Preview

Impact of a Data Classification Standard

Better Essays
Open Document
Open Document
686 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Impact of a Data Classification Standard
Impact of a Data Classification Standard

IT-255 unit 1 assignment 2: impact of a data classification standard

Hello everyone at Richman investments, I was s asked to write a brief report that describes the "internal use only" data classification standard of Richman investments. I will list a few of the IT infrastructure domains that are affected by the standard and how they are affecting the domain and their security here at Richman investments.

* User domain

The user domain defines the people who access an organizations information system. In the user domain you will find an acceptable use policy (AUP). An AUP defines what a user can and cannot do with organization-owned IT assets. It is like a rulebook that the employees must follow. Failure to follow these rules can be grounds for termination. The user domain is the weakest link in an IT infrastructure. Anybody who is responsible for computer security understand what motivates someone to compromise an organization system, application, or data. Now I am going to list risk and threats commonly found in the user domain and plans you can use to prevent them.

Lack of user awareness - solution - conduct security awareness training, display security awareness posters, insert reminders in banner greeting, and send email reminders to employees. Security policy violation- solution - place employee on probation, review AUP and employee Manuel, discuss during performance review. Employee blackmail or extortion- solution - track and monitor abnormal employee behavior and use of IT infrastructure during off hours. Alarms and alerts programmed within an IDS/IPS help identify abnormal traffic and can block IP traffic as per policy definition.

* Workstation domain

The workstation domain is where most users connect to the IT infrastructure. The workstation can be a desktop computer, laptop computer, or any other devise that connects to a network. The staff should have the access necessary to be

You May Also Find These Documents Helpful

  • Satisfactory Essays

    For starters, the security policies for account management need to be updated. The user’s password needs to changed every 90 days. Any employee that has remote access should have a token key on a USB drive that provides the user’s credentials. When an employee retires, quits, or gets fired, they accounts should be locked until IT administrators can go through the account.…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the user domain, the weak link is the user. Simple passwords can be a major problem so you must use complex passwords with eight or more characters, upper and lower case, and special characters. Passwords will be changed monthly and the same password cannot be used within a twelve month period.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The data classification policy is intended to provide a framework for classifying a company’s data based on its level of sensitivity. Data classification entails analyzing the data an organization retains, determining its importance and value, and then assigning it to a category. Data is classified to help determine baselines for security controls in that will be implemented to protect the data.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    Here are some of the tools that as owner should be in place, one is Access control it consist of all the policies a company uses to prevent improper access to systems by unauthorized insiders and outsiders. To gain access a user must be authorized and authenticated. Another tool is a firewalls they prevent unauthorized user from accessing private networks. There are a number of firewall screening technologies, and applications, including static packet filtering, stateful inspections, Network Address Translations and application proxy filtering they are often used in combination to provide firewall protection. Others are antivirus and antispyware software, which are designed to check computer systems and drives for the presence of computer viruses and eliminates the virus…

    • 667 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    NT2670 Midtern Questions

    • 842 Words
    • 3 Pages

    What role enables users working at another computer on the company network, or on the internet, to establish a connection to a server and open an application or desktop session there?…

    • 842 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    The User Domain is the most important because the user can easily create a problem within the network, therefore can be considered the weakest link. The user domain defines the people who access an organizations network and IT infrastructure. In the user domain you will find an acceptable use policy, also known as an AUP. An AUP defines what a user can and cannot do within the organization. Some of the don’ts include but are not limited to malicious emails to and from other co-workers, breaking security policies by entering co-workers workstations, inappropriate web browsing that can lead to viruses, as well as uploading and downloading music,…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    I. Track and monitor abnormal employee behavior, erratic job performance, and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on AUP monitoring and compliance.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Unit 1

    • 578 Words
    • 3 Pages

    A second domain that is affected is the Workstation Domain. The Workstation Domain is where most users connect to the IT infrastructure. A workstation can be a desktop computer, laptop or any device that connects to the network. A role of the workstation domain is that the organization’s staff should have the access necessary to be productive. Some tasks included are configuring hardware, hardening systems, and verifying antivirus files. Threats that are included in the Workstation Domain include Unauthorized access to the workstation, Desktop/laptop computer operating system software vulnerabilities, viruses, and downloading content like photos/music via the Internet. To protect from unauthorized access, enable…

    • 578 Words
    • 3 Pages
    Good Essays
  • Better Essays

    NT2580 Graded Assignments

    • 5288 Words
    • 22 Pages

    I have correctly matched all the risks or threats within the seven domains of a typical IT infrastructure with the solutions and preventative actions.…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Satisfactory Essays

    Project Part 1

    • 430 Words
    • 2 Pages

    * The Workstation Domain is where employees connect to the network and do their work. The desktop support group is responsible for giving employees the access and hardware/software they require but not more than necessary to do their work. All employees must maintain a password in order to access the system.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Logs are a great monitoring tool that provides a record of events. As such, I need every occurrence to be logged, tracked and reported on. For each entry, I want to know "what" occurred, "when" it occurred, and "who" or what cause it. Monitoring compliance would allow me to: (1) "Detect and correct violations (2) Provide evidence to support enforcement actions (3) Evaluate program progress by establishing compliance status (4) Provide case studies for staff training (The SANS Institute, 2012). At each location I would nominate ISS enforcement officers who will be held responsible for monitoring and enforcement strategies to ensure that employees act in according with acceptable use policies (AUPs), set forth by management to ensure the organization assets are protected. Sguil (pronounced sgweel) is one of the best GUI monitoring tool around I would use that provides "real time events, sessions data, and raw packet captures." It facilitates seamless analysis, as when an alert that needs more investigation has been identified, it makes a decision on how to handle the situation. Sguil uses a backend database for most of its data, which allows users to perform SQL queries against several different types of security events (The SANS Institute, 2012). For access control, I would use…

    • 577 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 1

    • 753 Words
    • 3 Pages

    5- Why is an acceptable use policy not a fail-safe means of mitigating risks and threats within the user domain?…

    • 753 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1‐ Drugs and Alcoholic periodic tests 2‐ Medical Inspection 3‐ Training for the employee how to recognize the Potential threats and reporting the cases 4‐ Regular meetings for the employees to hear their complains and discuss with them the negative points they face within the company.…

    • 577 Words
    • 3 Pages
    Satisfactory Essays