Top-Rated Free Essay
Preview

Nt2580 Impact of a Data Classification Standard

Satisfactory Essays
288 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt2580 Impact of a Data Classification Standard
Jacob Long
9/16/2013
Unit 1 Assignment 2: Impact of a Data Classification Standard The user domain is the first layer of the IT infrastructure I will talk about is affected by the internal use only standard. It is the first and weakest layer in the infrastructure. The user domain is where personal information is created and obtained and stored for internal use. Every person that has the correct permissions on what they can and cannot access. This is to help insure that no one person can mess up or delete anything that isn’t supposed to be. The work station domain is the second layer in the infrastructure. This is also affected by the internal use only standard. In this layer the user can access the network and any applications or information on the system with proper credentials. This requires a user login and password set up or some other form of authentication such as CAC card. This is to be done before the person can access any information. This is a set up that can help stop people from getting information that there not supposed to have access to. The LAN to WAN domain is the third layer of the infrastructure. This can also be affected by the internal use only standard. The TCP and UDP are not safe due to the fact that these are the enter/exit points of the network. This layer allows all the private information on the network to be easily accessed from an outside source. I feel that these three problem areas should be monitored and maintained to the highest standard. I think that Richman Investment should watch these closely and set a stricter guideline for accessing all information.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    -In reference to previous network plan U1A1 GPO and AD will be created and upheld for the internal network. GPO will be in place to provide username and password security policy for external network users. (System/Application Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    of the System/Application domain is loss of data. System/application attacks are generalized into three categories: denial or destruction, alteration,…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The plan to secure the workstation domain enforces a strong password policy on each workstation and also enables screen lockout protection for inactive times. Keeping all workstations with an up to date antivirus is essential. Furthermore, content filtering features will arrange access of specific domain names according to AUP definitions. In addition, workstations will have up-to-date application software and security patches conferring to company guide lines. As part of the workstation security strategy IT will disable the auto-play feature and will enable automatic scan for any external devices that may be connected to the machine. This measure will ensure the content is secure.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lasb 8 IS3220

    • 390 Words
    • 2 Pages

    Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network.…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In the LAN-to-WAN domain the internal network is connect to a wide area network. This domain contains routers, firewalls, email content filters, and other similar devices. Routers will route the traffic leaving and coming into the network strict security ACLs will be applied to these devices. Hardware firewalls will be implemented into the network for further packet filtering. Intrusion prevention/detection systems will be on the network to protect against attacks to our network. The email is subject to scanning and filtering to prevent spam, malware, and viruses. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 9 D1

    • 508 Words
    • 2 Pages

    The reason why all the staff have to be able to log on to any networked computer is so they don’t have to move everything over by peer to peer network or keep everything on a USB, this will save time for each worker and make it a lot easier as anyone can work anywhere so if someone is ill downstairs then someone from upstairs can cover easily.…

    • 508 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The User Domain is the most important because the user can easily create a problem within the network, therefore can be considered the weakest link. The user domain defines the people who access an organizations network and IT infrastructure. In the user domain you will find an acceptable use policy, also known as an AUP. An AUP defines what a user can and cannot do within the organization. Some of the don’ts include but are not limited to malicious emails to and from other co-workers, breaking security policies by entering co-workers workstations, inappropriate web browsing that can lead to viruses, as well as uploading and downloading music,…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    In the user domain, the most important security control is training. Regular training on the user and best practices of IT assets is a must. Users need to be trained (and regularly refreshed) on how to create strong passwords, as well as avoid allowing unauthorized access to their system. They need to be trained to identify social engineering and phishing scams, as well as how to physically secure their system when they are not using it.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    The Classification are assigned to only specific people, for example a manager would have access to restricted information, as for an employee would not have that type of authorization. The employee would only have access to public information. It is important to have these types of data classification polices to prevent classified information from leaking. To ensure adequate quality standards, the classification process has to be monitored by an expert.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.…

    • 1461 Words
    • 6 Pages
    Good Essays