Top-Rated Free Essay
Preview

NT2580 Unit 1

Good Essays
578 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580 Unit 1
Three IT infrastructure domains that would be mostly affected by the “Internal Use Only” data classification standard would be the User Domain, the Workstation Domain, and the LAN domain. The first domain that would be affected is the User Domain. The User Domain defines the people who access an organization’s information system. One of the roles and tasks is that the user can access systems, applications, and data depending upon their defined access rights. Inside the User domain is where the user would find the acceptable user policy or AUP. The AUP defines what users are allowed to do within the organization-owned IT assets. The User Domain is considered the weakest and most affected domain. One reason why is that it has a lack of user awareness. Another reason is that when users are downloading various content and different files, they generally do not conform to the established security guidelines. To protect from these issues, there should be enabled content filtering as well as automatic antivirus scans. A way to protect from an user doing Employee blackmail or extortion is to enable intrusion detection system/intrusion prevention system (IDS/IPS) monitoring. The monitoring will examine the IP data streams for inbound and outbound traffic. A second domain that is affected is the Workstation Domain. The Workstation Domain is where most users connect to the IT infrastructure. A workstation can be a desktop computer, laptop or any device that connects to the network. A role of the workstation domain is that the organization’s staff should have the access necessary to be productive. Some tasks included are configuring hardware, hardening systems, and verifying antivirus files. Threats that are included in the Workstation Domain include Unauthorized access to the workstation, Desktop/laptop computer operating system software vulnerabilities, viruses, and downloading content like photos/music via the Internet. To protect from unauthorized access, enable password protection on all the workstations. Also enable auto screen lockout when there is a long inactive time. A way to protect from operating system software vulnerabilities is to periodically do Workstation Domain vulnerability tests in order to find windows. A vulnerability window is a gap in time that you leave the computer unlatched with security updates. With issues concerning viruses, enable an automated antivirus protection solution that will scan and update individual workstations with proper protection. Protecting from users downloading content like photos or music, enable auto-scans for all new files and automatic file quarantine for all unknown file types. A third domain that would be affected from “Internal Use Only” is the LAN Domain. The LAN Domain includes both the physical network components as well as the logical configuration of services for users. Some risks that occur in the domain include Unauthorized access, LAN server software vulnerabilities, and data transmissions being compromised. A way to protect from unauthorized access is to make sure wiring closets, data centers, and computer rooms are secured. Make sure that anyone without the proper ID is not allowed in. To protect from server software vulnerabilities is to conduct periodic vulnerability assessments to find software gaps. A vulnerability assessment is a software review that identifies bugs or errors in the software. The bugs or errors will go away when the software patches and fixes are uploaded. A way to protect from data transmission being compromised is to implement encryption between the workstation and WAP to maintain confidentiality.
Source:
Kim, David. Fundamentals of Information Systems Security. Burlingtion, MA: Jones & Barlett Learning, 2012.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 4

    • 313 Words
    • 2 Pages

    1) Block B in Fig. 6-31 weighs 603 N. The coefficient of static friction between block and table is 0.32; angle θ is 33°; assume that the cord between B and the knot is horizontal. Find the maximum weight of block A for which the system will be stationary.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 5

    • 368 Words
    • 2 Pages

    the ratio of resistors on one side of the bridge is one while the ratio of resistors on the other side is infinity…

    • 368 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt2670 Unit 7 Lab 1

    • 402 Words
    • 2 Pages

    1. Manages the application pool configuration and for the creation and lifetime of worker processes for HTTP and other protocols.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    You must demonstrate the various methods for using the runas utility to allow administrators to reduce the exposure of administrative accounts.…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 4

    • 3614 Words
    • 15 Pages

    The program is trying to collect the value of a "void" function into an integer variable.…

    • 3614 Words
    • 15 Pages
    Better Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4

    • 1142 Words
    • 5 Pages

    Mrs. Bills needs to get an alphabetical list of students who have sold 100 lollipops. Which…

    • 1142 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 4

    • 699 Words
    • 3 Pages

    Using filter, I found out the minimum number of defects by batch was zero, and the maximum number of defects by batch was twenty-three. Therefore, we can say that the number of defects that are more than ten are major problems and should be flagged. I chose ten as the number to base it on because when you compare the number of defects to the batch size (500, 1000, 5000 and10000) anything less than ten is rather small and is to be expected. Conditional formatting was used to highlight all defects which were greater than ten.…

    • 699 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 3

    • 273 Words
    • 2 Pages

    1. Identify and explain key trends that are occurring in computer peripheral devices? How do these trends affect business uses of computers?…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3

    • 606 Words
    • 3 Pages

    What is the primary information system in this area? How is it effective in performing its role? With what systems does it interrelate in receiving data or sending data?…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580

    • 274 Words
    • 2 Pages

    A way to fix this problem would of vulnerability, we should have to receive a patch from Microsoft. This could take a few days due to shipping. Once we have acquired the patch, we will have to operate by downloading and run a diagnosis on the patch. Once we are a hundred percent sure that the patch will work and not cause further damage, we will begin to fix the security breach on the SMB server. The next step will to install patch to the rest of the servers and to client computers. The work could take a couple of days, but with the leadership and right deligations, this matter should get resolved smoothly.…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 339 Words
    • 2 Pages

    As the It consultant for Johnsons Company I have gather ways to help improve the business communication methods that can help bring in new customers while still meeting the needs of existing customers. I have noticed that we are currently taking all orders by hand which is time consuming and a less effective way to receive multiple orders. Also, the only way to communicate to customers is by the ad in the yellow pages which is a good source but only reaches a limited number of customers because we need to take into account how many customers are actually searching the yellow pages.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 946 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I am addressing the impact of how the “Internal Use Only” should be used in our organization and how by using this term would add to the security of this organization. Of the seven layers IT infrastructure there are three that this policy would differently have an impact on the User Domain, Workstation Domain and the LAN Domain. The User Domain is made up of people who access the system on a daily basis because these are the users or people we have to educate them on how to protect their passwords and critical data for those who will have access to such data. We have an AUP (Acceptable Use Policy) set in place. We have post around the office reminders of how each employee can assist to protect critical information as well we have enable content filtering to prevent users from downloading files that could be malicious to the infrastructure. Workstation Domain are made up of the devices that employee used to connect to the IT Infrastructure with this we must make sure all the tools that are needed to do their jobs must be accessible and secure. The Workstation Domain must be kept as tight as possible without hindering the employee this where they first access the domain at this level also this where the most damage can be done by an employee. We have again educate our employees that a strong password that they can easily remember and no else can easily figure out also set certain policy on the workstations auto lockout after three attempts and workstation lock after idle for a period of time. We can install antivirus and malware software to ensure that our workstations are protected and monitored at all times. The LAN Domain is the one the requires the strongest security because at this level all the hardware and software were are joined together and also this is where the outside world meet the inside world meaning our LAN by connecting…

    • 416 Words
    • 2 Pages
    Satisfactory Essays

Related Topics