|Ethical Hacker |User domain |Confidentiality |
|Intrusion Detection system / intrusion |WAN Domain |Integrity |
|prevention system | | |
|Access controls |User Domain |Confidentiality |
|Failover server |Systems/ Applications Domain |Availability |
|Automatic updates |LAN-to-WAN Domain |Availability |
|Cryptography |LAN Domain |Integrity |
|Data Backups |Systems/Application Domain |Integrity |
|Logon rights |User Domain |Confidentiality |
|Computer cluster |Workstation Domain |Availability |
|Firewalls |LAN-WAN Domain |Integrity |
|Proxies |Remote Access Domain or LAN-WAN Domain |Availability |
|Antivirus scanners |LAN Domain |Availability |
There are seven domains in a typical IT infrastructure and in each domain; there are multiple network security applications and countermeasures that are present.
References: Confidentiality, integrity and availability (cia). (2008). Retrieved from http://it.med.miami.edu/x904.xml Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones & Bartlett Learning.