Free Essay

7 Domains

In: Computers and Technology

Submitted By samcrushem
Words 272
Pages 2
Securing LAN
One way to secure your LAN connection is to use a separate network for your LAN. If you use a TCP/IP protocol for any of your network adapters you are connected to the internet and are open to unwanted visitors. It is simple to prevent this threat of becoming an easy attack point for hackers. Open the TCP/IP properties and uncheck the Client for Microsoft Networks and the File and Printer Sharing, also uncheck the Microsoft Family Logon.
Other way your LAN can be attacked is from the inside. It can be as simple as an attacker gaining access to the wiring closet. It is very important to make sure that your wiring closet is secure using some type of ID access, being ID card, Finger Print, or combination code. For the best method I would recommend using a at least two of these access methods.

Securing WAN
One threat to your VAN is eavesdropping; this is where a hacker uses software to intercept the data being via the WAN. To prevent this from being a problem for your company you want to use an encryption and VPN tunnels for end-to-end secure IP communications. The administrator should create a data classification standard and the policies, procedures, and guidelines should always be followed.
Another way to protect your WAN is to apply filters to your exterior IP stateful firewalls and IP router WAN interfaces to block TCP SYN and ICMP. The network administrator should contact the ISP to put the proper filters on its IP router WAN interfaces in accordance with CERT Advisory CA-1996-21.

Similar Documents

Premium Essay

7 Domains of It Infrastructure

...Purpose Business Continuity / Disaster Recovery program is implemented to ensure that ITT-Tech capability to respond to and reduce the effect(s) of incidents that may impact the ability of one or more of the of it’s locations ability to carry out normal activities. Business Continuity and Disaster Recovery Plans shall identify and address critical events that have the potential to cause materially adverse consequences. Scope The school Information Services Business Continuity / Disaster Recovery program is applicable to each it’s functional organization. This document along with other documents, will provide guidance for all departments to; • determine their exposures to loss of business activities by conducting Business Impact Analysis and Risk Assessment(s), • to develop Business Continuity and Disaster Recovery plans • to maintain those plans using provided or similar documents meeting the intent of the Business Continuity Program. Objective Objective of the Business Continuity program is to ensure that each functional unit has evaluated business conditions and developed plans which will enable it to survive business-interruption events and continue operations at an acceptable level until normal operations can be restored. Responsibility Designated leaders are responsible for implementing, developing and maintaining the Business Continuity program for their operational area. Systems and Operations continuity......

Words: 263 - Pages: 2

Free Essay

7 Domains of a Typical It Infastructure policy will touch 3 main domains: User, Workstation, and Lan Domains. The “Lan Domain”, this domain will be protected by limiting access to the companies infrastructure. This will include but will not be limited to: Background checks on any and all field support technicians, and limited access for all employees to data closets and server rooms (i.e. locked doors, fingerprint scanners, etc.). These precautions will help insure the integrity of the network at the lowest level. The “Workstation Domain”, this domain includes all company workstations. Only workstations approved by and set up by the company will be allowed on the network. Absolutely NO PERSONAL DEVICES will be allowed on the network without explicet permission from IT and these devices will be set up as to allow IT full access to all files and folders on the device at any given time should the need arise. All workstations will be updated, patched, and scanned regularly. All users using these workstations will be required to first be approved by management to have an account set up. Then the user will be given a username and passcode that must meet standard strong password parameters. Removable media will not be permitted unless provided by the company for official use only. Lastly AD groups will be used to control which users have access to what data on the network to ensure only users with proper authorization will have access to data in question. The “User Domain” will use an “Acceptable Use...

Words: 493 - Pages: 2

Free Essay


...The Big Book of Huddle Energizers Ideas to enliven your huddle Contributed by employees of Citibank Singapore Table of Contents Service Value # 1 – Make Each Interaction Personal ................................................. 6  Energizer: Hebrew Numerology ................................................................................... 6  Energizer: Brain Teaser ............................................................................................... 9  Energizer: Human Treasure Hunt............................................................................... 10  Energizer: Secret Hat Trick ........................................................................................ 11  Energizer: Accentuate the Positive............................................................................. 11  Energizer: Name Game.............................................................................................. 11  Energizer: Heart to Heart ........................................................................................... 11  Energizer: Guess my Body Language ........................................................................ 11  Energizer: How to Say Hello in Different Languages ................................................. 12  Energizer: Good Morning Game ................................................................................ 12  Service Value # 2 – Maintain A Professional Image ...................................................

Words: 24325 - Pages: 98

Free Essay


... TM Now wait for 45 seconds. 30 15 Let’s do it! 1. 6. - Click once when ready. seconds left 20 35 42 41 43 44 45 2 1 3 4 5 2. 3. 4. 5. - 7. That was 8. easy! 9. 10. © Tim Pettry, 2008 Take 45 seconds to memorize these new symbols for the numbers 1 – 10. X TM Write down as many of the new symbols as you can remember? Click when ready To check answers © Tim Pettry, 2008 TM Check your answers 1. 6. - 2. 3. 4. 5. © Tim Pettry, 2008 7. 8. 9. 10. - X Click to discuss when ready TM Click Discussion How many people got all 10 symbols correct?       9? 8? 7? 6? 5 and below?   Were you distracted by the countdown on the left? Are there ever distractions when we are trying to learn? © Tim Pettry, 2008 TM Click Discussion continued Which symbols do most people get right?      1 – due to repetition 10 – Its different and it represents the Roman numeral “10” 5 – Its different 7 – Its similar to the number 7    Most people look for a pattern and have difficulty finding it in a short amount of time. We are looking at the pieces rather than the whole. This is sometimes referred to as “Silo Thinking” © Tim Pettry, 2008 TM Now, for you linear thinkers… Click 1 2 3 4 5 6 7 8 9 10 X...

Words: 696 - Pages: 3

Premium Essay


...required to meet monthly demand | 1800 x 5 = 9000 | 1500 x 5 = 7500 | 1100 x 5 = 5500 | 900 x 5 = 4500 | 1100 x 5 = 5500 | 1600 x 5 = 8000 | | Hours produces by an operator per month | 22 x 8 = 176 | 19 x 8 = 152 | 21 x 8 = 168 | 21 x 8 = 168 | 22 x 8 = 176 | 20 x 8 = 160 | | Workers required per month | 9000 / 176 = 51 | 7500 / 152 = 49 | 5500 / 168 = 33 | 4500 / 168 = 27 | 5500 / 176 = 31 | 8000 / 160 = 50 | | Aggregate planning | Workers used | 27 | 27 | 27 | 27 | 27 | 27 | | Workers hired | 0 | 0 | 0 | 0 | 0 | 0 | | Workers fired | 3 | 0 | 0 | 0 | 0 | 0 | | Units produced | 27*22*8 /5 = 950 | 27*19*8 /5 = 821 | 27*21*8 /5 = 907 | 27*21*8 /5 = 907 | 27*22*8 /5 = 950 | 27*20*8 /5 = 864 | | Monthly inventory | 0 | 0 | 0 | 7 | 0 | 0 | | Units subcontracted | 1800 – 950 =850 | 1500 – 821= 679 | 1100-907 =193 | 0 | 1100-957 =143 | 1600-864=736 | 2601 | Full cost | Labor cost | 27*22*8*$4 =19000 | 27*19*8*$4 =16420 | 27*21*8*$4 =18140 | 27*21*8*$4 =18140 | 27*22*8*$4 =19000 | 27*20*8*$4 =17280 | 107980 | Material costs | 95000 | 82100 | 90700 | 90700 | 95000 | 86400 | 539900 | Hiring cost | 0 | 0 | 0 | 0 | 0 | 0 | 0 | Firing cost | 3 x $250 = 750 | 0 | 0 | 0 | 0 | 0 | 750 | Inventory carrying cost | 0 | 0 | 0 | 11 | 0 | 0 | 11 | Sub contracting cost | 106250 | 84875 | 24125 | 0 | 17875 | 92000 | 325125 | Total cost | 221000 | 183395 | 132965 | 108851 | 131875 | 195680 | 973766 | Minimum workforce with sub contracting strategy...

Words: 676 - Pages: 3

Free Essay

Lab 6

...reading binary. Using a 7-segment display we are able to achieve that by converting the BCD value into a 7 bit output. The 7-segment display has 7 LEDs and a certain amount of voltage triggers each of the 7 segments to produce a decimal number. Procedure 1. Create a truth table for your 4 bit input and the corresponding output necessary to light the proper segments of the display. For example, if the input is represented by WXYZ and the output is identified as ABCDEFG then if the input is 0000, all outer LEDs should be lit while the middle LED should be off. Once you create the rows in a truth table for the other 9 combinations, find the function for each segment. 2. Depending on whether you are dealing with more 0s or 1s, choose NAND or AND gates to implement each segment function. 3. Wire the input DIP switches to the decoder input. Note that you have 2 3x8 decoders. You will need to use the inputs and enable lines to combine them in order to implement these 7 functions. 4. Wire the NAND or AND gates to the proper outputs of the decoders in order to implement the functions for each segment. 5. Wire the outputs of the gates to the proper pin on the 7-segment display (refer to the datasheet for the 7-segment display you are using and remember to use a resistor instead of a jumper. 6. Attach 5V to both common anode pins of your 7-segment display (refer to the datasheet for the 7-segment display you are using). 7. Demonstrate number......

Words: 1151 - Pages: 5

Premium Essay

Anwar And Leah Case Study

...1. Anwar and Leah are concerned about protecting the funds in their estate after it is passed to their children. They have tried to structure their wills in as optimal a manner as possible, but their advisor has told them that once the children receive the funds, it is up to the children to take certain steps in order to protect the funds into the future. Explain some of the steps that their children (i.e. not Anwar or Leah) could do to help protect their inheritances. 5 MARKS (5 marks) Anwar and Leah, in order to protect the funds in your estate after it is passed onto your children David, Amal and Lisa. There are many steps we can take. However, it is not always possible to protect assets from claims by a former spouse or partner, especially since we are in a society where the statistics show that 50% of all marriages will end with a divorce. There are a few precautions your children can take to protect their inheritances. In David's instance since he is currently the only one married and without a marriage contract, if he wants all inheritances to remain exempt from his current spouse, he would need to discuss with his wife about setting up a marriage contract. This could be a difficult conversation to have and may put a strain on the relationship between David and his wife. She would have to agree on setting up a marriage contract and agree to the terms of being excluded from his inheritances from his parents. A marriage contract is a legal document that discloses......

Words: 729 - Pages: 3

Free Essay

As a Member of the Information Security Team at a Small College, You Have Been Made the Project

...for expanding at later time. Include cost$$ PowerConnect 2808 Switch. >> Organizations seeking an 8-port switch that offers incredible value, flexible management capabilities and energy-efficient power savings. >> Dell Price $119.00 - 1 quality networked printer Dell V525w All-in-One Wireless Inkjet Printer: Versatile and efficient, this all-in-one printer provides enhanced high speed performance at a great value. Print, scan, fax, and copy with this efficient printer for your office - File and folder sharing Do this through Windows Server 2008 Standard Edition. Setup account, access and permission; create shared folder, etc./437 - Internet access Use Verizon for internet service. Get monthly fee estimate online. Buy a domain name for business and web site bundle (package). - Multiple email addresses This include in Verizon service so include all cost for internet, email, website. This is recurring cost. - Basic security environment (similar to home environment) - Initial investment $5,000 or less Add all hardware, software, cables, and printer. Make adjustment for no more than $5,000 - Recurring...

Words: 2715 - Pages: 11

Premium Essay

Microsoft Windows 7 Configurations Test 70-680

...70-680 Exam 70-680 Title TS: Windows 7, Configuring Updated Product Type Version: 10.3 106 Q & A with Explanation “Best Material, Great Results”. 1 70-680 QUESTION 1 You work as a desktop support technician at The network consists of a single Active Directory domain named and includes a Direct Access infrastructure. has purchased a new laptop named ABC-WS680. You join ABC-WS680 to a domain after performing a clean installation Windows 7. How can you make sure the connectivity to the domain from ABC-WS680 using Direct Access connections? A. By installing a computer certificate on ABC-WS680. B. By disabling User Account Control (UAC) on ABC-WS680. C. By modifying the network connection properties on ABC-WS680. D. By adding the computer account for ABC-WS680 to the RAS and IAS Servers group in the domain. Answer: A Explanation: QUESTION 2 You work as a desktop support technician at The network consists of a single Active Directory domain named The network contains a data file server named ABCSR03 which contains ABC_Data shared folder and running Windows Server 2008 operation system.. You have been assigned a client computer named ABC-WS680 running Windows 7 operating system. You need to ensure the availability of the files in ABC_Data share and maintain encryption even when ABC-SR03 has been disconnected from the network. How you can accomplish......

Words: 15733 - Pages: 63

Premium Essay

Ugrade Email with your upgrade. The information below will describe the best options for your office. I would upgrade the operating system to Windows 7 Professional, since your network is built around a Windows domain; this is the least expensive Windows 7 edition that can join a domain. This edition also includes the capability to allow Remote Desktop access to your computer from the network. The Windows backup program offers the same set of features in all editions, however Professional edition adds the option to store backed-up files and system images to a network location instead of limiting you to local hard drives and removable media. Without actually having the programs running you will use an average 40% of 4GB of memory if you use the user interface enchantments. Microsoft requirement are: 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) 16 GB available hard disk space (32-bit) or 20 GB (64-bit) DirectX 9 graphics device with WDDM 1.0 or higher driver BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on. Once BitLocker is turned on any file you save on that drive is encrypted automatically this requires Trusted Platform Module (TPM) 1.2. BitLocker To-Go, a new feature of Windows 7, gives the lockdown treatment to easily misplaced portable storage devices like USB flash drives and external hard drives. BitLocker......

Words: 520 - Pages: 3

Premium Essay

It Consultation

...IT Consultation for MR. Green Mr. Green wants to upgrade Windows 7 Home Premium to Windows 7 Ultimate. I have researched this upgrade and will be describing concerns and options so Mr. Green’s business will be more efficient and capable of expanding in time. From the information you gave me Mr. Green, it appears that your stand-alone machines are capable of running Windows 7 Ultimate. It requires 1GHz processor, 2GB RAM (for 64 bit) and 20GB available disk space. My concern for the future would be to look into getting more RAM as you install different programs and have many applications running at the same time. Attached are graphs that will take you step by step in preparing to upgrade as well as the steps for using Windows Anytime Upgrade. Running the upgrade advisor will ensure that your systems are capable and compatible of running Windows 7 Ultimate. It will check your hardware, search for updates, check your applications, disk space, ensures computer functionality, also performs a full system backup and allows you to purchase Windows 7. The next graph walks you through Windows Anytime Upgrade which I believe will work for you since your systems already have windows 7 on them. The graph has you click start, control panel, system and security tab, and Windows Anytime Upgrade. When you get to that window, just click on go online to choose the windows 7 edition you would like and then click the buy button. It will then walk you through the install process. You may......

Words: 860 - Pages: 4

Premium Essay

Nt1230 Syllabus

...ITT Technical Institute NT1230 Client-Server Networking I Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course...

Words: 1834 - Pages: 8

Premium Essay


...and Cost Containment 6 Architecture Assessment and Governance 9 Enterprise Authentication 11 Directory Services and Domain Consolidation 13 System Administration 15 Operating Systems 17 Email System 19 Maintenance 21 Network Security 23 Summary 25 References 26 Technology Analysis and Assessment Plan Listed below is a simple diagram of the hardware layout in Acme Gym Inc., a small local fitness company that serves the community from a single location. Following the diagram is a detailed description of the current technology available on-site and an assessment of its weaknesses. There are currently four workstation computers located across several office locations. All four workstations currently contain essentially the same hardware and software consisting of: * Microsoft Windows XP operating system * 2 GHz CPU * 2 GB RAM * 120 GB Hard drive * DVD burner drive * Built-in USB and Ethernet ports The server on-site is currently running Microsoft Windows Server 2000 operating system. It contains the following hardware: * 2 each removable 250 GB hard drives in a RAID configuration (one drive used as a ghost drive, to ensure data integrity) * 2 GHz CPU * 2 GB RAM * DVD burner drive * Built-in USB and Ethernet ports The server currently maintains all customer related databases and also serves as domain ( and email host for the company. A standalone printer is the only peripheral currently connected to...

Words: 5202 - Pages: 21

Premium Essay


...Student Wireless Connection Windows 7 Configuration Procedure (WPA) IMPORTANT: This document assumes that your wireless network interface card supports the WPA standard. If you are unable to connect using this method, please obtain the Windows Vista Procedure (Unsecured) from your Systems Support Technician. 1. Right-click on the wireless connection , it might also look like this . 2. Click on Open Network and Sharing Center: 3. On the Network and Sharing Center, click on “Manage Wireless Networks”, on your left-hand side. This will take you to the wireless networks that have been saved on that particular machine. 4. This is “search and destroy”. If the user has added the ITTCAMPUSWPA connection to their list of safe networks, you should remove the connection – it is most likely not configured correctly. 5. Once you delete the offending connection, if any, click on the back button to return to the Network and Sharing Center. Now we will configure the connection from scratch. 6. Click on “Manually connect to a wireless network”. 7. On the next screen you will type “ITTCAMPUSWPA” for the network name and make sure “WPA-Enterprise” is selected from the drop-down list for the security type. Usually the “Start this connection automatically” is checked by default, but if it is not, go ahead and check it. Click on “Next” button. 8. On the next window click on “Change connection settings”. 9. On the Ittcampuswpa Wireless......

Words: 1016 - Pages: 5

Premium Essay

Test Guide

...Test Guide 1.) Which library is NOT in windows 7?  Videos 2.) A new scripting feature that replaced VB script? Powershell 3.) Which version(s) of windows can be added to the Active Directory Domain? Professional, Ultimate, and Enterprise 4.) What replaced the MSDOS disk boot for windows? Windows PE Boot Disk 5.) A set of folders associated with a specific user is called? User Profile 6.) A program to run/see if Windows 7 is compatible with an upgrade is called? Windows 7 Upgrade Advisor 7.) Default Partition Style? Main Boot Record or GPT 8.) The Maximum number of primary partitions that MBR supports is? 4 9.) What volume is based on RAID 0? Striped 10.) What is the preferred file system for Windows 7? NTFS 11.) What level of the OSI Model are cables on? The 1st level (Physical) 12.) What level of the OSI Model is IPv4 on? The 3rd level (Network) 13.) What do you use to specify what bits are being used to lock a number into place? Subnet Mask 14.) What process is used to verify a persons identity? Authentication 15.) What enables only specific users to perform tasks and processes? User Rights 16.) What address is given to an IP that fails to locate its address? A.P.I.P.A 17.) Another name for computers that are peers is? Workgroups 18.) What type of profile is made when a user logs on for the 1st time? Local User Profile 19.) What type of profile is stored on a network and does not allow......

Words: 1782 - Pages: 8