Preview

NT2580 Unit 1 Assignment 2

Satisfactory Essays
Open Document
Open Document
387 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580 Unit 1 Assignment 2
Impact of Classification Standard

By

student email Student ID#:
Associate of Science degree in Your Degree

Paper submitted in partial fulfillment of the requirements for
NT 2580 Fundamentals of Information Systems Security

ITT Technical Institute –

To: Supervisor of Richman Investment
From: IT Intern As you have requested, here are the “Internal Use Only” data classification standard four the company. I have broken down the IT Infrastructure by its 7 domains, paying particular attention the first 3 which are the Internal Use Only layers. The first domain would be Users, which are the most threatening thing in the IT infrastructure. Here is a personal interaction with your domain; protection usually is from issuing ID logins and Passwords. As you biggest threat, taking precaution to monitor your users lands with your domain Admins. Since your users can access everything in your domain, you must limit them to what they can do and monitor when they logon. The second domain is the workstation, which is a vital part to you internal use as it is your access to the network. With this we have our users at our workstations getting on the network via the NIC (Network Interface Card) to actually get into the LAN. To get into these workstations, there needs to be some type of security such as analog like Passwords and IDs or Biometrics like thumb prints or Swipe Cards. The third domain is the actual LAN or Local Area Network which is basically where all the workstations connect to one another locally. This is the last of the internal use only standard because after this point, TCP and UDP are now affected since from the exit point to the wide area network or WAN, all information sent out is no longer as secure since its now on a openly public network, the world wide web. These are the particular areas of which we can control local and



References: Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, Mass.: Jones & Bartlett Learning

You May Also Find These Documents Helpful

  • Good Essays

    NT1310 Unit 1 Assignment 1

    • 4837 Words
    • 20 Pages

    In order to get some statistical data about the number of formula 1 crashes and their causes, we randomly picked up 1 race from each year starting from 1960 up till 2013, then extrapolated results to the respective entire year, and then calculated average numbers. Based on those figures we compiled the table below.…

    • 4837 Words
    • 20 Pages
    Good Essays
  • Satisfactory Essays

    cout << "You are in factorial program of C++. Please enter a +ve integer:- ";…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    I'm one of the TAs for the online class CGS2531 this Fall Semester. I completed the required online training sessions: FERPA Basics and Preventing Harassment. Please find attached to this email the certificates of completion of the aforementioned courses. Let me know if there is any other information or training session needed.…

    • 52 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    I can understand your concern with your network security and better securing your information without losing productivity. You can set up your users to have their passwords be changed at a certain time and I would recommend a short amount of time in-between. And also you can have the passwords be in a certain context or to be made a certain way and make sheer that the security levels are high on them so that a hacker has a harder time to get in to the network. I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “JVentura10415867@Domain*%$.Local” if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. Can also buy better security items to better your network things like smart card, finger print scanners, retinal scanners, and others. But I only recommend these for really sensitive information and only for certain users in your company. I hope that this has helped you in any way and I wish the best of luck to you.…

    • 327 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 4503 Words
    • 19 Pages

    From the knowledge gained, the student are requires to draft a new version of OS that include a new name for the OS , LOGO, design principles and so on and prepare for the Report and presentation…

    • 4503 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The changing needs of people led to the development of a means to make tasks a lot easier and more convenient. This is technology. It is a tool that now plays an important role in people’s everyday life. Because of this technology every complicated task is now provided with an equal solution. Hence, the difficulties that people experience in doing tasks are minimized. It is not impossible that in the near future, these difficulties will be eliminated. When this happens, industrial evolution will surely take place.…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Satisfactory Essays

    The work station domain is the second layer in the infrastructure. This is also affected by the internal use only standard. In this layer the user can access the network and any applications or information on the system with proper credentials. This requires a user login and password set up or some other form of authentication such as CAC card. This is to be done before the person can access any information. This is a set up that can help stop people from getting information that there not supposed to have access to.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of…

    • 157692 Words
    • 753 Pages
    Satisfactory Essays
  • Good Essays

    LAN-TO-WAN DOMAIN: A malicious web sites may be allowed access, malicious software may be downloaded, or firewalls are not configured properly; all of these can compromise a…

    • 614 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Senior UI designer

    • 2702 Words
    • 11 Pages

    It provides leadership in addressing issues that confront the future of the Internet and is the…

    • 2702 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Intranets and extranets are network systems that are used to maximize business productivity. In this case the intranet would be the macro-system and the extranet would be the micro-system. When I think about intranet I think of a business’s personal World Wide Web; although it is not the internet it still has more resources and capabilities than the extranet. One way to look at it is to think on a scale of private and non-private. The intranet is private; it’s like working from home and logging into a company’s VPN only you have access to it. Intranets are usually more secure because they don’t have much connection to the internet. However extranet would be the non-private; it uses the internet as a medium and there is really no control over what other networks connect to it. If you were working for a bank then the network that you use to access the company’s software and tools would be the intranet and is normally protected by a firewall to keep out malicious intruders. On the other hand if you work for an automobile manufacture and you need to log into a venders inventory or website from your company’s website then that extension is considered the extranet. The intranet being a private network within a company and the extranet is its extension for outside users such as vendors and other suppliers. Logically, the network here at Strayer could be considered an intranet system. There are computers networked together on an internal network for the use of education. Thinking about it; maybe the computers that the staff and faculty use would be the intranet because those would be the main computers that house all of Strayer important information about students, staff and faculty. The computers in the labs would be the extranet for us students to use to access Strayer information pertaining to class schedules, grades, curriculums and assignments.…

    • 950 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The User Domain is usually the weakest and most susceptible to tampering whether it is from a malicious employee or an untrained or careless user people or human and humans make mistakes. This domain is where personal information is created and internal documents are opened and modified. The User Domain can be modified to only allow access to specific company data.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays