...This is a multi-layered security plan. First, Assign people that are fully trained and/or provide the training that makes it possible to do the job. To prevent malicious software and etc. in the 7 domains of an IT infrastructure, you can isolate and install preventions for each domain. The domains are as follows: User Domain, Workstation Domain, LAN Domain, and LAN to WAN Domain, Remote Access Domain, WAN Domain, and the System/Application Domain. The first part of the IT infrastructure is the User Domain. It is the weakest link in the IT infrastructure and this is where the users connect to the system. You can make the user aware to the risks and threats that they are susceptible to by holding an Awareness Training session. The system is password protected however; you should change passwords every few months to prevent an attack. Also, log the users as they enter and exit the system to make sure there’s no unauthorized access. While it’s the company’s choice to allow employees to bring in USB/Removable drives, you have a threat to someone obtaining the wrong information, or getting malicious software into the system. If you allow the USB/Removable drives, have a virus scan every time someone inserts one into a company computer. In a Workstation Domain, you need to make sure virus protection is set up. You are protecting administrative, workstations, laptops, departmental workstations and servers, network and operating system software. You can enable password protection and...
Words: 683 - Pages: 3
...Matt Carlson IT255.XM1.10WTR Instructor Vincent Tran January 9, 2010 Learner Outcome Project Virtual Lab 1 1. Open the Server Manager console on your Windows Server 2008 computer. What selections are available to you in the left pane? The selections available to me include: Roles, Features, Diagnostics, Configuration, and Storage. 2. Using the Windows Help option, describe any roles and features that are currently installed on this server. There are currently no Roles or Features installed on the server. 3. Explain in your own words why it is a best practice to configure a server, such as a DNS server, with a static IP address rather than allowing it to obtain an IP address using DHCP. To put it simply, if the IP address of the server is consistently being changed by DHCP, then the ports that were opened up to allow the server to work through the firewall are going to be remain opened on the server’s old address, and not necessarily on the new one. This could cause applications to not run properly or at all, but worse, could create security vulnerabilities for the network. A static IP address allows other workstations on the network to easily keep track of the server. 4. Explore the netsh command menus. Record three commands that you can issue from the command line using netsh, and describe what each command does. 1. Exec- runs a script file 2. Add- adds a configuration entry to a list of entries 3. Online- sets the current mode...
Words: 3462 - Pages: 14
...Kendall Jones IT255 Information System Security Mrs. Scales Feb 29, 2012 Project 2 This policy establishes requirements and guidelines concerning to ensure that only appropriate personal are granted access to sensitive information or system privileges. Systems users are considered to be anyone that has access to assets. Users are expected to comply with LSB policies, standards, and procedures. Users are responsible for familiarizing themselves with any special requirements for accessing, protecting and using data including privacy act requirements copyright requirements and procurement-sensitive data. Users are also responsible for reporting any suspected or actual computer incidents immediately to an appropriate incident response control. Systems administrators are considered to be anyone that has responsibility for maintaining the operation and security posture. Administrators are responsible for ensuring that appropriate access privileges are implemented and enforced. Cryptography is used to protect data that is sensitive has a high value or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Encryption transforms data into cipher text before transmission of storage and decryption transforms the data back into plaintext. Symmetric encryption algorithms operate on blocks of data of fixed size and the same cryptographic key that is used to encrypt the information to be protected is also used to decrypt...
Words: 359 - Pages: 2
...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...
Words: 4114 - Pages: 17
...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...
Words: 4296 - Pages: 18
...Richard Ridgley IT255 LAB 2 Assignment #2 Microsoft Environment Analysis Windows Laptops Back up your Data: It's important that you regularly archive your documents, folders, and settings so that you can retrieve the data if your laptop is stolen or the hard disk fails. How often you should back up your files depends on the number of files you create, how often you create them, and how often you change them. If you create files every day, you might want to back them up weekly or even daily. You can back up your data to a CD or DVD, a USB flash drive, or another computer if your laptop is on a network. It's best to schedule regular, automatic backups that run even while you're working on your laptop. Data Encryption: helps defend against misuse of information if your computer is stolen. Data encryption scrambles the contents of a message or file so that it can be read only by someone who has the appropriate encryption key to unscramble it.You can encrypt a subset of files or folders, or an entire disk. Doing this can help protect the data stored in files and folders, the operating system, and any installed programs. Anti-Theft Device: One of the easiest and most cost-effective ways to help secure your laptop is to use a security cable, with or without an alarm, to attach your laptop to a stationary object. Most laptops have security slots in the side or the back of their case. Use a security cable wherever you leave your laptop...
Words: 608 - Pages: 3