general purpose outline for our company’s multi-layered security plan. There are seven (7) domains in a typical IT infrastructure: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. Each domain has their own unique risks, threats, and vulnerabilities that need to be mitigated in order to ensure our company’s security. In the User Domain the first thing that should be done is create an acceptable use policy (AUP). An AUP
Words: 807 - Pages: 4
Identified at least three IT infrastructure domains affected by "Internal Use Only" data classification standard. THE SEVEN DOMAINS OF A TYPICAL IT INFRASTRUCTURE 1. User Domain defines the people who access an organization’s information system. 2. Work Station Domain is where most users connect to the IT infrastructure. It can be a desktop computer, or any device that connects to your network. 3. Local Area Network (LAN) DOMAIN is a collection of computers connected to one another or to
Words: 652 - Pages: 3
NT2580 Introduction to information security | 7 Domain of IT Infrastructure Security Plan | Project Part 1 | | | [Pick the date] | As described by Tipton and Henry, information security management establishes the foundation for a comprehensive security program to ensure the protection of an organization's information assets. Security management encompasses the administrative, technical, and physical controls necessary to adequately protect the confidentiality, integrity,
Words: 889 - Pages: 4
breaches continue, more stringent policies will be installed. The Seven Domains of a typical IT infrastructure are as follows, with the corresponding security proposed for each domain. 1.) User domain proposal: Track and monitor abnormal employee behavior and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on Acceptable use policy (AUP) monitoring and compliance. 2.) Workstation Domain proposal: Use workstation antivirus and malicious code polices, standards
Words: 335 - Pages: 2
definition relates to assessing and managing IT risk within each of the seven domains of a typical IT infrastructure: User, Workstation, LAN, LAN-to-WAN, WAN, Remote Access, Systems/Applications Domains 7. Explore the structure and format of how to align risks, threats, and vulnerabilities identified from your IT infrastructure to the COBIT P09 Control Objective definition, scope, and focus areas Information, Applications, Infrastructure, and People. 8. Explore the hierarchy for assessing and managing
Words: 381 - Pages: 2
Risk Management Week 3: Assignment Question 1 of 1: Risk Mitigation Plans 1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? It is important to prioritize because you must be aware of what the risks, threats, and vulnerabilities are to your infrastructure so that you know where the most attention is needed to make 2. A quality IT Risk Mitigation Plan will include details on costs, risk prioritization, and accompanying schedule. For risk prioritization
Words: 456 - Pages: 2
Security Domains & Strategies Here a Richman Investments there are several elements that are involved in our multi-layered security plan. I'm a little new at this so bear with me. I know that there seven domains of a typical IT infrastructure. I will discuss a few general security problems and solutions to those problems. I know that the user domain is by far the weakest link. User's are responsible for their use of IT assets. A good way to avoid this is to give users proper security
Words: 399 - Pages: 2
108 Lab #8 | Design a Layered Security Strategy for an IP Network Infrastructure Lab #8 – aSSESSmENT WORkSHEET Design a Layered Security Strategy for an IP Network Infrastructure Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you designed a layered security strategy, similar to the seven domains of a typical IT infrastructure, for the Cisco Mock IT infrastructure shown in Figure 8.2. You based your design on a set of functional and technical
Words: 314 - Pages: 2
Smith May 22, 2013 Hello all. At this time we are going to discuss three out of the seven domains of a typical IT infrastructure. The three that have I chosen to discuss have the greatest impact on your day to day work lives. The domains with the most impact are the user domain (you), the workstation domain (your computer), and the remote access domain (work from home users). The information within the seven domains is meant as internal use only. We at Richman Investments take the security of our
Words: 905 - Pages: 4
Pa R T O N e Risk Management Business Challenges Risk Management Fundamentals 2 Managing Risk: Threats, Vulnerabilities, and Exploits 29 Managing Compliance 57 Developing a Risk Management Plan 85 CHaPTeR Risk Management Fundamentals 1 R ISK MANAGEMENT IS IMPORTANT to the success of every company— a company that takes no risks doesn’t thrive. On the other hand, a company that ignores risk can fail when a single threat is exploited. Nowadays, nformation technology (IT) systems contribute to the success
Words: 10618 - Pages: 43