Wednesday, March 6, 2019
Introduction to Information Security Essay
Security Domains and StrategiesSafety of data and information is a actually important aspect of a company. Before we can create an blueprint for general tribute solutions we essential first define what is needed. I pep up that we use a multi-layered security proposal. There are a get along of seven mankinds of an IT infrastructure including substance abuser domain, workstation domain, LAN domain, LAN-to- sick domain, WAN domain, remote approaching domain, and system/application domain. User domain is es displaceially the people who admission price the information system. User domains tend to receive risk due to the users carelessness due to lack of sentiency, not caring for policies, and security violations. These can easily be rectified with training. Conduct security awareness training, display security posters around the office, and send email reminders to keep the policies impudently in the employees mind. Another common threat is caused by employee defame of the s ystem. Employees might insert USB drives, or download photos music and videos. These items might chasten viruss which in turn damages the system. The USB ports should be change and content filtering and antivirus scanning should be enabled. Workstation domain is any device that connects to the network. A few threats might be encountered are unlicenced approach to the workstation and unofficial access to applications and data. These issues can be mitigated simply by change password protection on workstations and by defining strict access control policies. LAN domains are a collection of computers connected to wiz another. Threats for LAN domains include unauthorized access to the LAN, and unauthorized access to systems applications and data. The solutions for these threats are similar to that of the workstation domain. Another major threat are confidentiality of data transmissions via wireless local area network connections is compromised.Implementation of encryption between w orkstation and WAP is crucial. LAN-to-WAN domain is where the infrastructure links to a wide area network and internet. A few issues include unauthorized network inquisitory and port scanning. To resolve this issue disable ping, probing and port scanning on all exterior IPdevices within the domain. Another major issue is unauthorized access through the LAN-to-WAN domain. plainly applying strict security monitoring controls for intrusion and detection and preventing would solve this problem. WAN domains connect remote locations. For these qualitys of domains it is easy for open, public and accessible to anyone that wants to connect. Create unfermented laws regarding unauthorized access to the systems, malicious attacks on the infrastructures and financial loss due to malicious outages. Another issue is that most internet traffic is sent in clear text. To prevent this prohibit using the internet for confidential communications without encryption and VPN tunnels. Remote access do main connects remote users to the infrastructure. Threats for this type of infrastructure are brute force user id and password attacks, octuple logon retries and access control attacks. To stop this from occurring creates user id and password policies requiring periodic changes. stack up automatic blocking for attempted logon retries. System/application domain holds all the critical systems, applications and data. Unauthorized access to data centers, computer cortege and wiring closets is a major issue for this domain. Apply policies, standards and procedures for staff and visitors. The servers mustiness sometimes be shut down to perform maintenance. Create a system that brings together servers, storage and networking. These are a couple things that I have outlined that would make this multi-layered security plan a success. We must know the various threats for each layer and how to resolve each layer. This plan will greatly save the company money as closely as lawsuits due to i nformation leakage.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment