Preview

Nt1310 Unit 3 Assignment 1

Good Essays
Open Document
Open Document
539 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Assignment 1
The user domain contains the employees that will be accessing resources in the network. Users access systems, applications, and data within the rights and privileges defined by the acceptable use policy. The AUP must be followed at all time or the user may be terminated. There are threats ranging from lack of awareness to blackmail and extortion. All employees are responsible for their own actions when using the network. The users will all be expected to read and abide by the acceptable use policy. (Kim & Solomon, 2012)
Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights
…show more content…
Included in the LAN are the physical equipment and the actual configurations of the equipment. There are security measures and restrictions applied to the configuration, in which data travels through our organization. These rooms will have a physical and a software security. The logical layer of security can include VPN, SSL, PPTP, and other items. (Kim & Solomon, 2012)
In the LAN-to-WAN domain the internal network is connect to a wide area network. This domain contains routers, firewalls, email content filters, and other similar devices. Routers will route the traffic leaving and coming into the network strict security ACLs will be applied to these devices. Hardware firewalls will be implemented into the network for further packet filtering. Intrusion prevention/detection systems will be on the network to protect against attacks to our network. The email is subject to scanning and filtering to prevent spam, malware, and viruses. (Kim & Solomon, 2012)
The WAN domain consists of the devices and connections between different sites. The wide area network will be under strict security as well. There will be various methods of encrypting network traffic coming and leaving our network. Firewalls will filter traffic between sites to ensure prevention of malicious attacks. (Kim & Solomon,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    nt1210 lab 7.1-3

    • 420 Words
    • 3 Pages

    1. It’s impractical for an organization to own the entirety of a WAN because it would be to maintain the entirety, it’s to maintain the entirety of a LAN because it’s easier to maintain and…

    • 420 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    The User Domain is made up of the employees that have access to the organizations equipment and network and is the weakest link in any IT infrastructure, including the one here at Richman Investments. The amount of social networking and the errors that are made by employees may end be detrimental to the network and cause data to be lost, tampered with, or stolen. The best way to avoid this would be to implement an Acceptable Use Policy (AUP). This will inform the employees what they can and cannot do with company information, resources, and equipment. Anyone that abuses the AUP will be held accountable for their actions. Employees must have their individual permissions for what they can and cannot do in order to make them accountable. It is the responsibility of the HR to check the background of each employee thoroughly and follow with regular evaluations. It is also important that security control audits are performed to secure the system against risks and threats.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Week 4 INDP NTC 362

    • 821 Words
    • 3 Pages

    Local Area Networks (LANs) connect multiple computers that in a geographically limited area, this can be within the same room or building, to share information and resources. A LAN enables devices to communicate over a network with one another internally, otherwise known as an intranet. Each Kudler location would represent a LAN since each location has an internal network that is sharing local resources. The majority of LANs are connected using cables with copper or optics, but a network setup to communicate wirelessly is referred to as a wireless network.…

    • 821 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The second domain is the workstation, which is a vital part to you internal use as it is your access to the network. With this we have our users at our workstations getting on the network via the NIC (Network Interface Card) to actually get into the LAN. To get into these workstations, there needs to be some type of security such as analog like Passwords and IDs or Biometrics like thumb prints or Swipe Cards.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The workstation domain is where most users connect to the IT infrastructure. The workstation can be a desktop computer, laptop computer, or any other devise that connects to a network. The staff should have the access necessary to be…

    • 686 Words
    • 3 Pages
    Better Essays
  • Good Essays

    student

    • 795 Words
    • 3 Pages

    LAN-WAN Domain: LAN is company controllable but the WAN is a wide area that most hackers seem to try to breach via HTTP port 80…

    • 795 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The Workstation Domain is where all the user information will be confirmed, and an account will be set up. They will need to have a user name and password that is assigned to them by the IT department, before they can access the systems, application or data. No personal devices or removable media will be allowed on the network, and all systems will undergo regular updates, and have anti-virus and anti-malware installed on each workstation for monitoring. There will also be an Access Control List (ACL) drawn up to define what access each individual will have on the network.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    R. User inserts CD’s and USB hard drives with personal photo’s, music, and videos on organization owned computer. (User Domain 3)…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    A local area network (LAN) is a network of computers that interconnects computers in a limited or a small area such as a home, computer lab, school, or office building using the network media. The defining characteristics of LANs, is in contrast to the wide area networks (WANs), including their higher data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines.…

    • 3084 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    IKEA Global Strategy

    • 701 Words
    • 3 Pages

    A network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines. Related terms for other types of networks are personal area networks (PANs), local area networks(LANs), campus area networks (CANs), or metropolitan area networks (MANs) which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively. If you have a large campus network using routers and dynamic routing protocols and an internal infrastructure, you do not necessarily have a WAN. A wide area network (WAN) is a computer network that spans a relatively large geographical area. If your network uses a network infrastructure that is owned by your service provider, implementing WAN technologies, you have a WAN. Computers connected to a wide-area network are often connected through public networks, such as the telephone system.…

    • 701 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Will you need to allow all users to use email within the internal network and through the firewall on the Internet? The same goes for what sites users will be allowed to access using a network browser and other network applications.…

    • 644 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Intro to Wan

    • 1775 Words
    • 8 Pages

    A WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. Figure 3-1 illustrates the relationship between the common WAN technologies and the OSI model.…

    • 1775 Words
    • 8 Pages
    Better Essays