Free Essay

Internal Data Protocol

In:

Submitted By mandie85
Words 453
Pages 2
Mandie Brayley
NT2580 – Intro to Info Sec
Unit 1 Assignment 2: Impact of a Data Classification Standard

When you hear Internal Use Only, the first thing that seems to pop into your head would be that any data transferred has to stay inside wherever the domains are. While there are seven IT infrastructure domains, there are only three that are actually affected by the “Internal Use Only” data standard. These domains are the user domain, workstation domain and the LAN domain. As with all infrastructures these domains have their own tasks and responsibilities.
The user domain is the first layer of the IT infrastructure defense system. This domain is used to access systems, applications, data and more. You will also find the AUP or Acceptable Use Policy here. The AUP is a policy tells the user what they are and are not allowed to do with any organization-owned IT equipment. This domain is affected by the Internal Use Only standard because it is the first partition of the IT Infrastructure.
After the user domain, we have the workstation domain. This domain is used to configure hardware and hardening systems. Hardening systems is the process of ensuring that controls are in place to handle any known threats. This process is done by ensuring that the infrastructure has all the latest software revisions, security patches, and systems configurations. But these aren’t the only things that go on in the domain, this is also where the antivirus files are verified. While you would think that this would be a good place this domain needs additional layers of defense because multiple users can access the workstation domain. A way this can be done is by implementing workstation Logon ID’s and passwords. This way any user that is attempting to use the workstation domain has to verify who they are and their credentials.
This is also done in the LAN Domain. However, in the LAN domain sometimes a second level authentication is required. While this may seem complicated it is in fact really easy to do, you are just required to verify who you are for a second time, possibly with a different procedure. The LAN domain includes mostly the physical configurations and components; such as the cabling, NICs (Network Interface Card), LAN switches and WAPs (Wireless Access Points). Also included here is a master list of all the user accounts and their access rights.
These three domains are the ones that are most directly affected by the “Internal Use Only” data standard. This means that the User, Workstations and LAN domains are used to share information or data internally by its organization and this communication is not intended to leave the organization for any reason.

Similar Documents

Free Essay

Nfc-11-V1-0-Mwallet-Pos-Proposal-

...GSM Association Official Document NFC.11 - Wallet-POS Proposal Non-confidential Wallet-POS Proposal Version 1.0 03 May 2013 This is a Non-binding Permanent Reference Document of the GSMA Security Classification: Non-confidential Access to and distribution of this document is restricted to the persons permitted by the security classification. This document is confidential to the Association and is subject to copyright protection. This document is to be used only for the purposes for which it has been supplied and information contained in it must not be disclosed or in any other way made available, in whole or in part, to persons other than those permitted under the security classification without the prior written approval of the Association. Copyright Notice Copyright © 2013 GSM Association Disclaimer The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained in this document may be subject to change without prior notice. Antitrust Notice The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy. V1.0 Page 2 of 32 GSM Association Official Document NFC.11 - Wallet-POS Proposal Non-confidential Table of Contents 1 Introduction 1.1 System Overview...

Words: 5927 - Pages: 24

Premium Essay

Week 5 Assignment

...so far about local area networks technologies. 1. Describe the three modes of communication available on a network. (Minimum word count: 60) Simplex Data travels in only one direction, similar to a public address (PA) system. Half-duplex Data travels in two directions, but in only one direction at a time, similar to a walkie-talkie. Traditional shared Ethernet uses half-duplex transmissions. Full-duplex Data travels in two directions simultaneously, similar to a phone conversation. Full-duplex Ethernet (or switched Ethernet) supports full- duplex transmissions in a switched environment. 2. List the seven layers of the OSI model, including both layer number and name for each. (Minimum word count: 20) The OSI/RM consists of the seven layers Application 7, Presentation 6, Session 5, Transport 4, Network3, Data Link 2, and Physical 1. 3. Describe a protocol data unit (PDU). (Minimum word count: 30) The PDU consists of the payload and the header from that layer. The next layer then treats the PDU from the previous layer as the payload, adds its header (creating a new PDU), and transferring it to the next layer. 4. List three practical functions of the OSI model. (Minimum word count: 60) The OSI/RM has three practical functions:  It gives developers necessary, universal concepts so they can develop and perfect protocols that can work with operating systems and network products developed by other vendors.  It explains the framework used to connect different types of systems...

Words: 481 - Pages: 2

Premium Essay

Week 5 Assignment

...communication channel can only send information in one direction. Half-duplex operations are capable of sending information in both directions between nodes, but only one direction can be utilized at a time. Full-duplex operation is a connection between two devices and is capable of sending information in both directions simultaneously. 2. List the seven layers of the OSI model, including both layer number and name for each. (Minimum word count: 20) The Open Systems Interconnect (OSI) model has seven layers. The application, presentation, session, transport, network, datalink, and physical layers. 3. Describe a protocol data unit (PDU). (Minimum word count: 30) A protocol data unit (PDU) is an open system interconnection term use in telecommunications that refers to a group of information added or removed by a layer of the OSI model. Each layer uses protocol data unit (PDU) to communicate and exchange information, which can only be read by peer layer on the receiving device. 4. List three practical functions of the OSI model. (Minimum word count: 60) The OSI practical functions are it describes the process of packet creation. It also explains the framework used to connect different types of systems, meaning it...

Words: 500 - Pages: 2

Premium Essay

Nt1310 Unit 3 Assignment 1

...III. SECURITY IN WIRELESS SENSOR NETWORKS A. Protocol Stack: The protocol stack consists of physical layer, data link layer, network layer, transport layer, application layer, power management plane, mobility management plane and task management plane. The physical layer is responsible for modulation, transmission, and receiving techniques and data encryption. The data link layer manages the multiplexing of data streams, data frame detection, medium access and error control. The network layer takes care of routing the data supplied by the transport layer. The transport layer helps to maintain the flow of data and the application layer is used to build different types of application software. Fig. 3. WSN Protocol Stack The protocol stack combines power and routing awareness, integrates data with networking protocols, communicates power efficiently through the wireless medium, and promotes cooperative efforts of sensor nodes. The power, mobility, and task management planes monitor the power, movement, and task distribution among the sensor nodes....

Words: 884 - Pages: 4

Premium Essay

Network Security

...Fundamental Principles of Network Security By Christopher Leidigh White Paper #101 Executive Summary Security incidents are rising at an alarming rate every year. As the complexity of the threats increases, so do the security measures required to protect networks. Data center operators, network administrators, and other data center professionals need to comprehend the basics of security in order to safely deploy and manage networks today. This paper covers the fundamentals of secure networking systems, including firewalls, network topology and secure protocols. Best practices are also given that introduce the reader to some of the more critical aspects of securing a network. 2005 American Power Conversion. All rights reserved. No part of this publication may be used, reproduced, photocopied, transmitted, or stored in any retrieval system of any nature, without the written permission of the copyright owner. www.apc.com Rev 2005-0 2 Introduction Securing the modern business network and IT infrastructure demands an end-to-end approach and a firm grasp of vulnerabilities and associated protective measures. While such knowledge cannot thwart all attempts at network incursion or system attack, it can empower network engineers to eliminate certain general problems, greatly reduce potential damages, and quickly detect breaches. With the ever-increasing number and complexity of attacks, vigilant approaches to security in both large and small enterprises are a...

Words: 5831 - Pages: 24

Premium Essay

Computer

...type of the network. Most common hubs interconnect Category 3 or 5 twisted-pair cable with RJ-45 ends, although Coax BNC and Fiber Optic BNC hubs also exist. The hub is considered the least common denominator in device concentrators. Hubs offer an inexpensive option for transporting data between devices, but hubs don't offer any form of intelligence. Hubs can be active or passive. An active hub strengthens and regenerates the incoming signals before sending the data on to its destination. Passive hubs do nothing with the signal. Ethernet Hubs An Ethernet hub is also called a multiport repeater. A repeater is a device that amplifies a signal as it passes through it, to counteract the effects of attenuation. If, for example, you have a thin Ethernet network with a cable segment longer than the prescribed maximum of 185 meters, you can install a repeater at some point in the segment to strengthen the signals and increase the maximum segment length. This type of repeater only has two BNC connectors, and is rarely seen these days.   8 Port mini Ethernet Hub The hubs used on UTP Ethernet networks are repeaters as well, but they can have many RJ45 ports instead of just two BNC connectors. When data enters the hub through any of its ports, the hub amplifies the signal and transmits it out through all of the other ports. This enables a star network to have a shared medium, even though each computer has its own separate cable. The hub relays every packet transmitted by any computer...

Words: 3676 - Pages: 15

Free Essay

Auditing Report

...To From Subject Course Date Mr. R. Nijland Luuk Harleman (2430113) Business case Auditing Report 26th of March 2013 luukharleman@gmail.com (243011) 2 Executive Summary In the following case a business process is described of a particular subject which is discussed during the lectures of the APM course. The choice was to write one from your own experience or from an existing company. I chose an existing company since you can keep an interview and it will be easier to identify the current situation and to draw up a “plan for the future” which will contain some adjustments and benefits the company. The company I chose is an advertisement agency which focuses on online graphical design and target group analysis to efficiently meet today’s customer demands. luukharleman@gmail.com (243011) 3 Table Of Contents Executive Summary ................................................................................................................................ 3 1.Company Analysis ................................................................................................................................ 5 Organisation chart ............................................................................................................................... 5 Brief outline ......................................................................................................................................... 5 Products.....................................................

Words: 3141 - Pages: 13

Premium Essay

Patton Fuller Community Hospital Network Analysis

...an ever growing issue. Hospitals, doctor’s offices, urgent care clinics, and pharmacies all must implement technology and network strategies in order to stay current, practice safe procedures, and to stay ahead of the ever-changing rules and government regulations put on the health care industry. Patton-Fuller Community Hospital is no exception to this. Even though they are not a giant, metropolitan based, hospital with multiple locations, they are still a rather large operation with technology and network needs in relation to the industry participated in. Internal and External Data Transmission Hospitals, by nature must communicate data both internally and externally with precise accuracy and efficiency. Internal networks must transmit data to outside networks at other hospitals, pharmacies, doctor’s offices, and other health care institutions in order to maintain a level of patient data accuracy and availability. Patton-Fuller Community hospital uses networks that run on CAT6 and Fiber Cable. CISCO routers allow for VPN access at terminals within the hospital, however wireless networks are kept to a minimum to avoid network security issues. CISCO routers such as these allow for maximum network speeds at minimal...

Words: 2044 - Pages: 9

Premium Essay

Nt1310 Unit 6 Certificate Authority

...They are protocols used to improve security in the network. X.509 certificates are used and uses asymmetric-key algorithm. Once a session is established using this protocol, to and fro communication is encrypted. These protocols are used widely for several applications like mail, VoIP, messaging etc. It is highly secure as it uses session keys for each session. Even if a particular session has been compromised, the earlier conversations cannot be retrieved. It has long term public secret key and short term key for the sessions. Since these protocols use X.509 certificates, it requires CA and PKI to verify the users and to issue certificates. TLS/SSL protocols are called for at the session layer and it performs at the presentation layer. Layer 5 initiate the session along with the cipher settings and session key. Layer 6 encrypts the data using the cipher and session...

Words: 1504 - Pages: 7

Premium Essay

Impact of Data Classification Standard

...Impact of Data Classification Standard and Internal Use Only Data classification standard provides the means of how the business should handle and secure different types of data. Through security controls different data types can be protected. All these security controls should apply to each of every IT infrastructure in which it will state how the procedures and guidelines will guarantee the organization’s infrastructures security. This report will identify the definition of “Internal Use Only” data classification standard of Richman Investments. Internal Use Only includes information that requires protection from unauthorized use, disclosure, modification, and or destruction pertaining to a particular organization. This report will tackle 3 IT infrastructure including workstation domain, LAN-Wan Domain, and Remote Access Domain. Internal Use Only data includes data related to business operations, finances, legal matters, audits, or activities of a sensitive nature, data related to stake holders, information security data including passwords, and other data associated with security related incidents occurring at the business company, internal WCMC data, the distribution of which is limited by intention of the author owner or administrator. For the Workstation Domain, the impact of data classification standard internal use only can possibly applied when a user violates AUP and generates security hazard for the establishment’s IT infrastructure. In order to prevent something...

Words: 596 - Pages: 3

Free Essay

Firewalls: Guidelines and Procedures

...networks employ firewalls to restrict connectivity to and from the internal networks used to service more sensitive functions, such as accounting or personnel. By employing firewalls to control connectivity to these areas, an organization can prevent unauthorized access to its systems and resources. Inclusion of a proper firewall provides an additional layer of security (Broida, 2011). This research paper will give a background on firewalls. The background will cover an overview of firewall technologies, as well as firewall technologies, the common requirements of firewalls, and firewall policies. This paper will also give an analysis of firewalls which will consist of what I have learned in doing this research and my opinion on the research. Overview of Firewall Technologies Several types of firewall technologies are available. One way of comparing their capabilities is to look at the Transmission Control Protocol/Internet Protocol [TCP/IP] layers that each is able to examine. TCP/IP communications are composed of four layers that work together to transfer data between hosts. When a user wants to transfer data across networks, the data is passed from the highest layer through intermediate layers to the lowest layer, with each layer adding more information. The lowest layer sends the accumulated data through the physical network, with the data then passed upwards through the layers to its destination. Simply put, the data produced by a layer is encapsulated in a larger container by...

Words: 3077 - Pages: 13

Premium Essay

Mobile Net

...Report on the use of Firewalls in Network Security Introduction: A firewall is defined as a piece of software or hardware used to enforce network security policies by monitoring both internal and external network traffic ensuring that unwanted access or data is prohibited. Most of the modern firewalls that are used today are software based solutions however some exist as hardware solution with embedded software logic. Many authors on firewall technologies are of the opinion that the firewall acts as a bridge between a private internal network and external networks such as the internet. The primary functions of a firewall are as follows: * It limits the entry points to a network * Prevents malicious software or individuals from entering the private network * It limits the exit points from the network Since all traffic leaving and entering the internal network the firewall is considered to be the single most important tool to be used to protect a network. It allows the network administrators to know exactly the state of the network security. Currently, there are different types of firewall implementation. These ranges from dedicated routers and switches with embedded software to a single dedicated host computer with appropriate software. A firewall does not exist as a single piece of hardware solution. In fact, it is the software that is hosted by the hardware that is capable of carrying out the appropriate analyses of the network traffic to ensure that the...

Words: 2370 - Pages: 10

Premium Essay

Cit 383

...Network Layer: transport layer relies on the network layer (3) to provide host-to-host communication. There’s a piece of network layer in every host and router in the network. Transport segment from sending to receiving host. On sending, Host 1 encapsulates segments into datagrams. On receiving, Host 2 delivers datagrams to transport layer. Protocols in every host, router. Router examines header fields in all IP datagrams passing through it. Moves packets from sending to receiving hosts. Routers: forwards datagrams from input links to output links, done by using destination IP address in datagram header, which indicates target network. (Network layer functions=forwarding and routing) Transport Layer: provides process-to-process communication (layer 4). Only resides on end systems. Network devices: hub, bridge/switch, router. End-System: computer. Encapsulation: (send) Forwarding (switching): transfer of packet from incoming link to outgoing link within a single router. Routing: involves all of a network’s routers whose collective interactions via routing protocols determine paths (routes) that packets take from source host to destination. Router: connects networks together, forwards packets, filters traffic, path selection, connects layer 1&2 technologies(UTP cable to fiber, Ethernet to WiFi/frame relay/ATM), (connects IP subnets/IP broadcast domains together), finds destination IP address in header, looks up IP address in forwarding table to find router’s output port, sends...

Words: 2483 - Pages: 10

Premium Essay

Nt1310 Unit 5 Assignment 1

...can be overcome by fixing the initial sender node as non-malicious. The proposed approach is able to overcome from external as well as internal attacker problems is group synchronisation. The external attacks are resolved with the help of MAC message authentication codes and the use of private keys and the internal attacks is finding out on the basis of send and receive time. Fei et...

Words: 1335 - Pages: 6

Premium Essay

Video Conferencing

...more, we also have to deal with the forthcoming media-enabled 3G mobile phone and how this links in with existing systems. This document explains what these standards, terminologies and buzz-words mean, how they relate to the various communications infrastructures of video conferencing and how they relate to each other. It is assumed that the reader has a general knowledge of Video Conferencing systems. However, the following technical papers are available to provide more information: * How do I choose a Video Conferencing system? * H.323 Terminals, Gatekeepers, Gateways & MCUs. * Global Dialling Scheme (GDS) for Schools VideoConferencing. * H.323 Dial Plan and Service Codes used by Gatekeepers etc. * IP Ports and Protocols used by H.323 Devices. * Cost Efficient ISDN Conferencing, including Multipoint Access. * H.221 Framing used in ISDN Conferences. International Telecommunications Union & The Internet Engineering Task Force. Telecommunications standards are set by the United Nations agency, International Telecommunications Union (ITU)and the Internet Engineering Task Force (IETF). Products that adhere to these standards allow users to participate in a conference, regardless of their platform. These standards for desktop video conferencing ensure compatibility on a worldwide basis. The ITU has developed the H, G and T Series of standards whilst the IETF has developed...

Words: 5144 - Pages: 21