IT Infrastructure Seven Domains Can Be Found Essay

PAGES
2
WORDS
684
Cite

¶ … IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain. Each of these domains is viewed as portals for attackers if countermeasures are missing or fail. It is very imperative for businesses to protect each of these seven domains. It only takes one unprotected domain for an attacker to gain access to private data.

The User Domain is comprised of individuals that are often not aware of the tricks of attackers. For example, networks usually have strong passwords that one must know in order to gain access to the Internet. Nevertheless, social engineers can persuade individuals to give out personal information such as passwords and other types of private information. By giving out such information can cause computer viruses and infections executed by social engineers. Another way in which the User Domain can fall susceptible to attackers is the activities carried out by individuals on the computer. Visiting dangerous...

...

In addition, inserting infected jump drives into computers can cause an entire computer network to become infected.
Malware can infect a computer if measures aren't taken to keep its workstation updated. Without applying security updates to the workstation, there is no way in which the system will be able to protect itself from malicious software. The absence of an antivirus program can also cause a computer's workstation to become infected with malware. Not only can malware affect a single computer but also can infect the whole network. If a computer does have an antivirus program, it must keep its definitions updated simply because new malware can come into existence. By having an antivirus program that is regularly updated can greatly decrease the likelihood of the workstation becoming infected with malware.

Inside the firewall is an area known as the LAN Domain. The LAN Domain can either consist of many computers connected together or a few computers…

Cite this Document:

"IT Infrastructure Seven Domains Can Be Found" (2012, April 28) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/it-infrastructure-seven-domains-can-be-found-112258

"IT Infrastructure Seven Domains Can Be Found" 28 April 2012. Web.20 April. 2024. <
https://www.paperdue.com/essay/it-infrastructure-seven-domains-can-be-found-112258>

"IT Infrastructure Seven Domains Can Be Found", 28 April 2012, Accessed.20 April. 2024,
https://www.paperdue.com/essay/it-infrastructure-seven-domains-can-be-found-112258

Related Documents

Local networks in Poland and in the United Kingdom have also been built up and an utter focus has been laid on Asia. By reinvesting the funds generated, the company sustains growth through acquisitions, the development of new products and the improvement of the services provided. A result of the reinvesting process is the Package Flow Technology. This is a multi-year re-engineering of their pickup and delivery of packages. It

Air Traffic
PAGES 102 WORDS 28110

Air traffic has continued to increase and it now constitutes a considerable proportion of the travelling public. The amount of long-hour flights has increased significantly. Based on the International Civil Aviation authority, air traffic can be anticipated to double amid till 2020. Airline travel, especially over longer distances, makes air travelers vulnerable to numerous facets that will impact their health and well-being. Particularly, the speed with which influenza spreads and

However, cursory studies that have been conducted are either biased because they seem to present a biased review of certain products or are insufficient because of their limitations and shallowness. Those studies that have been considered to be useful are mentioned below. Robert D. Boerner, Joanne Bourquard, Pam Greenberg (2000) comprehensively elaborates the legal aspect of spam. He provides an in-depth review of the present laws in actions and the

IT Acquisition Management for a new Video Shop Individual Project Activities Identification of a problem Organization: Component: Showtime Video Store Business Capture Group The problem is that there is no real information technology security measure employed in the video shop. There is very little awareness of the necessary IT security measures amongst the current management heads which is why they need an effective IT security plan and structure to implement to ensure there is no copyright infringement

Risk analysis projects are relatively expensive, and were so even in the mainframe computing era, because they involved the collection and evaluation of a significant volume of data. Earlier risk studies were conducted by in house staff or consultants and the in house people did not have much experience regarding the matter and the consultants did not know much about the requirements of the organization. Presently, the familiarization task has

76). As automation increasingly assumes the more mundane and routine aspects of work of all types, Drucker was visionary in his assessment of how decisions would be made in the years to come. "In the future," said Drucker, "it was possible that all employment would be managerial in nature, and we would then have progressed from a society of labor to a society of management" (Witzel, p. 76). The