Preview

It255 Introduction to Information Systems Security Impact of a Data Classification Standard

Good Essays
Open Document
Open Document
347 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It255 Introduction to Information Systems Security Impact of a Data Classification Standard
A LAN, or local area network, is a group of computers ranging from small to large within a single office or building. Security and access control has to be robust to secure data, applications, and confidential records. Unauthorized access to the network is a massive security risk for the infrastructure. One way to reduce the risk of access is to implement access doors with key cards to only allow authorized personnel. So if there was a breach in security its only limited to select personnel.
The workstation domain is where a user can connect to the business network through the local area network. This can be done by laptops, phones, tablets, and desktops. Each workstation requires a user ID and password. To prevent unauthorized access pass word protection should be enabled. A strong password should consist of uppercase, lowercase letters and special characters. If a workstation is idle for a certain amount of time there should be automatic screen lock, which requires the user to reenter their password for access. Certain user should only have the ability to make changes like downloading and installing something to internet access. This along with an anti-virus program will reduce threats like viruses and malware. So if a virus was present on a workstation it will be removed before it spreads throughout the network.
The user domain is the employees who access the organization network and IT infrastructure. There should be a policy in place that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and periodic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under watch and have a meeting with their supervisor. Employee’s daily usage should also be supervised periodically to

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    I can understand your concern with your network security and better securing your information without losing productivity. You can set up your users to have their passwords be changed at a certain time and I would recommend a short amount of time in-between. And also you can have the passwords be in a certain context or to be made a certain way and make sheer that the security levels are high on them so that a hacker has a harder time to get in to the network. I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “JVentura10415867@Domain*%$.Local” if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. Can also buy better security items to better your network things like smart card, finger print scanners, retinal scanners, and others. But I only recommend these for really sensitive information and only for certain users in your company. I hope that this has helped you in any way and I wish the best of luck to you.…

    • 327 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The User Domain is the most important because the user can easily create a problem within the network, therefore can be considered the weakest link. The user domain defines the people who access an organizations network and IT infrastructure. In the user domain you will find an acceptable use policy, also known as an AUP. An AUP defines what a user can and cannot do within the organization. Some of the don’ts include but are not limited to malicious emails to and from other co-workers, breaking security policies by entering co-workers workstations, inappropriate web browsing that can lead to viruses, as well as uploading and downloading music,…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project Part 1

    • 430 Words
    • 2 Pages

    * The Workstation Domain is where employees connect to the network and do their work. The desktop support group is responsible for giving employees the access and hardware/software they require but not more than necessary to do their work. All employees must maintain a password in order to access the system.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC 280 Week 4 Case Study

    • 425 Words
    • 2 Pages

    One of the most basic things we need to do at home is to setup a router and firewall. Many people are not aware of the security risks of not using a firewall at home. Firewalls act as shields from unwanted traffic and intrusion. There are many types of packets that a well setup firewall can defend us from without our even knowing. Securing the router with passwords was also something that for a number of years in the early days of home computing that not many people were aware of. As a consequence home networks were left wide open for anyone to connect to and explore. Once inside they will have access to any machine also on that network.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Having the computers and other network devices managed by authentication through a server will keep unauthorized devices from accessing the network, and ensure the overall integrity of the network as a whole.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security Plan

    • 492 Words
    • 2 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP) for which users will be informed of what is and what not acceptable use of the system is.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For users to remotely access data safely on company networks and computers it it important to have an…

    • 430 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Wired & Wireless Lans

    • 1495 Words
    • 6 Pages

    LAN is a local Area Network and a computer network covering a small physical area, like a home, office, restaurant or small group of buildings, such as a school, a college or an airport. Although a LAN can be used as an isolated network to connect computers in an organization for the sole purpose of sharing resources, most LANs today are also linked to a wide area network or the Internet. A LAN can be one of two types: wired or wireless. A wired LAN requires Ethernet cable to physically connect all computers on the network to a main device called a switch. Below is an example of wired LAN.…

    • 1495 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    - No central control over security or backups. Every resource and workstation may have a different password.…

    • 10013 Words
    • 41 Pages
    Powerful Essays
  • Good Essays

    Local Area Networks

    • 907 Words
    • 4 Pages

    Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever-growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a short distance to cover. In most cases a LAN only occupies one or a group of buildings located next to each other. For larger area need there are several other types of networks such as the Internet.…

    • 907 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A Local Area Network (LAN) is a group of computers and associated devices that share a common communications line and typically share the resources of a single processor or server within a small geographic area (for example, within an office building). Usually, the server has applications and data storage that are shared in common by multiple computer users. A local area network may serve as few as two or three users (for example, in a home network) or many as thousands of users (for example, in an FDDI network).…

    • 373 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Internet abuse

    • 1449 Words
    • 5 Pages

    Young, K. S. (2001). Managing employee internet abuse: a comprehensive plan to increase your productivity and reduce liability. Employee Internet Management, 1-37.…

    • 1449 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The local area network (LAN) is home to sheer bandwidth and countless client server applications. Different companies have radically different networks; some have a single PC and others have hundreds of locations and thousands of computers. This page is intended to explain the basic principles and components frequently found on the LAN. The internal network is usually built with the highest bandwidth available. It is then connected to a tiny internet connection which is almost always a bottle neck for internet traffic. Most businesses of any size have at least one server to provide extra computing features to the business. The internet is explicitly distrusted and generally the network has protection from the internet built in. The LAN is something that businesses have complete control over. Network devices are much simpler than servers and PCs. It is common (and best practice) to duplicate significant portions of the Network to allow for failure without having a noticeable impact on the network. A LAN is the local cabling and set of network devices at an individual location building or campus but the internal network can easily include many LANs connected to form a WAN.…

    • 2533 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Information System Security

    • 2782 Words
    • 12 Pages

    1) In computer networks, bandwidth is often used as a synonym for data transfer rate - the amount of data that can be carried from one point to another in a given time period (usually a second). This kind of bandwidth is usually expressed in bits (of data) per second (bps). Occasionally, it's expressed as bytes per second (Bps). A modem that works at 57,600 bps has twice the bandwidth of a modem that works at 28,800 bps. In general, a link with a high bandwidth is one that may be able to carry enough information to sustain the succession of images in a video presentation.…

    • 2782 Words
    • 12 Pages
    Powerful Essays