Preview

Seven Domains of a Typical Infrastructure to Identify Weaknesses

Good Essays
Open Document
Open Document
5836 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Seven Domains of a Typical Infrastructure to Identify Weaknesses
Seven domains of a Typical IT Infrastructure To Identify Weaknesses User Domain - Social engineering represents a big vulnerability. Workstation Domain - Computers that aren't patched can be exploited. If they don't have antivirus software they can become infected LAN Domain - Any data on the network that is not secured with appropriated access controls is vulnerable. Weak passwords can be cracked. Permissions that aren't assigned properly allow unauthorized access LAN-to-WAN Domain - If users are allowed to visit malicious Web sites, they can mistakenly download malicious software. Firewalls with unnecessary ports open allow access to the internal network from the internet. WAN Domain - Any public-facing server is susceptible to DoS and DDos attacks. A File Transfer Protocol (FTP) server that allows anonymous uploads can host Warez from black-hat hackers Remote Access Domain - Remote users may be infected with a virus but not know it. When they connect to the internal network via remote access, the virus can infect the network System/Application Domain - Database servers can be subject to SQL injection attacks. In a SQL injection attack, the attacker can read the entire database. SQL injection attacks can also modify data in the database.

Risk and trust levels of common network zones
Threat
Vulnerability
Impact
An Unauthorized employee tries to access data hosted on a server
The organization doesn't use authentication and access controls
The possible loss would depend on the sensitivity of the data and how it's used. For example, if the unauthorized employee accessed salary data and freely shared it, this could impact morale and productivity.
Any type of malicious software, such as viruses or worms, enters the network
Antivirus software doesn't detect the virus
The virus could be installed on systems. Viruses typically result in loss of confidentially, integrity, or availability
An attacker modifies or defaces a Web site

You May Also Find These Documents Helpful

  • Better Essays

    This MLS Plan will describe how the IT department will improve the security of each domain and how to protect the company’s information. The IT department will update all firewalls on the infrastructure and make sure to secure all ports that are open. This will help stop incoming traffic that is malicious. Another protection utilized will be anti-virus software,…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The plan to secure the workstation domain enforces a strong password policy on each workstation and also enables screen lockout protection for inactive times. Keeping all workstations with an up to date antivirus is essential. Furthermore, content filtering features will arrange access of specific domain names according to AUP definitions. In addition, workstations will have up-to-date application software and security patches conferring to company guide lines. As part of the workstation security strategy IT will disable the auto-play feature and will enable automatic scan for any external devices that may be connected to the machine. This measure will ensure the content is secure.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the remote access domain, we need to make sure the VPN in use is secure so that our employees are not exposing sensitive data to anyone outside the network. In order to do so we will ensure everyone is using a VPN to access the network which has to authenticate to the system to get authorization.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The first domain would be Users, which are the most threatening thing in the IT infrastructure. Here is a personal interaction with your domain; protection usually is from issuing ID logins and Passwords. As you biggest threat, taking precaution to monitor your users lands with your domain Admins. Since your users can access everything in your domain, you must limit them to what they can do and monitor when they logon.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Workstation domain is any device that connects to the network. A few threats might be encountered are unauthorized access to the workstation and unauthorized access to applications and data. These issues can be mitigated simply by enabling password protection on workstations and by defining strict access control policies.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    If the web browser is infected and the user is using an unprotected computer system then the virus program can affect the computer, the operating system, and the files that are there. It…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Scenario Three

    • 791 Words
    • 4 Pages

    There are steps that the IT department could have taken to avoid the situation that occurred. There should have been policies in place to ensure that antivirus/malware software was installed on the computer before it was allowed to connect to any network. A machine build checklist could be implemented to where after a computer is initially setup with appropriate operating software, all relevant applications needed would then be installed, including the antivirus software. The endpoint protection software could be installed in a standalone mode if the system being deployed was not going to be part of the larger domain network or if it was going to be used for short term testing. Otherwise it could be deployed from a central management server. It would at the very minimum have that protection on it. Most antivirus vendors have auto update features in their software so that in the event the virus definitions become outdated the software automatically checks in to download the latest definitions.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    The use of USB’s or disk, the files could contain viruses and infect other files or applications on the network. No acceptable user’s policy, AUP, or lack of training employees on the correct usage of the network. The users staying signed into their…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    The following risks, threats, and vulnerabilities were found in an IT infrastructure. Consider the scenario of a Healthcare provider under HIPPA compliance law and what compliance to HIPPA involves.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Malware

    • 601 Words
    • 3 Pages

    A very hard type of malware to detect is called a rootkit. This form of malware will conceal itself within the operating system code to hide itself from detection. Rootkits may also hide itself within other programs. When installed, the attacker will now have access to the infected computer and view any file or carry out other attacks from the computer. This can be especially damaging if a company was infected as the information being obtained can be sold and danger the company’s reputation.…

    • 601 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.…

    • 1201 Words
    • 5 Pages
    Good Essays

Related Topics