Verified Document

IT Infrastructure Seven Domains Can Be Found Essay

¶ … IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain. Each of these domains is viewed as portals for attackers if countermeasures are missing or fail. It is very imperative for businesses to protect each of these seven domains. It only takes one unprotected domain for an attacker to gain access to private data.

The User Domain is comprised of individuals that are often not aware of the tricks of attackers. For example, networks usually have strong passwords that one must know in order to gain access to the Internet. Nevertheless, social engineers can persuade individuals to give out personal information such as passwords and other types of private information. By giving out such information can cause computer viruses and infections executed by social engineers. Another way in which the User Domain can fall susceptible to attackers is the activities carried out by individuals on the computer. Visiting dangerous...

In addition, inserting infected jump drives into computers can cause an entire computer network to become infected.
Malware can infect a computer if measures aren't taken to keep its workstation updated. Without applying security updates to the workstation, there is no way in which the system will be able to protect itself from malicious software. The absence of an antivirus program can also cause a computer's workstation to become infected with malware. Not only can malware affect a single computer but also can infect the whole network. If a computer does have an antivirus program, it must keep its definitions updated simply because new malware can come into existence. By having an antivirus program that is regularly updated can greatly decrease the likelihood of the workstation becoming infected with malware.

Inside the firewall is an area known as the LAN Domain. The LAN Domain can either consist of many computers connected together or a few computers…

Cite this Document:
Copy Bibliography Citation

Related Documents

FedEx Founded in 1971, "Fedex,
Words: 2755 Length: 10 Document Type: Term Paper

Local networks in Poland and in the United Kingdom have also been built up and an utter focus has been laid on Asia. By reinvesting the funds generated, the company sustains growth through acquisitions, the development of new products and the improvement of the services provided. A result of the reinvesting process is the Package Flow Technology. This is a multi-year re-engineering of their pickup and delivery of packages. It

Spam Filtering Solution Available and
Words: 10063 Length: 35 Document Type: Term Paper

However, cursory studies that have been conducted are either biased because they seem to present a biased review of certain products or are insufficient because of their limitations and shallowness. Those studies that have been considered to be useful are mentioned below. Robert D. Boerner, Joanne Bourquard, Pam Greenberg (2000) comprehensively elaborates the legal aspect of spam. He provides an in-depth review of the present laws in actions and the

Air Traffic
Words: 28110 Length: 102 Document Type: Thesis

Air traffic has continued to increase and it now constitutes a considerable proportion of the travelling public. The amount of long-hour flights has increased significantly. Based on the International Civil Aviation authority, air traffic can be anticipated to double amid till 2020. Airline travel, especially over longer distances, makes air travelers vulnerable to numerous facets that will impact their health and well-being. Particularly, the speed with which influenza spreads and

Information Technology IT Acquisition Management
Words: 5944 Length: 14 Document Type: Business Plan

IT Acquisition Management for a new Video Shop Individual Project Activities Identification of a problem Organization: Component: Showtime Video Store Business Capture Group The problem is that there is no real information technology security measure employed in the video shop. There is very little awareness of the necessary IT security measures amongst the current management heads which is why they need an effective IT security plan and structure to implement to ensure there is no copyright infringement

Electronic Information Security Documentation During
Words: 1268 Length: 3 Document Type: Term Paper

Risk analysis projects are relatively expensive, and were so even in the mainframe computing era, because they involved the collection and evaluation of a significant volume of data. Earlier risk studies were conducted by in house staff or consultants and the in house people did not have much experience regarding the matter and the consultants did not know much about the requirements of the organization. Presently, the familiarization task has

Management and Decision Sciences From
Words: 25680 Length: 90 Document Type: Thesis

76). As automation increasingly assumes the more mundane and routine aspects of work of all types, Drucker was visionary in his assessment of how decisions would be made in the years to come. "In the future," said Drucker, "it was possible that all employment would be managerial in nature, and we would then have progressed from a society of labor to a society of management" (Witzel, p. 76). The

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now