Welcome. 1. Seminar Discussion 2. Unit 4 Review 3. Questions 4. Unit 5 Project.
Unit 2 Discussion 1_Familiar Domains
-
Upload
joseph-nichols -
Category
Documents
-
view
10 -
download
0
Transcript of Unit 2 Discussion 1_Familiar Domains
![Page 1: Unit 2 Discussion 1_Familiar Domains](https://reader035.fdocuments.in/reader035/viewer/2022072003/563dba39550346aa9aa3c1d0/html5/thumbnails/1.jpg)
[]
22014014
Name?
IS3220
Mr. ?Mr. ?
![Page 2: Unit 2 Discussion 1_Familiar Domains](https://reader035.fdocuments.in/reader035/viewer/2022072003/563dba39550346aa9aa3c1d0/html5/thumbnails/2.jpg)
Familiar Domains Name?IS3220
05 Jan 2014
There are seven domains to the IT Infrastructure typically and all IT technician will at
some point in their careers come in contact with or deal with all seven domains. The domains
that I am familiar with are; User Domain, Workstation Domain, LAN Domain and the Remote
Access Domain. I have done some work with all of these domains as an IT/Helpdesk employee
for a Construction Company which had employees located all over the U.S.
The User Domain is the most vulnerable of all the seven domains. One of the
countermeasures that I have used most of all was to verbally remind and sent emails to
employees as reminders about security awareness. A couple of other countermeasures that I
have conducted are; restricted access for a user to a company’s terminal server and monitor
abnormal employee behavior. The next Domain that I have experienced having to apply
countermeasures is the Workstation Domain. I have implemented password protection, screen
lockout policies, as well as other strict access control policies in order to help mitigate the risk of
unauthorized access to workstations and systems.
The types of countermeasures that I have deployed as part of the LAN Domain were;
ensuring that the wiring closets were secure, applied the appropriate updates and patches on
Servers/Desktops/Laptops running Windows to mitigate the vulnerabilities. The last domain that
I have had to implement countermeasures for is the Remote Access Domain. As with a local
domain access I have had to apply strict policies in place such as; the length that a password is
valid for before having to be changed, the use of passwords enforced, limiting the number of
attempts to logon before the user is locked out of their user account, strict password criteria
standards (i.e. must be at least eight characters in length using alphanumeric complexity. These
countermeasures are typically used in order to mitigate the risk or threat of a Brute-Force attack
or someone trying to guess a user’s password more than a specified number of times to gain
access to a workstation or server (Kim & Solomon, 2012).
![Page 3: Unit 2 Discussion 1_Familiar Domains](https://reader035.fdocuments.in/reader035/viewer/2022072003/563dba39550346aa9aa3c1d0/html5/thumbnails/3.jpg)
Familiar Domains Name?IS3220
05 Jan 2014
References
Works Cited
Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems Security. Sudbury,
MA: Jones & Bartlett Learning. Retrieved Jan 2014