The Seven Domains of a Typical It Infrastructure

In: Computers and Technology

Submitted By ndcrespo
Words 542
Pages 3
THE SEVEN DOMAINS OF A TYPICAL IT INFRASTRUCTURE

1. User Domain defines the people who access an organization’s information system.
2. WORKSTATION DOMAIN is where most users connect to the IT infrastructure. It can be a desktop computer, or any device that connects to your network.
3. Local Area Network (LAN) DOMAIN is a collection of computers connected to one another or to a common connection medium. Network connection mediums can include wires, fiber optic cables, or radio waves.
4. LAN-TO-WAN DOMAIN is where the IT infrastructure links to a wide area network and the Internet.
• Basically, a firewall controls, prevents, and monitors incoming and outgoing network access. It is the job of the firewall to prevent unauthorized network access, both from outside and inside network users. Depending on the type of firewall, data packets sent to and from the network pass through the firewall, and all this data can be checked for whether it is allowed for transfer.
• Two main types of firewalls: network firewalls and host-based firewalls. Network firewalls, such as the software-based Microsoft’s Internet Security and Acceleration (ISA) Server or the hardware-based Nortel Networks Alteon Switched Firewall System, protect the perimeter of a network by watching traffic that enters and leaves. Host-based firewalls, such as Internet Connection Firewall (ICF—included with Windows XP and Windows Server 2003), protect an individual computer regardless of the network it’s connected to.
5. Wide Area Network (WAN) DOMAIN connects remote locations. WAN services can include dedicated Internet access and managed services for customer’s routers and firewalls. Networks, routers, and equipment require continuous monitoring and management to keep WAN service available.
6. REMOTE ACCESS DOMAIN connect remote users to the organization’s IT infrastructure. The scope of this domain…...

Similar Documents

Domain Model

... |Requirement to be able to | | | |identification. |have access to the calendar| | | | |on the go. | |G20. TrackSupplies |System Vision |Noun-phrase |The concessions coordinator| | | |identification. |wants to keep track of | | | | |supplies on hand. | |21. StatusCheck |Requirements |Noun-phrase |Tour administrator wants to| | | |identification. |know the status of a tour | | | | |whenever they need to know.| |22. SendConfirmationNumber |Requirements |Conceptual class category |The SGTL wants the system | | | |list. |to send a confirmation | | | | |number to the GTL. | |23. OnlineScheduleChange |Requirements...

Words: 844 - Pages: 4

Eminent Domain

... little constitutional recognition, and is considered an attribute of sovereignty. Under the US constitution, private property may be taken by eminent domain if the taking is for a public purpose and if just compensation is provided (Britannica: property law). Given the intended purpose of Eminent Domain, the policy faces controversy as to whether it is carrying out its mission of providing for the public welfare through the taking of privately owned property using a rightful procedure. Many are the arguments surrounding the issue of eminent domains and it is quite evident from the numerous numbers of cases that await judgment as to whether the regulation of private property, rather than its acquisition, requires “just compensation”. The constitution puts it out clear that the person whose private property has been seized for public use is entitled to just compensation, which is a fair current cash market value of the property in question. This is quoted to be the price that a willing buyer would give and a willing seller would accept for the property. This is why it is referred to as the fair price because it was where the buyer and seller would reach at a consensus. Eminent Domain has affected very many people across all the counties in the United States of America each and every year. One such instance is that which occurred in 2002 in Long Beach, NJ. At this time, the government promised a number of redevelopment projects in efforts to try and improve the lakeside...

Words: 3810 - Pages: 16

Eminem Domain

... really doesn't have a lot to do with whether or not your home is painted. ...A statutory term is used to describe an area. The question is whether or not that area can be used for a higher and better use.” But what’s higher and better than a home? “The term 'blight' is used to describe whether or not the structures generally in an area meet today's standards,” says Cain. And it's the city that sets those standards, so Lakewood set a standard for blight that would include most of the homes in the neighborhood. A home could be considered blighted, says Jim Saleet, if it doesn't have the following: three bedrooms, two baths, an attached two-car garage and central air. “This community's over 100 years old. Who has all those things? That's the criteria. And it's ridiculous,” says Jim Saleet. “And, by the way, we got up at a meeting and told the mayor and all seven council members, their houses are blighted, according to this criteria.” Cain admits that her house doesn’t have two bathrooms, a two-car garage and the lot size is less than 5,000 square feet. The Saleets may live in a cute little neighborhood, but without those new condos, the area won’t produce enough property taxes to satisfy the mayor and city council. “That's no excuse for taking my home. My home is not for sale. And if my home isn't safe, nobody's home is safe, in the whole country,” says Jim Saleet. “Not only Ohio. But this is rampant all over the country. It's like a plague.” [pic] Dana...

Words: 1946 - Pages: 8

The Seven Domains of a Typical It Infrastructure

...Lab # 1: Assessment Worksheet Identify Threats and Vulnerabilities in an IT Infrastructure Course Name:____________________________________ Student Name:______________________________________ Instructor Name:__________________________________________ Lab Due Date:____________________________________ Overview One of the most important first steps to risk management and implementing a risk mitigation strategy is to identify known risks, threat and vulnerabilities and organize them. The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities and accountabilities for risk management and risk mitigation. The lab requires students to identify risks, threats and vulnerabilities and map them to the domain that these impact from a risk management perspective. Lab Assessment Questions Given the scenario of a healthcare organization, answer the following Lab #1 assessment question from a risk management perspective: 1. Healthcare organizations are under strict compliance to HIPPA privacy requirements which require that an organization have proper security controls for habdling personal healthcare information (PHI) privacy data. This includes security controls for the IT infrastructure handling PHI privacy data. Which one of the listed risks, threats, or vulnerabilities can violate HIPPA privacy requirements? List one and justify your answer in one or two sentences. 2. How many threats and vulnerabilities did you...

Words: 563 - Pages: 3

You Are Presented with a List of Some Risks and Threats Associated with the Seven Domains of a Typical It Infrastructure. Below the List, the Solutions or Preventive Actions to Manage Those Risks and Threats Are Listed.

...Instructions: You are presented with a list of some risks and threats associated with the seven domains of a typical IT infrastructure. Below the list, the solutions or preventive actions to manage those risks and threats are listed. Write the letter of the correct solution or preventative action in the blank to the right of each risk or threat. Risks or threats: 1. Violation of a security policy by a user _C_______ 2. Disgruntled employee sabotage _I_______ 3. Download of non-business videos using the Internet to an employer-owned computer ___A_____ 4. Malware infection of a user’s laptop ____L____ 5. Unauthorized physical access to the LAN _____N___ 6. LAN server operating system vulnerabilities ____F____ 7. Download of unknown file types from unknown sources by local users ___B_____ 8. Errors and weaknesses of network router, firewall, and network appliance configuration file ___H_____ 9. WAN eavesdropping _____M___ 10. WAN Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks ___D_____ 11. Confidential data compromised remotely __K______ 12. Mobile worker token stolen __G______ 13. Corrupt or lost data _____E___ 14. Downtime of customer database ____J____ Solutions or preventative actions: A. Enable content filtering and antivirus scanning at the entry and exit points of the Internet. Enable workstation auto-scans and auto...

Words: 447 - Pages: 2

Infrastructure

... delivery mechanisms. The computer-based state Load Dispatch Centre at Mamidipudi 400 kV substation near Hyderabad has been made operational in August 2002. This is part of the World Bank funded Southern regional Load Dispatch project executed by GE-Harris. Rural Electrification Corporation has decided to give loan of Rs. 13.7 billion to AP Transco to bring down its losses. AP Transco will use the amount to provide electricity for 8,000 habitations, energies pumpsets, create infrastructure for supply of electricity to all villages, and metering a distribution transformers and 11 kV feeders. It is also reported that WB, DFID, JBIC, ____________________________________________________________ __________________________ Issue-4, August 2002 Prayas 8 India Power Sector Reforms Update ____________________________________________________________ __________________________ REC and PFC have sanctioned Rs. 72.82 b for strengthening the transmission & distribution system in AP. In the distribution front, the Chief Minister inaugurated a computer based SCADA system, set up by ABB with funding from DFID (about Rs. 300m) on May 31, 2002. Central Power Distribution Company Ltd. has plans to make distribution LT-less in Hyderabad City. This project called High Voltage Distribution System (HVDS) project will cost about Rs 2.5 b. Distribution companies are expected to be privatised by 2003-4 as per the reform time table. It is reported that a study on distribution privatisation......

Words: 5753 - Pages: 24

Digital Domain

... DIGITAL DOMAIN |Question 1 | |1 / 1 point |  Which of the following was the first type of switch used within computers?  | |[pic] |a)  | | | |Transistor | | | | | |[pic|[pic] |b)  | |] | |Vacuum Tube | | | | | | |[pic] |c)  | | | |Integrated circuit | | | | | | |[pic] |d)  | | | |None of the above | | | | | |Question 2 | |1 / 1 point |   |____________________ law states that the number of transistors on an integrated circuit doubles every 18 months. | |Answer: |Moore's |[pic] | |Question 3 | |1 / 1 point | |Which of the following is the alternative name for an integrated circuit...

Words: 1237 - Pages: 5

Infrastructure

...Integrated Distributors Incorporated (IDI) is a publicly traded company headquartered in Billings, Montana with over 4,000 employees in 8 locations worldwide. IDI has accounts with major market retailers, and Federal and State governments operating a fleet of delivery trucks in each of its locations across the globe offering freight forwarding, storage and delivery. In the past few months, IDI has suffered a number of network compromises through an unsecured site leading to the disclosure of business sensitive and companywide strategic information pertaining current contract negotiations and company mergers. IDI CIO has enlisted the help of an Information Systems Infrastructure Architect and An Information Systems Security Specialist to investigate and recommend improvements to IDI’s IT Infrastructure. To date, IDI’s network weaknesses out way the network strengths. The larger of the weaknesses is that IDI has no secondary locations in the event of a large scale disaster. Second to that is the lack of security implementations at some of the sites, i.e., Remote access to the Warsaw office runs through a completely unsecure channel and the blatant disregard for adherence to network security policies at the home office. Further evaluations of some of IDI sites have led us to come up with a fairly comprehensive plan to fix and mitigate and major issues that may arise in the future. Our greatest challenge will be to ensure that all sites are working towards the same goal...

Words: 3151 - Pages: 13

Infrastructure

...; conditionally poor roads, railways, ports and weak information and communication technology services. * The depressing situation of infrastructure deficiencies is also combined with the unpredicted urban growth which resulted in the explosion of informal settlements (slums) all over the African continent (Blinde and mayor, 2001). * Another characteristic of urbanization in SSA is that it’s happening without development, which results in a rapid increase in urban poverty which is clear and manifested in the formation of slums (Arimah, 2010). * Taken as a whole, all these constraints corrode Africa’s competitiveness and make exporting African goods and services to the global marketplace nearly impossible. According to the World Bank’s 2009 doing business, most SSA countries with few exceptions, rank in the bottom 40% of all countries in trading across the national borders. Literature review Definition and key infrastructure sectors: * Characteristics of infrastructure: A. Public, nonexclusive goods accessible to all people. B. It has long payback periods. C. Its output is paid for by local currency. D. Sensitive to corruption and political power centralization. * The definition of infrastructure is not being shifted from only focusing on physical assets such as roads, airports, sea ports, telecommunication systems and water distribution systems; as it is now often include “softer” types of infrastructure such as the information......

Words: 2755 - Pages: 12

Eminent Domain

...Eminent Domain Under the Fifth Amendment of United States Constitution, the government is provided the power to enforce eminent domain and take private property for public use. This provision allows this provision as long as adequate compensation is being made for the property. Article 1, Section Seventeen under the Texas Constitution prohibits the taking, damaging or destruction of property for public use without adequate compensation. Generally, there are four elements of eminent domain but ultimately the actor must be the state or a private party authorized by the state to condemn the property. The power to condemn must be conferred by the legislature and only upon a two-thirds vote of both houses will it be granted. The primary private parties that are empowered to perform eminent domain are gas or electric corporations, groundwater conservation districts and common carrier pipelines. Once the property has been identified, the Condemner must provide plans for the public project and indicate the exact location of the private land needed for the project. Once this information is acquired, a declaration must be made that certain property rights must be obtained to complete the project and that all property owners involved must be notified. Element one consists of the property taken must be for public use and in 2009, voters approved a constitutional amendment further clarifying public use. To understand the purpose of public use, it is necessary to note it is...

Words: 965 - Pages: 4

Typical Norwgians

...Typical Norwegians «That is so typical Norwegians», you often hear, but what does it mean? What is special about Norway and the citizens there, and when can you say that you are a truly Norwegian person? Norway is a multicultural country with habits from all over the world. They eat taco, pizza and burgers, and they do yoga and play ice hockey. Even though they play ice hockey and eat taco, they do have some traditions that is typical Norwegians. Norwegians love nature. They are proud of the fjords and the mountain. They like to take a hike in the mountain. Today, the majority of Norwegians lives in the city, however most Norwegians have a cabin, either on the mountain or by the sea. They like to live the simple life and spend time out of the city. In addition, they do use a lot of time on their cabin. Many people celebrate Christmas and Ester, and use most of their vacation at the cabin. Everyone loves food, especially Norwegians. A typical Norwegian family etas taco every Friday and pizza every Saturday, but that is not traditional Norwegian food. In Norway, we have something called “Brunost”, directly translated is means brown chees. “Brunost” is used as increase on bread, often with jam underneath. It is really good! As I said in the beginning; most Norwegians eat pizza every Saturday, but there is one kind of pizza that the Norwegians are well known for, and that is the “Grandiosa”. You can find a “Grandiosa” in every freezer across the country. The “Grandiosa...

Words: 436 - Pages: 2

The Seven Domains of a Typical It Infrastructure

...THE SEVEN DOMAINS OF A TYPICAL IT INFRASTRUCTURE 1. User Domain defines the people who access an organization’s information system. 2. WORKSTATION DOMAIN is where most users connect to the IT infrastructure. It can be a desktop computer, or any device that connects to your network. 3. Local Area Network (LAN) DOMAIN is a collection of computers connected to one another or to a common connection medium. Network connection mediums can include wires, fiber optic cables, or radio waves. 4. LAN-TO-WAN DOMAIN is where the IT infrastructure links to a wide area network and the Internet. • Basically, a firewall controls, prevents, and monitors incoming and outgoing network access. It is the job of the firewall to prevent unauthorized network access, both from outside and inside network users. Depending on the type of firewall, data packets sent to and from the network pass through the firewall, and all this data can be checked for whether it is allowed for transfer. • Two main types of firewalls: network firewalls and host-based firewalls. Network firewalls, such as the software-based Microsoft’s Internet Security and Acceleration (ISA) Server or the hardware-based Nortel Networks Alteon Switched Firewall System, protect the perimeter of a network by watching traffic that enters and leaves. Host-based firewalls, such as Internet Connection Firewall (ICF—included with Windows XP and Windows Server 2003), protect an individual computer regardless of the network it’s...

Words: 542 - Pages: 3

Infrastructure

...INFRATSRUCTURE The Eleventh Five Year Plan emphasized the need for removing infrastructure bottlenecks for sustained growth. It, therefore, proposed an investment of US $500 billion in infrastructure sectors through a mix of public and private sectors to reduce deficits in identified infrastructure sectors. As a percentage of the gross domestic product (GDP), investment in infrastructure was expected to increase to around 9 per cent. For the first time the contribution of the private sector in total investment in infrastructure was targeted to exceed 30 per cent. Total investment in infrastructure during the Eleventh Plan is estimated to increase to more than 8 per cent of GDP in the terminal year of the Plan --higher by 2.47 percentage point s a s c ompa red t o the Tenth Pl an. The private sector is expected t o be contributing nearly 36 per cent of this investment. RAILWAYS Some of the major goals set for Vision 2020 in the document include (a) laying of 25,000 km of new lines; (b) quadrupling of the 6,000 km network with segregation of passenger and freight lines; (c) electrification of 14,000 km; (d) completion of gaugeconversion; (e) upgradation of speed to 160-200 kmph for passenger trains; and (f) construction of 2,000 km of high-speed rail lines. • Freight performance: Freight loading on Indian Railways during April-November 2011 was 618.0 MT as compared to 593.4 MT in April-November 2010, an increase of 4.14 per cent...

Words: 1202 - Pages: 5

Infrastructure

...Indian Infrastructure With all the battering that we do to the infrastructure sector, there is also some good news. First is that Gross Capital Formation in Infrastructure is increasing. The 10th Plan average was 5.1 per cent of GDP. It is expected to be 7.1 per cent in the 11th Plan and estimated to go up to 9.7 per cent in the 12th Plan. In the early 1990s, we used to envy China at 9 per cent, saying can we ever match China when we were doing 3 per cent. This is tremendous good news, where across shades of different political dispensation we have had a silent movement of the tectonic plates of India's infrastructure geoplates. To achieve this in the kind of polity and democracy we are, in a space of 15 years, has been a major structural shift. Second, private-public-partnership is above expectations. During the 10th Plan, 25 per cent of our infrastructure was through PPP. The 10th Plan was largely driven by telecom and the early power projects. In the 11th Plan, the target was 30 per cent, but we achieved 37 per cent and in the 12th Plan there is reasonable confidence that we will do 50 per cent. This is a major change in India's infrastructure development. In the 10th Plan, the investment was $220 billion, of which 25 per cent came through PPP. In the 11th Plan, it is almost $480-500 billion of that 37 per cent, and 50 per cent of $1,000 billion in the 12th Plan. The third is we constantly debunk the Planning Commission. India is one of the few countries that officially...

Words: 1722 - Pages: 7

Infrastructure

... countries. Supporting infrastructure development in developing countries by advanced countries is extremely important field. This can be inferred from the fact that many international organizations such as World Bank and OECD are actively promoting the improvement of infrastructure by providing various support programs to developing countries. However, the precise relationship between infrastructure and economic growth is still frequently debated. Good infrastructure helps to raise productivity and lower costs in the directly productive activities of the economy, but it has to be expanded fast enough to meet the demand for infrastructure in the early stage of development. Construction expense for infrastructure such as energy and transportation sector is enormous and construction period is also long. Prediction of demand pattern and investment allocation, which are the key factors of infrastructure development planning, must be based on a long term economic development trend and land use planning, which predicts the country’s temporal and spatial demographics and economic structure. Postwar, Japan and Korea had received a large amount of concessional loans and grants from the US and international organizations for rebuilding economic infrastructures. These valuable experiences give * Graduate School of International Cooperation Studies, Kobe University e-mail: kim_byoungki@hotmail.com 1 Il Sakong (1993) emphasized that the late developers can draw valuable lessons......

Words: 11379 - Pages: 46