Free Essay


In: Computers and Technology

Submitted By kellyboy
Words 428
Pages 2
the intern at work station fifteen is please to present my report on the ‘’internal used only’’ data and classification standard of Richman Investments. This report will specifically address, the IT infrastructure domains and how they are affected by our standards, they are seven IT infrastructure domain and these are they names (1) users domain (2) workstation domain (3)
Lan domain (4) lan to wan domain (5) wan domain (6) remote access domain (7) system application domain. My focus in this report is to clearly identify the security risk that goes along with these domains and to identify some solutions also even to open the door for grate discussion to develop a better strategy to protect our company.
Sir, Each domain requires proper security controls and must meet the A-I-C (Accountability, Integrity and Confidentiality) triad requirements.
But at tins time I will only focus on three domains that are mostly affected by the “Internal Use Only” standard. Listed below are these three it infrastructure and what are the direct dealings within our company and a glimpse of their treat. 1. User Domain

• The User Domain defines what data a person can and cannot have access to within an organizations information system. This domain enforces the Acceptable Use Policy (AUP) which defines what a user is allowed to do within an organization’s owned IT asset. It is the weakest link in an IT Infrastructure. Users must understand what motivates someone to compromise an organizations system.

2. Workstation domain

• The Workstation Domain is where most users connect to the IT Infrastructure. Desktop computers, laptops, or any device that connects to a network is considered a workstation .A logon ID and password is needed for access. Requires tight security and access controls. 3. WAN

• Wide Area Network (WAN) Domain connects remote locations. Manages client’s firewalls and router configurations .The goal is to allow users the most access possible by making sure the data traveling in and out is safe
It is clear that the infrastructure domain defines roles, policies, standards, and technology that is provide and manages the communications networks and computing platform for the company IT environment and operating systems.
So because of this major treat these are some recommendations to be considered by management.
(1) Support the flow and processing of information, both internal and external, in an efficient manner

(2) Provide scalable and reliable infrastructure to support the seamless and transparent delivery of information to the business,

agencies and even customers.

(3) Promote knowledge sharing and increase resource flexibility.

(4) Encourages stewardship and fiscal accountability.

Similar Documents

Free Essay

Domain Tasting

...“Domain Tasting” The practice of “Domain Tasting” began in 2003 when the ICANN implemented a policy giving a five day grace period also known as add grace period (AGP) for new domain registrations. The five day grace period was meant to allow registrants to correct any issues that may have had with their domain names and then cancel and re-reregister with corrections. Domain tasting is when a company registers a domain name and loads the page with advertisements; these advertisements would generate money for clicks. They do this to test the “Marketability” of the domain name. If the web page was unpopular or did not produce as expected then the registration is cancelled within the five day grace period. If the registration was cancelled then the company did not have to pay for the domain name. This allowed companies to submit as many domain names as they wanted until they found one that was marketable. The use of “domain tasting” had a few negative effects on web users. One of the effects is that it weakened confidence of consumers in the domain marketing system. Domain tasting also populated the internet with many useless web sites that were full of useless information and advertisements. Another problem that arose from domain tasting was that the domain names that were found to be popular or marketable were sold back to consumers at inflated prices. In 2009, the ICANN implemented a policy that significantly decreased “domain tasting”...

Words: 307 - Pages: 2

Premium Essay

Eminent Domain Institution name Date Introduction Question: Is the policy of eminent domain providing for the public welfare, through the taking of privately owned property, using a rightful procedure involving due process and just compensation as it was intended to do when the policy was founded? Eminent domain is the inherent power of the government to take over a citizen's property for public use without the owner's consent. Initially, this public policy originated in the Middle Ages throughout the world. It became part of the British common law before reaching the United States where it was then illustrated in the US Constitution in 1791 (Britannica: eminent domain). The Fifth Amendment granted the federal government the right to exercise eminent domain, provided protection to individuals, and protected the property rights of citizens. Shortly after the due process clause of the Fourteenth Amendment made the federal guarantee of “just compensation” applicable to the states. The use of eminent domain power to promote economic development, particularly in urban centers of the United States, has become the focus of significant controversy in this present day. This is commonly done when the acquisition of property is needed for the completion of certain project. Projects intended for the public good such as highways, bridges, schools, and government buildings have been created from Eminent Domain. The policy pertains to every independent government. It requires very little......

Words: 3810 - Pages: 16

Premium Essay

Eminent Domain would move to Palmdale if it could not expand. Lancaster tried to buy 99 Cents' lease, but the company refused. Lancaster then used its power to emenent domain to condemn the 99 Cents property for the purpose of making city contrasted 99 Cents property for the purpose of making it available to Costco. the city noted that blight might follow if Costco left, and the city contrasted 99Cents' under $40,000 per year in sales taxes generated with costco's more then $400,000. 99 Cents then sued the city seeking an order blocking the effort to take the 99 Cents property Eminent domain allows states the right to take over private property, at fair market value, for public use. Due the declining economy of Lancaster, I would rule in favor of the state to take over 99 Cent Only Stores Property thereby allowing Costco to move in. The additional sales tax generated by allowing Costco to take over the property of 99 Cent Only Store would allow Lancaster to continue independently as a productive county. The present negative of eminent domain, in this case, wieghs far less than the positive outcome of ruling in favor of Costco. B. Would the result be any differnet today after the Supreme Court's 2005 decision in the New London, connecticut case? Explain According the to Supreme Courts ruling, the city can file for eminent domain even if the economy is not blighted. The result would be the same today; however, prior to ruling in favor of the state, I would require Costco's......

Words: 343 - Pages: 2

Premium Essay


...1. Describe five factors that may lead you to create multiple domains for this organization. a. Decentralized administration – If the company doesn’t plan to centralize domains into one model, this factor would be a good choice due to the fact that the company has multiple branches in multiple locations. Each domain acts as a kind of security boundary which will only allow administrators within that domain to work only in that domain; for example, an administrator in England would not have privileges to work within a domain that is located in California. b. Geographic limitations – Due to the fact that the company has multiple locations scattered globally, links or data transfer may be slow if the entire network is under one domain. This alone doesn’t give enough reason for multiple domains, the main reason is so that an administrator will have control over his/her region and not have to contact another administrator halfway across the world. c. Unique DNS namespace considerations – If multiple organizations want to use similar registered namespaces, multiple domains are needed because each registered namespace has to be on a separate domain. d. Special password policies – password policies are setup on the domain lever so to separate the different policies multiple domains have to be setup. e. Enhanced security concerns – separating the schema master role into a different domain than what your users on can increase the security by nit having everything......

Words: 312 - Pages: 2

Free Essay

Domain Marketing

...Is a Generic Domain the Ticket to Success for a new startup? In the venture world there is no secret to success of a startup. Certainly there are standard guidelines one must follow to achieve success. The question that remains is: which of these guidelines greatly increase one’s probability for success? The simple answer: The Perfect Generic Domain. The simple answer to success in a new startup is branding. Any seasoned marketing professional will testify that branding takes years and possibly millions of dollars to create. This raises a simple question: Does creating a brand for a successful startup have to take this long and cost this much? The answer is a resounding ‘no!’ The perfect Generic Domain can create a brand for your new startup overnight. Owning a premium generic ( domain eliminates the need for expensive marketing campaigns by: Delivering the message clearly Confirming Credibility Translating your company name into something memorable Creating loyalty through recognition It establishes brand/product authority Companies like CNET (,,) as well as have harnessed the power of “’s” to become the leaders of their industry. This is because’s increase visibility by linking the owner of the domain to the specific category and keyword in search engines. Generic domains almost offer a competitive advantage. They do this by linking the product or service to the domain name while......

Words: 341 - Pages: 2

Free Essay

Eminem Domain

... | Eminent Domain: Being Abused? July 4, 2004 [pic] |[pic]The City of Lakewood, Ohio was trying to use | | |eminent domain to force Jim and Joanne Saleet out of | | |their house in order to make way for expensive | | |condominiums.  (AP) | | |Quote | | |[pic] | | |"For them to come in and tell me how much my | | |property's worth and for me to get out because they're| | |bringing in somebody else when I own the land is | | |unfounded to me.” | | |Shop owner Randy Bailey of Mesa, Ariz. | | |[pic] | | (CBS) Just about everyone knows that under a process called eminent domain, the government can (and does) seize private property for public use - to build a road, a school or a courthouse. But did you know the government can also seize your land for private use if they can prove that doing it will serve what's called "the public good"? Cities across the country have been using eminent domain to force people off their land, so private developers can build more expensive homes and offices that will pay more in property taxes than the buildings they're replacing. Under eminent domain, the government buys your property, paying you what's determined......

Words: 1946 - Pages: 8

Free Essay

Eminent Domain Paper

...When Should Eminent Domain be Used? When should a city or state use their eminent domain powers? Over the past few years there have been a couple of cases that raised the questions of when eminent domain should be used. One of the most controversial cases in the history of the United States was the Kelo v New London Supreme Court ruling. In order to generate tax revenue, add jobs, and to prevent bankruptcy, the government’s right to initiate eminent domain for public good is a necessary evil. Eminent domain in definition is “the right or power of public purposes without the owner’s consent on payment of just compensation” (“Eminent Domain History”). Eminent domain has been a part of the United States ever since the constitution was created. Eminent domain is not stated in the constitution. However, it is implied at the end if the Fifth Amendment, " [no person should] be deprived of life, liberty, or property be taken for public use, without just compensation" (U.S. Constitution). Eminent domain is not new to the United States. The first eminent domain case was “in 1879 the Supreme Court, in the case of Boom Co. v. Patterson, (98 U.S. 403) said that eminent domain appertains to every independent government. It requires no constitutional recognition; it is an attribute of sovereignty" (“Draw the Line”). After World War II, eminent domain was used on a regular basis. "In 1954, the Supreme Court ruled in Berman v Parker that private projects meet the definition......

Words: 1214 - Pages: 5

Free Essay

Ip3 Domain Registration

...| Domain Name Basics | | | 14 March 2014 | | In this article we will look at how to register your own domain, what are domain name disputes and who is behind it in South Africa, who manages domains, and how you can check who owns a specific domain. | Bellville Campus P O Box 1906 BELLVILLE 7535 Cape Town Campus P O Box 652 CAPE TOWN 8000 DEPARTMENT OF iNFORMATION TECHNOLOGY ------------------------------------------------- NATIONAL DIPLOMA: INFORMATION TECHNOLOGY LEVEL 3 SUBJECT: INTERNET PROGRAMMING 3 CODE: IRP300S PROJECT: ASSIGNMENT 1 – Domain name registration LECTURERS: W. C. ROTHMAN I declare that this is the original work of the author. All information obtained directly or indirectly from other sources has been fully acknowledged. Surname, Initials | Student number | Signature | FOUCHE, M | 212201018 | | MAYER, R | 212017705 | | HENDRICKS, K | 212037943 | | COETZEE, D | 212021265 | | Contents Introduction 4 How to register a domain for your website (Kurvin Hendricks) 4 Domain name disputes (Michael Fouche) 5 Who manages Domains? (Ryno Mayer) 6 How to check who owns a domain? (Dylan Coetzee) 7 WHOIS 7 Reverse Internet Protocol (IP) lookup 7 Conclusion 7 Bibliography 8 * Introduction In this article we will look at how to register your own domain, what are domain name disputes and who is behind it in South Africa, who manages domains, and how you can check who owns a specific domain. An Internet Protocol...

Words: 1772 - Pages: 8

Free Essay

Distribution of Domain Controllers

...Distribution of Domain Controllers With the fresh install of Windows 2008 R2 both Domain Controllers and Read Only Domain Controllers will need to be deployed in strategic areas of the redesigned network. Since the corporate offices are in Ohio this is where the main domain controller will be located. It has been determined that the Huffman network will have between 50 - 100 users throughout the site which means that a minimum of two Domain Controllers, with universal grouping caching, is recommended to be placed in the network (Morimoto, Noel, Droubi, , Mistry, & Amaris, 2010). “Universal Group Cashing is a process by which an Active Directory site caches all universal group members locally so that the next time clients log on, information is more quickly provided to the client and they are able to log on faster” (Morimoto, Noel, Droubi, Mistry, & Amaris 2010, p. 371). This would be fine if the network was in one location, but Huffman’s network has four locations around the United States which means that only two regular Domain Controllers is not practical for the topography of the business. Domain Controller deployment will be as follows. Each satellite location, including California, Missouri, and New Jersey, will each have a Read-Only Domain Controller in place. The Read Only Domain Controllers is used instead of a normal controller to enhance security throughout the entire network. Read only prevents changes made to sensitive information throughout the......

Words: 495 - Pages: 2

Free Essay

Creating a Domain Model

...Creating a Domain Model Option 1 POS/421 – Windows Server Networking University of Phoenix Robert Singer The hierarchical naming system for computers, known as the Domain Name System (DNS), in any source linked to the Internet or private network. This system connects diverse information with domain names assigned to each of the participants. More importantly, it communicates the domain names that humans understand into numerical (binary) identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.  An analogy used often to explain the Domain Name System is that it is like a phone book for the Internet. It translates language a human can understand to computer hostnames into IP addresses. For instance, changes to DNS known also as a distributed database that offers mapping between IP addresses and Host names.           Using the Domain Name System it is likely to assign domain names to sets of Internet users in an important way, free of each user's actual physical location. Since this is possible, World Wide Web (WWW) hyperlinks and Internet contact information will stay dependable and unbroken even if the existing Internet routing arrangements become altered or change, or the participant uses a mobile device. Internet domain names are easier to remember than IP addresses such as (IPv4) or 2001:db8::1f70:6e8 (IPv6). Individuals take use this advantage when they talk......

Words: 502 - Pages: 3

Free Essay

Checkpoint Domain Name.Docx

...The first thing I did was go on to check availability for the free flu name. I typed in free-flu and the name was available to use for $11 dollars a year. I found out if you don’t have to use a period don’t, because it will lower the domain name value, so that’s why I used a hyphen so I wouldn’t make it a sub-domain name. The name free-flu doesn’t give much chance of confusion, because the words don’t run together and they can’t be misread that easy. You can buy the domain name at go The .com is the most popular domain extension there is, it can be registered by anyone, and it’s good for anyone seeking high visibility on the internet. One thing you don’t want to get is the free pseudo web site so you can get word press, because you won’t have your own domain name you would be part of word press. The DNS is completely hidden within the internet. If you ever sent an e-mail you used DNS, or even the URL has the domain name in it. You would still need an IP address, because every time we use a domain name, we will use the internet’s DNS to translate the domain name into the machine readable IP address. Anyone on line uses hundreds of domain name servers and don’t know...

Words: 255 - Pages: 2

Free Essay

Domain Naming System

...Domain Name System By: Teresa M. Wade In today’s society, technology has made life very convenient. One of those conveniences is the World Wide Web (WWW) commonly known as the Internet. From the touch of a button or a click of a mouse a user can gain access to a plethora of information. There are many different protocols and services that are interconnected to provide this ability. One such service is called Domain Naming System (DNS). DNS is an Internet service that translates domain names into IP addresses. This may not seem like a big deal to most but many would beg to differ if they had known that without DNS they would have to remember billions of numbers. Everything in a network has an IP address. DNS helps us designate what those devices are. There are 3 basic components of DNS which are zones (or namespace), name servers and resolvers. In the following reading you will learn what DNS is as well as the working components that make it as reliable as it is today. DNS was invented in 1983 shortly after Transmission Control Protocol/Internet Protocol (TCP/IP) was deployed. DNS operates on port 53 and utilizes User Datagram Protocol (UDP). The only time that the Transmission Control Protocol is used is when the response size exceeds 512 bytes. The only time that UDP can be used to transport more than 512 bytes is if EDNS is used. EDNS is basically an extension of DNS. Before the use of DNS, every computer on the network would retrieve a file called HOST.txt from...

Words: 3486 - Pages: 14

Free Essay

Domain Name Server

...Essay The Domain Name Server Definition: The DNS translates Internet domain and host names to IP addresses. DNS automatically converts the names we type in our Web browser address bar to the IP addresses of Web servers hosting those sites. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name might translate to The DNS system is, in fact, its own network. If one DNS server doesn't know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. The DNS was designed to resolve or simply match up the IP address associated with the device to the friendly URL name on the other end. The domain name sever’s function in life is to resolve (translate) the user-friendly Web address to the hard to remember IP addresses from somewhere else. Therefore network providers are responsible for having their own DNS databases updated and in sync, with their outside counterparts, when their trying to talk to one another, because only companies IP addresses will match up with one another on the same network. DNS Server Configuration Types: DNS servers can be configured as one of the following types: Caching-only server A caching-only name server maintains a cache of resolved domain......

Words: 1664 - Pages: 7

Free Essay

Uml Term Papaer on Domain Analysis

...LOVELY PROFESSIONAL UNIVERSITY TERM PAPER ON Extending UML to Support Domain Analysis SUBMITTED TO:- SUBMITTED BY:- Mr. SANDEEP SINGH AKANSHU KUMAR Reg No:-11112286 ROLL No:- A21 SECTION:- K1107 Abstract:- The process of modelling and developing commonality and variability for system families should be supported by suitable methods and notations. The object-oriented methods and their notations, which are used at present, focus on the development of a single system at a time. In this paper we analyse feature models as a representation of the common parts and variants contained in a system family, and propose using a feature diagram as a basic representation of commonality, variability and dependencies. We examine various approaches to customizing the standard modelling language UML to model system families and propose how to extend the UML for the purposes of modelling variants in object-oriented analysis and design techniques. We recommend the use of UML standard lightweight extensibility mechanisms (stereotypes combined with tagged values) without changing the UML metamodel. This enables us to join the advantages of feature models with UML and provides the traceability of a concept throughout...

Words: 3255 - Pages: 14

Premium Essay

Domain Tasting Problem in 2003 and the Solution

...Angela Jiongco Chapter2 Review questions # 1 and # 5 Exercise # Review question #1. In one or two paragraphs, describe how the internet changed form a government research project into a technology for business users. The internet began as a way for the military to control weapons systems while under attack. In the 60’s, the U.S. Department of Defense became worried about possible effects of nuclear attack on its computing facilities. The Defense Department realized that in the future they need powerful computers for coordination and control. The Defense Department funded a research at leading universities and institute with the goal of designing a worldwide network that could remain operational even the network were sabotage by the military enemy. The researchers were determined the best solution to accomplishing their goal was to create networks that do not require a central computer control network operations. However, at the time the only network existed was a single connection between sender and receiver from the leased telephone company line. There was a concerned of risk using single connection method for connecting computers, so the researchers developed a different method in communication using multiple channels. In 1969 the Department of Defense researchers in the Advanced Research Projects Agency (ARPA) use this direct connection network model to connect four computers; one each at University of California at Los Angeles, SRI International, University of...

Words: 661 - Pages: 3