 June 20th, 2013 The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain. The reason why the User Domain infrastructure is one of the most affected infrastructures…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Johnathan Heathcock NT2580 Professor Jackson Thursday 6-10:30 UNIT 2 ASSIGNMENT 1 - CALCULATE THE WINDOWS OF VULNERABILITY The time between each of these areas or, the vulnerability’s lifecycle is divided into three risk areas. These areas are listed below and explained briefly. Black Risk (Exogenous): During the time from discovery to disclosure, only a closed group is aware of this vulnerability. The group could be anyone from hackers to criminals tempted to misuse this knowledge. It may also…

    • 350 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt2580 Unit 2 Lab 1

    • 581 Words
    • 3 Pages

    Unit 2: Lab 1: Cost of different cloud services: Amazon: Has a price range of $0.060 per hour on a Linux based system and goes up to $0.155 per hour for a Windows with SQL and Web system. You can purchase a per year upfront cost or stay at a monthly cost. Google: Offers you two pricing options, $5 per user per month or $10 per user per month. The $5 option does not give you any archiving, data retrieval or data discovery and export options. Where the $10 a month per user has those options.…

    • 581 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Unit 5 assignment

    • 340 Words
    • 2 Pages

    Kurtis Galaba 2/7/14 NT2580 Unit 5 Assignment 1 BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2. BitLocker will not encrypt hard drives for Windows XP, Windows 2000 or Windows 2003. Only Windows 7, Vista and Server 2008 include BitLocker. BitLocker drives can be encrypted with 128 bit or 256 bit encryption, this is plenty strong to protect your data in the event the computer is lost or stolen.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NT2580 Unit 1

    • 578 Words
    • 3 Pages

    Three IT infrastructure domains that would be mostly affected by the “Internal Use Only” data classification standard would be the User Domain, the Workstation Domain, and the LAN domain. The first domain that would be affected is the User Domain. The User Domain defines the people who access an organization’s information system. One of the roles and tasks is that the user can access systems, applications, and data depending upon their defined access rights. Inside the User domain is where the…

    • 578 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 603 Words
    • 3 Pages

    9/25/2014 Service Providers Types NT 1310 Unit 2 Assignment 1 Guido Libreros [COMPANY NAME] Unit 2. Assignment 1. Service Provider Types Course Objectives and Learning Outcomes In this assignment, you will compare service provider types. Assignment Requirements In a 1-page paper, compare the different service provide types: RBOCS, ILEC, CLEC, MSO and ISP. Write a short paragraph on each describing what they are and why they’re important to telecommunications. Be sure to describe each of the service…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 253 Words
    • 2 Pages

    Unit 2 Assignment 1 Presented in Partial Fulfillment Of the Requirements for the Class GB541 Employment Law By Michael J Mc Evoy Kaplan University 18 May 2014 The Fair Labor Standard Act of 1938 Article I. What is the Fair Labor Standard 1) Why was this enacted-What was the need for this 2) What provocations cause this legislator to be considered Article II. What impacts did the Fair Labor Standard have on business 1) Why did they need a suitable work week- 2) What was…

    • 253 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 309 Words
    • 1 Page

    Unit 2 Assignment 1 Chapter Review and TRACE 1. What are the five elements in the rhetorical situation? Use TRACE to help you remember. Text, Reader, Audience, Constraints, Exigence 2. How can a reader use the rhetorical situation to analyze an argument essay? How can a viewer use the rhetorical situation to analyze an image? How can a writer use the rhetorical situation during the planning phase of writing a paper? If an argument essay is a good one, you can use TRACE to analyze it to tell…

    • 309 Words
    • 1 Page
    Satisfactory Essays