Page
  1. 1
    1
  2. 2
    2
  3. 3
    3

The Seven Domains of IT Infrastructure

Extracts from this document...

Introduction

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain. Each of these domains is viewed as portals for attackers if countermeasures are missing or fail. It is very imperative for businesses to protect each of these seven domains. It only takes one unprotected domain for an attacker to gain access to private data. The User Domain is comprised of individuals that are often not aware of the tricks of attackers. For example, networks usually have strong passwords that one must know in order to gain access to the Internet. Nevertheless, social engineers can persuade individuals to give out personal information such as passwords and other types of private information.

Middle

Not only can malware affect a single computer but also can infect the whole network. If a computer does have an antivirus program, it must keep its definitions updated simply because new malware can come into existence. By having an antivirus program that is regularly updated can greatly decrease the likelihood of the workstation becoming infected with malware. Inside the firewall is an area known as the LAN Domain. The LAN Domain can either consist of many computers connected together or a few computers connected together. If measures aren't taken to protect the LAN Domain, attackers will easily gain access to the system. The computer systems are all connected by hubs, switches, and routers. Computer systems connected by hubs contribute to sniffing attacks.

Conclusion

If the data is left unprotected, attackers will have the potential to attack the system. The WAN instead of the LAN is used as the Internet for most businesses. Given this condition, it is very important for businesses to maintain security on all systems for two reasons. First, the WAN is an untrusted zone. Second, the Internet is also an untrusted zone that is composed of hackers. Therefore, it is highly recommended that businesses keep all systems heavily secured in order to prevent attackers from gaining access. Last but not least, the System/Application Domain consists of servers that must be protected. Several steps must be taken to keep attackers from gaining access to the System/Application Domain. First, all services and protocols that are not used should be removed. Second, new passwords should be formed. Third, the server system should be updated. Last, all firewalls should be turned on.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. File transfer protocols

    Thus the subprogram will expect to receive the name of a variable of the required type where it is to store the returning value. The subprogram call must contain a data value (of a suitable type) for each corresponding parameter in the subprogram heading.

  2. The seven layer osi model

    However, we have looked at the main functions of the presentation layer and two of them, compression and encryption play a massive part overall. But do we really need this? That is a very open ended question. Not all people wish to use these methods and hence the reason was to why they are optional.

  1. LAN & WAN Protocols

    Very important protocol when using the internet. Internet actually depends on it. It stands for Transmission Control Protocol. UDP - Similar to the TCP protocol internet also depend on it. Stands for User Datagram Protocol, allow the transmission of the data without it being acknowledged by the receiver.

  2. Smart Card System

    c) The server will wait if there is any request from the client to read from the database. The proposed system is mainly consists of three different kinds of user, namely, students, staffs and supervisor. All these levels of user will have their own roles and responsibilities towards the proposed system.

  1. Operating Systems

    The main thing to remember is that the output from a batch processing run isn't immediate. * Real-time A real-time O.S. is one which can react quickly enough to affect the next input, or process to be carried out. Most real-time systems are based on control of some process in the real world or on information handling.

  2. Flexible Architectures in Communication Security Application

    Digital signatures authenticate the sender. Since only the person holding the private key knows its value, only that person can create a digital signature that others can decrypt with the public key. Figure 1. Public-Key and Secret-Key Ciphers. F(x) G(x) G(x) G(x) Public-Key Cipher Secret-Key Cipher plaintext ciphertext plaintext plaintext ciphertext plaintext public key private

  • Over 180,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work

Marked by a teacher

This essay has been marked by one of our great teachers. You can read the full teachers notes when you download the essay.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the essay page.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review under the essay preview on this page.