Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Network security quizlet
Network security quizlet
Network security quizlet
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Network security quizlet
Introduction
What is the worst that could happen to a large insurance and financial corporation with facilities in several states? Exploring the seven domains of a typical IT infrastructure leads to several possibilities. One possible scenario for each of the seven domains, user, workstation, LAN, LAN-to-WAN, remote access, WAN, and system/application will be explored in depth and taken to the furthest worst-case scenario.
User Domain The user domain can be a very large security hole that is not easy to cover. Helping people understand the value and reason behind certain security requirements can help close the gap, but it is something that needs to be continuous. One threat which people of a company face is social engineering. The
…show more content…
The worst-case scenario for malicious software would be the software traveling to other workstations and eventually servers. The hope would be that anti-virus or higher security in the rest of the network would keep it from traveling too far, but it is possible for something very new and very harmful to make its way to sensitive company servers.
LAN Domain The LAN domain is subject to sniffer attacks. A sniffer is an analyzer that picks up data packets traveling inside of the LAN (Gibson, 2011, p. 9). A worst-case scenario for a sniffer attack would be sensitive information being gathered. This could be confidential information or personal information about an associate. Usernames or passwords may be picked up or company information, which would not be available to the public, could be picked up by the
…show more content…
This would allow and attackers to more easily steal the data and log in to the network pretending to be the associate. This could lead to the attacker gaining access to company assets and causing malicious acts. This could lead to outages, loss of data, or loss of integrity to the company.
WAN Domain WAN is the internet to most companies (Gibson, 2011, p. 11). This can pose high risk to companies but is needed by associates to utilize company software and research. Natural weather occurrences and electrical issues can have an effect on the WAN. If the power or internet provider line is out due to a large storm or high winds, the internet is unreachable. Many associates have laptops, so work does not necessarily need to stop during an outage. However company phones and the internet will not operate. The company relies on many applications that utilize either the internet or intranet to be functional. Due to this, many people would not be able to continue working. The worst case scenario here is people being unable to complete work for several days on end until a severe storm has
Cisco Designs, manufactures, and sells Internet Protocol (IP) - based networking and other products related to the communications and information technology (IT) industry and provide services associated with these products and their use. The company provides products for transporting data, voice within buildings, across campuses and globally. The products are utilized at enterprise businesses, public institutions, telecommunications companies and other service providers, commercial businesses, and personal residences. Cisco conducts its business globally and manages its business geographically. Its business is divided into the following three geographic segments: The Americans; Europe, M...
National Institute of Standards and Technology (NIST): Risk Management Guide for Information Technology Systems. Special Publication 800-30, 2002.
Digital world is dangerous because it is silent. Feeling secured is more dangerous because it makes the organization complacent. Hence, every organization should keep taking measures towards strengthening its security on an ongoing basis. This is possible by moving on to the next security level and embracing the new security techniques. After all, a stitch in time saves nine.
Under normal circumstances the overall of IT infrastructure is unlikely to have been designed for high availability. High availability is a relative terms. There are actually higher and higher levels of availability, w...
Over the years Microsoft’s domain architecture has changed and evolved significantly. The introduction of Active Directory has eclipsed the older Primary Domain Controller (PDC) and Backup Domain Controller (BDC) model used prior to the introduction of Windows 2000 Server. The role of the domain in Microsoft’s current network schema can be defined as “a logical group of computers characterized by centralized authentication and administration” (DiNicolo, 2004, p. 10). Today’s modern Microsoft domain architecture often utilizes the concept of multiple domains. Examples of the usage of multiple domains can be found in the design of Windows 2000 and 20003 network infrastructure. It is often necessary and more efficient to create multiple domains to reflect different departments within an organization or to reflect different geographic locations within a company. The addition of multiple domains can assist with the improving of replication performance between domain controller Active Directory databases as well as assisting in the administration of differing security policies. When multiple domains are used, Microsoft terminology describes the actual network architecture schema in terms of Forests and Trees (DiNicolo...
As technology is becoming more prominent as 21-century workers, it become apparent that identity theft, viruses, malware and security breaches occur that can leak out an individual’s personal information or a client’s information in the office setting. Protecting identity in the office setting is a vital role into maintaining a safe job without the anxiety of identity theft. Data security is an issue that affects all businesses in the office setting, both big and small. All of these threats are gaining momentum as a crime that is conspicuous in American society. When a client goes to a business, they assume to have their data and information protected; which can cause a barrier into publicizing personal information. As technology is progressing,
A virus can be within a file or an upgrade; this virus can harm the computer system and corrupt files within the PC. This is a potential risk because it leads to inefficiency in work i.e. a file that had important typed up information is corrupted then it becomes impossible to access, this leads to frustration and inefficiency in work as the document will have to be retyped except the individual had a backup.
The role of the network is to improve data transfer and better documentation within the organization and beyond. User’s privilege can be determined through the network, an example is: determining what computer can access certain files on the network. These limitations can vary from user to user based on their role in the organization.
External attacks “can pose greater risks to Information Technology (IT) operations than hurricanes, floods, power outages, and the like.”1 The distributed nature of today’s computing environment allows many opportunities for potential wrongdoers to cause havoc.
... the company or organization's information. The security roles of employees within the company and organization are responsible for the important information. Role-back Access Control will allow the company and organization to keep track of the users.
Companies and organizations with highly confidential information will have sets of security policy with consideration of human factor to protect their network.
...rious consequences could surface which could ultimately lead to a loss of ones job. There are certain times and places were looking at different websites is ok and other times were it is just not acceptable.
Firewalls are a central point for attack, and if an intruder breaks through the firewall, they may have unlimited access to the corporate network.
...you could down load a maliciousness virus that will provide them your sensitive information (Williams & Sawyer, 2013). It is critical to have firewalls in place to minimize social engineering on your personnel or companies network systems. But the first line of defense, in protecting your company against the loss of critical business information is to ensure that your employees are trained in security awareness (Goodchild, 2012). Hacker can still gain access to your systems even if you have the best security controls in place. It starts with your employees, you have to increase their awareness of how social engineering operates. If they know the signs, they will be able to prevent it. The most important thing is when you are on your personal or work computer, always remember PPI because you will never know who is on the other side of the computer networks.
To be able to use the intranet and e-mail they would have to have a