Preview

POS421 Week 5 Individual

Better Essays
Open Document
Open Document
1789 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
POS421 Week 5 Individual
Domain Design for Security Worksheet
In the Week 4, a domain model was created for Company Beta. When the domain model was created, it was thought to cover all the security concerns associated with the information contained on the network. Unfortunately, this is not the case. Recently, there has been some compromising activity to allow sensitive information to possibly get into the wrong hands. To help aid in eliminating the possibility of this occurring again, the entire domain model will be re-evaluated. This will provide security enhancements that are not present in the current domain model. In order to re-evaluate the current domain model, there are several aspects that we will have to discuss. These aspects include the type of domain model used for current domain model, the affects subnets may or may not have, how a new domain model can provide better security, how to improve the domain name system, the Internet domain name and its effect on the DNS name-resolution process, and can ISDN be improved. In addition, it will also be noted how domain controllers can be utilized to provide the company with adequate expansion in the future due to user population increase.
Current Domain Model Type
The domain model type currently being utilized by Company Beta is that of a single domain. The overall company is the domain name. The Boston, MA and Toronto, Canada locations are just branches off of the domain root name. This also means that the additional locations, along with their subnets, serviced by the main locations are branches based off of their respective main location.
A single domain is considered one of the easiest domains to implement and one of the cheapest in terms of maintaining. This type of domain has a single domain name. This name then acts as the root to the rest of the forest. With a single domain, any domain controller has the ability to authenticate users within the forest. In addition, directory data also is frequently replicated



References: Chiappetta, M. (2011). Speed up your Internet connection by changing your Domain Name System server. Retrieved from http://www.pcworld.com/article/241219/speed_up_your_internet_connection_by_changing_your_domain_name_system_server.html Donovan, D. (2014). What is ISDN? Retrieved from http://www.ehow.com/about_4902035_what-is-isdn.html Microsoft. (2003). How DNS works. Retrieved from http://technet.microsoft.com/en-us/library/cc772774(v=WS.10).aspx Microsoft. (2003). Single Domain Model. Retrieved from http://technet.microsoft.com/en-us/library/cc737091(v=WS.10).aspx Mitchell, B. (2014). Subnet. Retrieved from http://compnetworking.about.com/od/workingwithipaddresses/g/bldef_subnet.htm Rousseve, D. (2010). 6 ways to improve your Domain Name System. Retrieved from http://www.edtechmagazine.com/higher/article/2010/01/giving-dns-its-due Tech-FAQ. (2014). Subnetting. Retrieved from http://www.tech-faq.com/subnetting.html Tech-FAQ. (2014). Understanding Forests and Domains. Retrieved from http://www.tech-faq.com/understanding-forests-and-domains.html

You May Also Find These Documents Helpful

  • Good Essays

    Proj586 Week 4

    • 660 Words
    • 3 Pages

    What is your total budget for this project? Was the project within the budget as set forth by the board of directors?…

    • 660 Words
    • 3 Pages
    Good Essays
  • Good Essays

    3. In the Change Directory Server dialog box, under Change to, click This domain Controller or AD LDS instance.…

    • 585 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Wiley, J. (2012). Windows Server 2008 Active Directory Configuration. Hoboken: John Wiley and Sons, Inc.…

    • 1426 Words
    • 4 Pages
    Better Essays
  • Good Essays

    This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IT113 Unit 5

    • 393 Words
    • 2 Pages

    • Active Directory requires DNS to be installed. DNS does not have to be installed on a…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Pt1420 week 2

    • 320 Words
    • 3 Pages

    1. Design an algorithm that prompts the user to enter his or her height and stores the user’s input in a variable named height.…

    • 320 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Prg421 Week 2 Ia

    • 565 Words
    • 3 Pages

    import java.awt. FlowLayout; import java.awt. GridLayout; import java.awt.event. ActionEvent; import java.awt.event. ActionListener; import java.text.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Pos/543 Week 1

    • 333 Words
    • 2 Pages

    You might imagine that a librarian would be able to organize almost anything. Prior to registering for POS 543 I held a fairly simple view of organization which focused on arranging and categorizing things. Working in academic libraries for almost 30 years, both as a student and professionally trained me to look for similarities in all aspects of my work. We catalog and shelve books on the same subjects together; services that are complementary are delivered by the same department; and individuals working to achieve a similar goal, such as reference assistance, are employed in the same unit. The academic library is also an organization within a larger organization. I found an early description by Scott and Davis matched my vision of an organization perfectly, “a social structure created by individuals to support the collaborative pursuit of specified goals” (2007, p. 11).…

    • 333 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Active Directory® (AD) is a distributed directory system developed by Microsoft® Corporation to serve a wide variety of organizations from small offices to large multinational corporations. In addition to traditional directory information such as phone numbers and job titles, Active Directory contains the Identification and Authentication (I&A) credentials for the users of a Microsoft Windows® network. AD determines the security boundaries (“domains”), access…

    • 4998 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Security is a fundamental aspect of any network infrastructure. The goal is to always have the most up to date programs and protocols to ensure the protection of the network. No aspect is too small to over look. That could mean the difference between a secure network and a compromised network. The best way to achieve this is to break down every level and approach each one as a separate entity and secure it. Then you can modify it to suit the needs of your network.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Standardsresearch

    • 1197 Words
    • 5 Pages

    In short, Working Groups work to create and write the standard. Working Groups are open to anyone to participate in. For individual standards projects, IEEE or IEEE-SA membership is not required to participate. For corporate standards projects, IEEE-SA corporate membership is required. Overall, Working Groups strive for broad representation of all interested parties and encourage global participation. With project authorization request (PAR) approval, a Working Group is defined and it can officially begin its work to develop or write the standard. (IEEEwg, 2012)…

    • 1197 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lesson 1

    • 457 Words
    • 2 Pages

    5 Windows Server 2008 and Windows Server 2008 R2 include a new DNS feature called the Global Names Zone, Which can resolve single-label names like those used in the NetBIOS namespace.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A structured approach to Active Directory design makes enterprise-scale directory service deployment straightforward and easy to understand. This guide combines business and technical guidance to minimize the time and effort required to implement the Active Directory directory service.…

    • 9617 Words
    • 39 Pages
    Good Essays
  • Satisfactory Essays

    This book in particular, deals with what is known as a ‘Digital Nervous System' (DNS). A DNS, in short, is the corporate, digital equivalent of the human nervous system, providing a well-integrated flow of information to the right part of the organization at the right time. The book deals with the effect DNS has on three main corporate functions; Commerce, Knowledge Management & Business Operations, and how one can maximize efficiency, growth and profits using information.…

    • 736 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Online Portals

    • 557 Words
    • 3 Pages

    Domain name - A domain name represents an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, Internet Corporation for Assigned…

    • 557 Words
    • 3 Pages
    Good Essays