Premium Essay

Lab 1 Deliverables File

In: Computers and Technology

Submitted By anthonyb69
Words 558
Pages 3
Review the seven domains of a typical IT infrastructure
In your Lab Report file, describe how risk can impact each of the seven domains of a
Typical _IT infrastructure: User, Workstation, Local Area Network (LAN), Local Area
Network-to-Wide Area Network (LAN-to-WAN), Wide Area Network (WAN), Remote
Access and System/Application domains.
The answer is the seven domains of an IT infrastructure are classified below, and their risk factors.
A. User Domain: Any user, worker, employee, contractor, or individual. They are considered to be the weakest link in IT security and the risk.
B. Workstation Domain: The work station, client or standalone home system. The risk is Hackers use malicious software known as malware.
C. LAN Domain: The private LAN, from SOHO’s to large corporations. To protect this domain it must be inside of a firewall if it does not have a firewall it is vulnerable and a risk.
D. LAN to WAN Domain: Wan connections between LAN locations, like which are controlled by the third party entities. Here where LAN is in a trusted zone and the WAN is in an untrusted zone, so the LAN to WAN can be protected by firewalls.
E. Remote Access Domain: It connects remote users to the organization’s infrastructure. It can be used by VPN and Dialup connections. This can provide access to a private network on a public network, this is where it is untrusted and attackers can attack and can be a major risk.
F. WAN Domain: WAN domains are networks, such as ATM’s, frame relays which are owned by a carrier network which gives access to the corporation. This is very vulnerable because they are shared with other companies and it is quite risky.
G. System/application domain: It is a collection of servers hosting applications, virtualized systems, and databases. This can be secured by giving second level authentication access to the authorized users.

Table on next

Similar Documents

Premium Essay

Common Lab Tasks

...Common Lab Tasks In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list...

Words: 2388 - Pages: 10

Premium Essay

Common Lab Tasks

...Common Lab Tasks In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list...

Words: 2387 - Pages: 10

Premium Essay

Jay Will

...Jones & Bartlett Learning ISSA Labs: Before You Begin Jones & Bartlett ISSA Labs: Before You Begin Table of Contents Click on a topic to jump to the appropriate page Purchasing Info .......................................................................................................................... 2 Virtual Security Cloud Lab (VSCL) ............................................................................................... 2 Step-by-Step Instructions........................................................................................................... 3 Deliverables ............................................................................................................................... 3 File Transfer ............................................................................................................................... 3 How Do I Redeem An Access Code? ........................................................................................... 4 How Do I Create A New User Account?...................................................................................... 9 How Do I Login to An Existing Account? ....................................................................................16 How Do I Get a Password Reminder?........................................................................................19 How Do I Disable The Pop-Up Blocker from Internet Explorer? ................................................23 How Do...

Words: 2021 - Pages: 9

Premium Essay

Information Security

...JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES LABORATORY MANUAL TO ACCOMPANY Security Strategies in Windows Platforms and Applications 1E REVISED 38542_FMxx.indd i 9/5/12 10:48 AM World Headquarters Jones & Bartlett Learning 5 Wall Street Burlington, MA 01803 978-443-5000 info@jblearning.com www.jblearning.com Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call 800-832-0034, fax 978-443-8000, or visit our website, www.jblearning.com. Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corporations, professional associations, and other qualified organizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an email to specialsales@jblearning.com. Copyright © 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. The Laboratory Manual to accompany Security Strategies in Windowa Platforms and Applications is an independent publication and has not been authorized, sponsored, or otherwise...

Words: 25969 - Pages: 104

Premium Essay

Programming

...Opportunity 2 Unit 2 Assignment 1: Homework Learning Objectives and Outcomes Determine program input, processing, and output stages. Create the necessary flowcharts to describe a program’s structure. Use pseudocode to define a program’s structure. Formulate solution algorithms for calculations by properly following the order of operations. Assignment Requirements Answer: * Short Answer 1, 2, 3, and 4 on page 71 * Algorithm Workbench Review Questions 1 and 2 on page 71 * Programming Exercises Questions 1 and 4, starting on page 72 Required Resources Textbook Submission Requirements Submit your written answers to your instructor at the beginning of Unit 3. Unit 2 Research Assignment 1: Researching Variable Naming Rules Learning Objectives and Outcomes Determine program input, processing, and output stages. Create the necessary flowcharts to describe a program’s structure. Use pseudocode to define a program’s structure. Formulate solution algorithms for calculations by properly following the order of operations. Assignment Requirements Use the Internet and the ITT Tech Virtual Library to research the following questions: What are the variable naming rules of Visual Basic, Python, and Java? List three similarities and differences in between the three programming languages. Required Resources Textbook ITT Tech Virtual Library: http://library.itt-tech.edu Submission Requirements Submit your written answers to your instructor...

Words: 450 - Pages: 2

Free Essay

Ssaassd

...A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, Sixth Edition Lab Manual Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Copyright © 2012 Mark G. Sobell All rights reserved...

Words: 38351 - Pages: 154

Premium Essay

Lab 6

...Unit 6 Lab 6.1: Pseudocode Learning Objectives and Outcomes Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.1: Pseudocode from the lab manual. Deliverables Submit the following at the end of this lab activity: The completed inputOptions() module in pseudocode in Step 1 The completed displayProvider() module with a case structure in pseudocode in Step 2 The completed and workable algorithm with nested If-Else statements using logical operators in Step 3 Unit 6 Lab 6.2: Flowcharts Learning Objectives and Outcomes Use flowcharts and pseudocode to represent Boolean conditions. Use if-then, if-then-else, and case structures in a computer program. Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.2: Flowcharts from the lab manual. Deliverables Submit the following at the end of this lab activity: Corrected variable declarations and initializations using Visio in Step 2 Corrected module calls using Visio in Step 3 Corrected inputOptions() module using Visio in Step 4 Corrected displayProvider() module with case labels and flow lines using Visio in Step 5 Corrected displayChoices() module with logical...

Words: 355 - Pages: 2

Premium Essay

Cis 336 Slingshot Academy /Snaptutorial.Com

...CIS 336 Entire Course For more classes visit www.snaptutorial.com CIS 336 Entire Course: Devry University --------------------------------------------------------------------- CIS 336 Week 1 iLab 1 Devry University For more classes visit www.snaptutorial.com L A B O V E R V I E W Scenario/Summary This lab will introduce you to the processes involved in defining one of the key components of a data model; the relationship diagram (RD). In this lab, you will draw a relationship diagram for two of the steps shown. Keep in mind when you are trying to decide which side of the relationship should be the "one" side and which should be the "many" that you must first decide which side has the primary key, or unique identifier. Once you have decided the primary key of the relationship, you have identified the "one" side of the relationship. Note that for an RD, the foreign key "many" side of the relationship points to the primary key "one" side. The "one" side should have the arrowhead point of the connecting line. This is different than an entity/relationship diagram (ERD) that we will draw next week, where the "many" side has crow's feet. This will familiarize you with how to set up MS Visio to draw database diagrams. Steps 1 - 3 below use the Customer, Order, and Employee tables of a simplified Order Entry database. The Customer table records clients who have placed orders. The Order table contains the basic facts about customer orders. The Employee table contains facts...

Words: 3439 - Pages: 14

Free Essay

Labs

...© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones Bartlett Lab #2© Jones &SALE ORLearning, LLC Vulnerabilities to &SALE ORLearning, LL AligningBartlett DISTRIBUTION Risks, Threats, and NOT FOR DISTRIBUT NOT FOR COBIT P09 Risk Management Controls © Jones & Bartlett Learning, LLC Introduction © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, © Jones & Bartlett Learning, LLC first released in 1996.Jones & Bartlett Learning, LLC © ISACA is an IT professionals’ association centered on auditing and IT governance. This NOT FOR SALE OR DISTRIBUTION The lab lab will focus on the COBIT framework. NOT FOR SALE OR DISTRIBUTION uses the latest two versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which is the latest version released in June 2012. Because COBIT 4.1 is freely available at the time of this writing, the lab uses this version to © Jones & Bartlett Presentation is done making use of a © Jones & Bartlett Learning, LL present handling of risk management. Learning, LLC set of COBIT control ...

Words: 2487 - Pages: 10

Premium Essay

Project Charter

...______________________________________________________________________________ Capstone Project III: Labs for High School NSA Capstone Project Charter ______________________________________________________________________________ Prepared By: Date of Publication: 03/29/2014 Revision History Version | Date | Author(s) | Revision Notes | 1.0 | 03/29/14 | Nicholas Jones/ Jorge Lopez/ Robert Howell | Original Document | | | | | | | | | | | | | | | | | Table of Contents Project Description 3 Project Objectives 3 Project Scope 4 In Scope: 4 Out of Scope: 4 Deliverables Produced: 4 Stakeholders: 5 Requirements: 5 Acceptance Criteria:Project Estimated Effort/Cost/Duration 5 Estimated Cost: 6 Estimated Effort Hours: 6 Estimated Duration: 6 Project Assumptions 7 Project Risks 7 Project Constraints 8 Project Dependencies 8 Project Approach 8 Project Organization 9 Communication Plan: 9 Project Guidelines: 9 Project Approvals 10 Project Description The Technical Director for a local school district wants three functional labs for various high school students to use. The labs will be essential for supporting the education of the students. Because there will be various students and instructors using the lab, it will require access to email via client and mobile devices, as well as secure authentications. A user guide Web page will be necessary. Project Objectives This project will...

Words: 1298 - Pages: 6

Premium Essay

Lab 1

...Unit 1 Labs Lab 1.1 Step 13 Lab 1.2 Define Major Topics for a Database NOUNS | MAJOR TOPIC | Doctors | Patients | Drugs | Side Effects | Researchers | Patient Information | Westlake Research Hospital | Conducting test of new Depression Drugs | Lab 1.3 Create a Statement of Work Scope The Software-Tracking database will be used to help manage the school’s software licensing. The software will be monitored for lifecycle and version corrections as well as keeping track of the number of users accessing the software under the constraints of the license agreement. The faculty and staff computers will be tracked for which version and licensed copy of software is currently running on each system. Constraints The database can be used for accessing the faculty and staff’s logon to the school employee website for the purpose of inputting and updating hours worked. Faculty and staff members can conduct business related work, such as adjusting work schedules, and student’s grades in the system but are not able to view student’s personal files in the registrars system. Objectives * Make for a more efficient system by allowing employees to have control of shared calendars and student’s grades. * Improve the tracking of Software Licensing and the Lifecycle of programs. Tasks and Timeline 1. Gathering Data: Meet with School Board and those involved to discuss the needs and wants for a database. Time Allotted: 3 weeks. Deliverables: A list of interviews...

Words: 365 - Pages: 2

Free Essay

Cis 534 - Lab Manual

...Advanced Network Security Design 1 CIS 534 Advanced Network Security Design CIS 534 - Advanced Network Security Design 2 Table of Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6 Introduction ............................................................................................................................................. 6 Learning Objectives ................................................................................................................................ 6 Tools and Software ................................................................................................................................. 7 Deliverables ............................................................................................................................................. 7 Evaluation Criteria and Rubrics ........................................................................................................... 7 Hands-On Steps ....................................................................................................................................... 8 Part 1: Exploring Wireshark ............................................................................................................... 8 Part 2: Analyzing Wireshark Capture Information .......................................................................... 12 Lab #1 - Assessment Worksheet .............

Words: 48147 - Pages: 193

Premium Essay

Business

...tips on how to be successful in this class! Download MS Project “2010” version Make sure you download MS Project 2010 early in week 1. Do not wait until the weekend in case you have issues and need to contact tech support. It takes about 30 minutes or less to download. It takes about 2 hours to do Lab 1a and 1b. My recommendation is to download a free 60-day license from Microsoft. This way, if you are unable to access the Citrix server, you have the MS Project software on your desktop to do your labs and work on your course project. Instructions on how to download are in the course room, see the syllabus and doc sharing. Note: Do not download MS PROJECT 2013, as version 2013 does not align with the lab assignment instructions. You need version 2010 to execute your lab instructions properly. What will you learn from this course? * It is about: 1) Learning project management concepts, 2) Learning how to use the MS Project Tool, and 3) Applying course concepts and MS Project skills to build a project plan for something that interests you. * The “discussions” will provide insight on the concepts in the text. * The “labs” will teach you how to use MS Project, so you can build your own MS project schedule for your course project. * The “course project” will bring together several of the weekly deliverables into one Project Management Plan in week 8. Each week builds upon the previous week. * Note: Weekly feedback is provided on your...

Words: 802 - Pages: 4

Premium Essay

Syllabus

...------------------------------------------------- Course Syllabus IT237 Intro to Web Design II Course Start Date: 05/09/2011 Course End Date: 07/10/2011                   Please print a copy of this syllabus for handy reference. Whenever there is a question about what assignments are due, please remember this syllabus is considered the ruling document. Copyright Copyright ©2009 by University of Phoenix. All rights reserved. University of Phoenix© is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft©, Windows©, and Windows NT© are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation. Edited in accordance with University of Phoenix© editorial standards and practices. Facilitator Information                                                                                                       Robert McBride robmcbride@email.phoenix.edu (University of Phoenix) mcbriro@gmail.com (Personal) 405-406-4359 (CST) Facilitator Availability I am available from 9 a.m.-9 p.m. Central Time on most days, but I attempt to reserve Sunday for my family. On Saturdays, I tend to be online in the morning only. If these times are not convenient for you, please let me know. I will...

Words: 4497 - Pages: 18

Premium Essay

Nt1230 Syllabus

...5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite or Corerequisite: NT1210 Introduction to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus ...

Words: 1834 - Pages: 8