Verified Document

Workstation Domains Figure Into Your Essay

Briefly discuss how the concept of LAN domains figure into your organizations security policies, please cite and list your references

The concept of a Local Area Network (LAN) domain is essential for the definition and fulfillment of security policies in an organization. Domains determine the level of access control to specific information assets, authentication, workflow review and approval hierarchies, and the ability to define taxonomies for specific data sets as well LAN domains are also defined by their alignment and support of strategic plans and programs, including the use of remote access and adoption in cloud-based architectures within broader enterprise it platforms (Moller, 2007). LAN domains have historically been aligned to a department or division, with subdomains defined by functional or hierarchical areas of the enterprise. Today LAN domains are designed to be more oriented towards workflow processes and support of more distributed, regionally dispersed employees and functional areas. This is especially the case with their use in supporting supply chains across a global locations and supplier manufacturing and service centers (Ekwall, Rolandsson, 2013). As supply chains have continued...

While LAN domains originally had been designed to be aligned to the functional areas of a business, today they must be agile enough to stay up with the rapid pace of change in the enterprise as global supply chains and their diverse locational requirements become commonplace (Ekwall, Rolandsson, 2013).

Sources used in this document:
References:

Ekwall, D., & Rolandsson, B. (2013). Security aspects on corporate culture in a logistics terminal setting. Journal of Transportation Security, 6(1), 13-25.

Hipper, G., & Tavangarian, D. (1997). Advanced workstation cluster architectures for parallel computing. Journal of Systems Architecture, 44(3), 207-226.

Hughes, J. (1999). Certificate inter-operability - white paper. Computers & Security, 18(3), 221-230.

Hung-Yu, C., & Jinn-Ke, J. (2003). A hybrid authentication protocol for large mobile network. The Journal of Systems and Software, 67(2), 123-123.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now