Nt1310 Unit 4 Lab Report File

Words: 1607
Pages: 7

STEP 4: In your lab report file, describe how risk can…..

1. User Domain: Anybody who uses the IT system in a particular set up is referred to as a user. They may be general users of the IT system or employees or contractors or consultants. Users are probably the most vulnerable domain in an IT system because of the following reasons:
a) may not understand the importance of complex passwords
b) may become a prey of the gimmicks of the social engineers.
c) may jeopardize the secrecy of the password by noting it in his notebook or in the system itself.
d) may download infected software corrupting the whole system.
e) may plug in their personal infected devices in the network computer ad upset the whole network (Gibson, 2015).

2. Work station
…show more content…
17. Nurse downloads an unknown e-mail attachment - Most impacted domain is Workstation Domain. email attachments may contain malware which can either corrupt the workstation completely or send out confidential data from the system to the hacker.

18. Service provider has a major network outage - Most impacted domain is Users Domain.
With a network outage, users will not be able to use various system/application needed to help the patients in need.

19. A technician insert CDs and USB hard drives with personal photos, music and videos on organization-owned computers - Most impacted domain is LAN Domain.
The personal files may have viruses that can impact the host computer and finally can be spread over the LAN to other computers.

20. Virtual Private Network (VPN) tunnelling between the remote computer and ingress/egress router - Most impacted domain is Remote Access Domain.
VPN is setup to access LAN over the internet. The Internet carries a inherit risk of hackers and malwares which can be easily injected into the private