Unit 1 Assignemet 1 Essay

Submitted By fatboyontop
Words: 457
Pages: 2

In a proper IT infrastructure, it consists of seven total domains. Each domain’s overview consists of risks, threats, and the vulnerabilities that will be found in today’s society. Here I will explain three of the IT infrastructure domains affected by the “Internal Use Only” data classification standard. The first domain is the User Domain. The user domains consist of the Acceptable use policy. This is the guidelines that each user must follow within an organization. If any of these rules are violated, the employee can be terminated. The AUP consist of all the asset of the Richman Investment Company. It is the responsibility for the company to have all employees’ sign a legal document that ensure all assets will be kept confidential. The user domain structure is the weakest link of any infrastructure and has several risks associated with it. There is lack of awareness, and it can be controlled by conducting security awareness training. Another risk is user apathy toward policies, and it can be controlled by implementing acceptable use policies and updating staff manuals and handbooks.
The second domain is the workstation domain. A workstation consists of desktops, PDAs or smartphones, or laptops. All employees must have the proper rights and access to be efficient at their job. This tasks falls into the job description of the IT professionals to assign rights and grant access where needed. A few of the following risks are things that may occur within a workstation domain. The first is unauthorized access to workstation, and it can be controlled through enabling password protection and auto lockout screens. The second risk is viruses, and it can be controlled or prevented by enabling automated antivirus protection solution that scan and update periodically throughout the workstation.
The third domain is the LAN Domain. This stands for local area network, and…