Unit 4 Assignment 2

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

1.

Domain
This Domain is where only one user will have entrance to it. This can be configured to internal
usage only. By default, the IT department tries to sustain a certain level of Security for this, so
that nobody can enter from the outside, only the IT Department may grant access privilege for
Remote Access. The User Domain will enforce an acceptable use policy (AUP) to define which
user can and cannot do with any company data that he or she has access to. Also, every user on
the company is responsible for the safekeeping of the environment.
2. LAN Domain
The Local Area Network Domain is a group of computers that are all connected to a single LAN
domain. The LAN Domain is a collection of computers connected to each another or to a
common medium. All LAN domains have data closets, physical elements of the LAN, and
logical elements as designated by authorized personnel. It involves strong security and access
controls. This domain can access company-wide systems, applications, and data from anyplace
within the LAN. The LAN support group is in control of maintaining and securing the
domain. The biggest threat to the LAN domain is an Un-authorized access to anything on the
network. For example: LAN, the systems, and data. One thing we can do is require strict security
protocols for this domain, such as disabling all external access ports for the workstation. This
would cause a no access protocol.
3. Workstation Domain
Workstation Domain is where all the users work. Before a user can log into the machine, he or
she will need to be confirmed in order to gain admission.

At Richman Investments, we will

provide a secure access point for every employee workstations with username and password
permission as well as a security protocol requires the password to be changed every 30 days. All
computers would also maintain a regular systems update and uninterrupted antivirus protection
for monitoring. Additionally, no personal devices are permitted on the network.
References:
Solomon, Michael, and David Kim. Fundamentals Of Information Systems Security. Burlington:
Jones ,

You might also like