• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Seven Domains of IT Infrastructure

Extracts from this document...

Introduction

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain. Each of these domains is viewed as portals for attackers if countermeasures are missing or fail. It is very imperative for businesses to protect each of these seven domains. It only takes one unprotected domain for an attacker to gain access to private data. The User Domain is comprised of individuals that are often not aware of the tricks of attackers. For example, networks usually have strong passwords that one must know in order to gain access to the Internet. Nevertheless, social engineers can persuade individuals to give out personal information such as passwords and other types of private information. ...read more.

Middle

Not only can malware affect a single computer but also can infect the whole network. If a computer does have an antivirus program, it must keep its definitions updated simply because new malware can come into existence. By having an antivirus program that is regularly updated can greatly decrease the likelihood of the workstation becoming infected with malware. Inside the firewall is an area known as the LAN Domain. The LAN Domain can either consist of many computers connected together or a few computers connected together. If measures aren't taken to protect the LAN Domain, attackers will easily gain access to the system. The computer systems are all connected by hubs, switches, and routers. Computer systems connected by hubs contribute to sniffing attacks. ...read more.

Conclusion

If the data is left unprotected, attackers will have the potential to attack the system. The WAN instead of the LAN is used as the Internet for most businesses. Given this condition, it is very important for businesses to maintain security on all systems for two reasons. First, the WAN is an untrusted zone. Second, the Internet is also an untrusted zone that is composed of hackers. Therefore, it is highly recommended that businesses keep all systems heavily secured in order to prevent attackers from gaining access. Last but not least, the System/Application Domain consists of servers that must be protected. Several steps must be taken to keep attackers from gaining access to the System/Application Domain. First, all services and protocols that are not used should be removed. Second, new passwords should be formed. Third, the server system should be updated. Last, all firewalls should be turned on. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. LAN & WAN Protocols

    STMP - Simple Mail Transfer Protocols is currently the most used protocol. It can send and receive e-mail over the internet. It is commonly known as a SMTP. ADSL ADSL which stands for Asymmetric Digital Subscribers Line is a high speed transmission protocol.

  2. Introduction to Viruses

    code will cause over $21 billion in economic damages in 2002, and over $54 billion by the year 2006. Antivirus solutions are expected to approach $1.5 billion by year end 2002, and grow to over $5.2 billion by 2006. Anti-Spam revenues are expected to top $88 million in 2002, and surpass $180 million by 2006.

  1. Smart Card System

    For some protocols, we create one access list to filter inbound traffic, and one access list to filter outbound traffic. To create an access list, we need to specify the protocol to filter, we assign a unique name or number to the access list, and we define packet-filtering criteria.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    Annotate the code clearly. One file will be sufficient at this stage and in a database there is no need for normalisation. (a) implement the proposed solution (The implementation should include an outline solution, with modular blocks set up with links, with at least one module being taken to a working end.

  1. The seven layer osi model

    Not all forms of encryption take place on the 6th layer as some may take place further down the line. Compression is another process that can be undertaken by the presentation layer. The reason this is used is to increase the actual data throughput of the system.

  2. File transfer protocols

    Writeln( 'Menu') End; (* Menu *) (* 0 - Songs *) (* calls Set_Up to load song details into the table, Process_Votes to input votes and collate them, and Menu to offer options *) Var Songs_Table : Songs_Table_Type; Total_Votes : PosInt; Begin (* Songs *)

  1. Operating Systems

    bills from customer records, the compilation of high level language programs where a number of users want programs compiled. An example of batch processing: Consider the example of an Internet bank. At the end of every month it might prepare everyone's bank statements and then email all of their customers,

  2. Flexible Architectures in Communication Security Application

    The trend towards virtual private networks (VPNs) [15] and secure IP (IPSEC) [3] will further emphasize the significance of cryptographic processing among all types of communication. Security-related processing can consume as much as 95 percent of a server's processing capacity [25].

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work