Through my research I have found three basic domains that are affected by the “internal use only” data classification standard. What I would like to discuss in this report addressing IT infrastructure is how these three domains are affected. I will be discussing the User Domain, Workstation Domain, and LAN Domain and will cover everything from the end user to the internet.
The User Domain controls who has what access to what information within the organization and enforces the APU or Acceptable Use Policy. The APU only allows the user to access or work within the set parameters of what has be set as acceptable use. This is the weakest point in the IT infrastructure and it is the user’s responsibility act with integrity around this domain.
The Workstation Domain is where the user is able to access the company network and use resources that are not on their host station. This is to allow the worker to easily be able to get the data or applications they may need. For the company’s network’s security usually the IT departments will set up user names and passwords or can allow access through managing the active directory. They will also have anti-virus protection as well as undergo regular updates and scans. Since this would be a company network it would be not acceptable to have personal devices on the network unless preauthorized by management.
The Essay on Client Version Domain User Security
Winders NT Security NT was introduced in 1993 and quickly became a popular platform for client-server environments. NT is based on 32-bit architecture so it provides many features like multi-tasking, resource sharing and high availability of resources. NT provides increased security over older operating systems like Windows 9 x and UNIX. NT has both server and client versions. The client version ...
The LAN Domain is the big picture of what the company network has. It is a collection of all the host and devices on the network and also including all the physical networking of the company’s network. The LAN Domain needs to be very secure due to the vast amount of components involved. One of the biggest threats can be as simple as unauthorized access on the company’s local area network.