Preview

Nt1330 Unit 3 Assignment 1

Good Essays
Open Document
Open Document
801 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Assignment 1
This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.
First a multi-layered security plan
When designing a layered security solution for an IT infrastructure. The more layers or compartments that block or protect private data and intellectual property, the more difficult it is to find and steal. Now the Seven Domains of a Typical IT Infrastructure
The User Domain – Defines the people who access an
…show more content…
This will get the most out of availability, ensure data integrity, and maintain confidentiality.
This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.
The WAN Domain – Connects remote locations
A level of security is the IP stateful firewall a security appliance that is used to filter IP packets and block unwanted IP, TCP, and UDP packet types from entering and leaving the network.
Some organizations use the public internet as their WAN infrastructure. While it is cheaper, the internet does not guarantee delivery or security. A security solution for maintaining high WAN service availability is to obtain WAN service availability SLA’s. Deploy redundant internet and WAN connections when 100 percent availability is required.
The Remote Access Domain- connects remote users to the organization’s IT infrastructure. Remote access is critical for staff members who work in the field or from

You May Also Find These Documents Helpful

  • Good Essays

    5) It contain all the information about the shortcut button which shows left sight in lotus.…

    • 528 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This Dragon Net Solutions (DNS) Access Control and Account Management Plan details the access control and account management activities for Dragon Net Solutions. It facilitates compliance with the National Institute of Standards and Technology’s (NIST) Recommended Security Controls for Federal Information Systems (NIST 800-53) and the NIST Guide for Accessing the Security Controls in Federal Information Systems (NIST 800-53A). Specifically, the following NIST Access Controls (AC) are addressed:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 5050 Words
    • 21 Pages

    This is a rudimentary diagram representing the basic network that is employed in the Boston College Rochford Campus.…

    • 5050 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    Defense in Depth provides the university several layers of protection. Starting at the endpoints, host intrusion protection (HIPS), should be installed on each Device. Properly installed, HIPS will not permit the installation of unauthorized programs. This was the root cause of the (D)DoS recently experienced. At the routers access control lists (ACLs) must be put in place to allow only traffic with a legitimate protocol and destination. Between the routers and the endpoint a firewall solution must be put in place. The firewall must be configured to allow only allowed protocols and port numbers to communicate with specific destinations. Between the firewall and endpoint a (D)DoS a detection tool (such as Arbor’s Prevail) must be put in place. This measure not only allows for quick detection of (D)DoS it also permits the automatic mitigation of the…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The surveys were designed for three different targeted audiences, survey1 for IT professionals in the IT departments of SCT, CAS and DU, survey 2 for all users types such as staff, employees and students of SCT, CAS and DU from all departments and survey 3 designed for Vendors who are providing technologies to SCT, CAS and DU.…

    • 306 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS3110 PP1T

    • 777 Words
    • 5 Pages

    With the development of computer networks, the spread of malicious network activities poses great risks to the operational integrity of many organizations and imposes heavy economic burdens on life and health. Agencies within and those that supports the federal government are particularly at substantial risk for cyber attacks. Therefore, risk assessments are very important for network security management and analysis. The DLIS systems that connect via LAN and WLAN with the DLA network will be within the scope of this assessment.…

    • 777 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Don’t share or divulge your passwords to anyone. It is risky. Evil minded people could gain access to your accounts with such passwords. Remember that you would be held responsible for anything done through your accounts.…

    • 599 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Nt1330 Unit 3 Assignment 1

    • 2199 Words
    • 9 Pages

    The social web is a set of social relations that link people through the World Wide Web. It enables people to connect with old friends, family, and classmate. Social networking is an online service, platform, or site that focuses on facilitating the building of social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections. I am going to take a look at a few of the many different social sites that I have used and when they began.…

    • 2199 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    A layered security strategy will encompass Rouge protocols such as Bit mining and P2P, Unauthorized network scanning and probing, and unauthorized access to the network.…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. An example of a HIPPA privacy violation would be a breach of information from the Healthcare organizations servers. This particular breach would impact the System/Application Domain. A hacker can penetrate a vulnerable system and retrieve patient information such as SSN, DOB, and even credit card payment information.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 326 Words
    • 2 Pages

    Richman Investments holds requirements for the usage of the company network including filtering polocies for network traffic.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    enforced by a mechanism implementing regulations established by a security policy. Different access control policies can be applied, corresponding…

    • 27400 Words
    • 141 Pages
    Powerful Essays