Unit 1 Roles Scenario
Mike Edmondson, Bruno Rodriguez
9/23/2014
1. Identify Threats to the seven domains of IT within the organization.
USER DOMAIN: sharing passwords. Not protecting your computer properly or sharing access with other individuals will allow threats from a user end.
Workstation Domain: if computer has not been updated with latest upgrades, patches or antivirus.
LAN domain: network has not secured with appropriate access controls, hubs must be upgraded with switches. And have limited access to switches or network controls.
LAN-WAN Domain: if users are allowed to visit malicious websites they can accidentally download software
WAN Domain: Dos attacks and DDos attacks uploads done to the network.
Remote access Domain: infected devices getting remotely connected to the network.
System/Application Domain: applications infected or database attacks.
2. Identify Vulnerabilities in the seven domains of IT within the organization
USER DOMAIN: people can access or steal passwords to do malicious things
Workstation Domain: download viruses or not install current patches or upgrades
LAN domain: someone connecting directly to the local network from a switch or a network drop can jeopardize the company’s integrity confidentiality and availability
LAN-WAN Domain: LAN is company controllable but the WAN is a wide area that most hackers seem to try to breach via HTTP port 80
WAN Domain: WAN is a wide area that most hackers seem to try to breach via HTTP port 80 DoS and DDoS attacks can be the biggest vulnerability
Remote access Domain: infected people connecting to the network can affect to whole network or someone giving other people connectivity without the right credentials.
System/Application Domain: applications can often affect the network if accidentally download a virus or any type of malware. System and application is one of the most often seen part of the system that has open windows of vulnerability.
References: Managing Risk in Information Systems( Book) : by Darril Gibson