Preview

Nt2580 Unit 1 Assignment 1

Satisfactory Essays
Open Document
Open Document
285 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt2580 Unit 1 Assignment 1
Impact of a Data Classification Standard
ITT Technical Institute
NT2580
June 20th, 2013

The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain. The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network. The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device. The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device. If we watch these specific areas closer and implement some user policies, I’m certain that we can normalize as well as reduce security threats to our network and in turn, will make our company a more productive and profitable

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The software will be presented in such a way that it is both visually appealing and easy for the user to navigate through the application.…

    • 612 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment 1

    • 4614 Words
    • 19 Pages

    QID ch1 ch1 QUESTION A "computer competent" person must know how to upgrade and repair their computer A computer monitor is a video display device ANSWER option2 option1 TRUE TRUE OPTION1 OPTION2 FALSE FALSE is the term used to describe a communications system connecting two or more computers together FALSE FALSE FALSE FALSE FALSE FALSE FALSE hard disk FALSE FALSE the number of children born in Chicago in 1950 mean of your credit the percentage of card balances for the brown-eyed peop past three years in your class optical disk DVD is the conection describes the relationship between among computer users, often seen at a data element and a conferences database record OPTION3 OPTION4…

    • 4614 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    I'm one of the TAs for the online class CGS2531 this Fall Semester. I completed the required online training sessions: FERPA Basics and Preventing Harassment. Please find attached to this email the certificates of completion of the aforementioned courses. Let me know if there is any other information or training session needed.…

    • 52 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 3253 Words
    • 14 Pages

    For this you need to edit the /etc /network/interfaces file and you need to add the…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Brute Force - The intruder attempts to gain access to a server by guessing a user password (usually the root administrator) through the SSH server, Mail server, or other service running on your system. Brute force detection software will alert you when multiple failed attempts to gain access are in progress and disable access from the offending IP address.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 883 Words
    • 4 Pages

    Name Entity (NE) is an expression that refers to proper names such as persons, locations, and organizations. For example: Arafat Awajan is a full professor at Princess Sumaya University for Technology in Jordan, then Arafat Awajan, Princess Sumaya University for Technology, and Jordan would be identified as reference to person, an organization, and location, respectively. The task that attempts to locate, extract, and automatically classify named entities into predefined classes or types in open-domain and unstructured texts, such as newspaper articles, was called Name Entity Recognition (NER)[Shaalan 2014].…

    • 883 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    NT2580 Unit 5 assignment

    • 340 Words
    • 2 Pages

    BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2. BitLocker will not encrypt hard drives for Windows XP, Windows 2000 or Windows 2003. Only Windows 7, Vista and Server 2008 include BitLocker. BitLocker drives can be encrypted with 128 bit or 256 bit encryption, this is plenty strong to protect your data in the event the computer is lost or stolen.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The changing needs of people led to the development of a means to make tasks a lot easier and more convenient. This is technology. It is a tool that now plays an important role in people’s everyday life. Because of this technology every complicated task is now provided with an equal solution. Hence, the difficulties that people experience in doing tasks are minimized. It is not impossible that in the near future, these difficulties will be eliminated. When this happens, industrial evolution will surely take place.…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Satisfactory Essays

    2. Describe the activity, detail the age level that it addresses, the exact location of the activity (Book, Website, Workbook), copy the activity or copy and paste it into this document.…

    • 459 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    student

    • 287 Words
    • 1 Page

    5. Which of the seven domains of a typical IT infrastructure is easy to implement risk mitigation solutions but difficult to monitor and track effectiveness? WAN…

    • 287 Words
    • 1 Page
    Good Essays
  • Better Essays

    Cuputer Science

    • 1107 Words
    • 5 Pages

    Intranet is a network which is only available inside an organization or a company. It can be accessed by all the computers that are operated inside the company's premises and is not connected to the Internet. The purpose is to keep information contained inside the organization and prevent leak of information due to employee errors or hacking attempts.…

    • 1107 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    © Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not constitute a commitment from Decipher Information Systems of any features or functions discussed and is subject to change without notice. Decipher Information Systems assumes no responsibility or liability for any errors or inaccuracies that may appear in this publication. Last revised: June 2006…

    • 2567 Words
    • 11 Pages
    Powerful Essays