Preview

student

Good Essays
Open Document
Open Document
795 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
student
IS3110
Unit 1 Roles Scenario

Mike Edmondson, Bruno Rodriguez
9/23/2014

1. Identify Threats to the seven domains of IT within the organization.

USER DOMAIN: sharing passwords. Not protecting your computer properly or sharing access with other individuals will allow threats from a user end.
Workstation Domain: if computer has not been updated with latest upgrades, patches or antivirus.
LAN domain: network has not secured with appropriate access controls, hubs must be upgraded with switches. And have limited access to switches or network controls.
LAN-WAN Domain: if users are allowed to visit malicious websites they can accidentally download software
WAN Domain: Dos attacks and DDos attacks uploads done to the network.
Remote access Domain: infected devices getting remotely connected to the network.
System/Application Domain: applications infected or database attacks.
2. Identify Vulnerabilities in the seven domains of IT within the organization
USER DOMAIN: people can access or steal passwords to do malicious things
Workstation Domain: download viruses or not install current patches or upgrades
LAN domain: someone connecting directly to the local network from a switch or a network drop can jeopardize the company’s integrity confidentiality and availability
LAN-WAN Domain: LAN is company controllable but the WAN is a wide area that most hackers seem to try to breach via HTTP port 80
WAN Domain: WAN is a wide area that most hackers seem to try to breach via HTTP port 80 DoS and DDoS attacks can be the biggest vulnerability
Remote access Domain: infected people connecting to the network can affect to whole network or someone giving other people connectivity without the right credentials.
System/Application Domain: applications can often affect the network if accidentally download a virus or any type of malware. System and application is one of the most often seen part of the system that has open windows of vulnerability.



References: Managing Risk in Information Systems( Book) : by Darril Gibson

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    I can understand your concern with your network security and better securing your information without losing productivity. You can set up your users to have their passwords be changed at a certain time and I would recommend a short amount of time in-between. And also you can have the passwords be in a certain context or to be made a certain way and make sheer that the security levels are high on them so that a hacker has a harder time to get in to the network. I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “JVentura10415867@Domain*%$.Local” if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. Can also buy better security items to better your network things like smart card, finger print scanners, retinal scanners, and others. But I only recommend these for really sensitive information and only for certain users in your company. I hope that this has helped you in any way and I wish the best of luck to you.…

    • 327 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The best network design to ensure the security of Corporation Techs internal access while retaining public Web site availability consists of several layers of defense in order to protect the corporation’s data and provide accessibility to employees and the public.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The LAN Domain will include all data closets, physical elements of the LAN, as well as logical elements to be designated by authorized personnel. Authorized personnel will be properly…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The User Domain is the most important because the user can easily create a problem within the network, therefore can be considered the weakest link. The user domain defines the people who access an organizations network and IT infrastructure. In the user domain you will find an acceptable use policy, also known as an AUP. An AUP defines what a user can and cannot do within the organization. Some of the don’ts include but are not limited to malicious emails to and from other co-workers, breaking security policies by entering co-workers workstations, inappropriate web browsing that can lead to viruses, as well as uploading and downloading music,…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    In this case, it is likely that a remote access Trojan with keylogger capabilities at minimum, with possible…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    NT2580 Unit 1

    • 578 Words
    • 3 Pages

    A second domain that is affected is the Workstation Domain. The Workstation Domain is where most users connect to the IT infrastructure. A workstation can be a desktop computer, laptop or any device that connects to the network. A role of the workstation domain is that the organization’s staff should have the access necessary to be productive. Some tasks included are configuring hardware, hardening systems, and verifying antivirus files. Threats that are included in the Workstation Domain include Unauthorized access to the workstation, Desktop/laptop computer operating system software vulnerabilities, viruses, and downloading content like photos/music via the Internet. To protect from unauthorized access, enable…

    • 578 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A security breach has been identified within a small Microsoft workgroup LAN. The workgroup consists of three primary workgroups which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The workstation domain is where most users connect to the IT infrastructure. The workstation can be a desktop computer, laptop computer, or any other devise that connects to a network. The staff should have the access necessary to be…

    • 686 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Ing Life Case Study

    • 449 Words
    • 2 Pages

    Improper network configuration can leave parts of the system vulnerable. Once a component of the system is compromised, hackers can use the newly gained access to their advantage in obtaining access to other parts of the system. A security breach in the system can take it all down.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Five vulnerabilities for the workgroup LAN based on the Microsoft Security Advisories are 2755801, 2719662, 2854544, 2846338, and 2847140. 2846338 involves privilege elevation, vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.…

    • 551 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Student

    • 292 Words
    • 2 Pages

    In music, a song is a composition for voice or voices, performed by singing. A choral or vocal song may be accompanied by musical instruments, or it may be unaccompanied, as in the case of a cappella songs. The lyrics (words) of songs are typically of a poetic, rhyming nature, though they may be religious verses or free prose.…

    • 292 Words
    • 2 Pages
    Good Essays