

A workstations browser can have a software vulnerability which allowsunsigned scripts to silently installmalicious software.The workstations OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.Workstation Domain.A computer of an individual user where the production takes place.User can insert infected CD or USBflash drive into the work computer.User can find that his girlfriendcheated on him and use her passwordto delete all of her work so that shewould be fired.User can destroy data in application and delete all.User Domain.The User Domain covers all theusers that haveaccess to the other six domains.It only takes one unprotected domain for an attacker to gain access to private data. It is very imperative for businesses to protect each of these seven domains. Each of these domains is viewed as portals for attackers if countermeasures are missing or fail.

They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain.

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. The Seven Domain Of A Typical It Infrastructure This ensures all remote connections are secure, through an encrypted tunnel, and maintain confidentiality and integrity of data in transit. Remote Access Domain The VPN policy would be typical for this domain. It can handle the bandwidth, traffic segmentation, and address range issues. WAN Domain An Access Point policy would be important for this domain to root out security concern that can occur when two or more LANs are connected. This policy would enforce the implementation and configuration of a perimeter firewall, as well as ensure that its logs are monitored diligently. LAN to WAN Domain It would have a perimeter firewall policy. This would prevent authorized changes and prevent vulnerabilities from creeping into the LAN domain. This policy would enforce the documentation of baseline hardened configurations of all devices on the Local Area Network and monitoring and tracking of any changes. LAN Domain Configuration Change Control policy. This would ensure that all PCs, laptops, and mobile devices are safeguarded with full-disk encryption and ensure confidentiality of the organizations data. Workstation Domain This domain would have an encryption policy. It would ensure that confidential hard copies of data arent left in plain view. User Domain policy Clean desk policy would be a user domain policy. Policies For The Seven Domains Of A Typical It Infrastructure Lack of security policy governing the network. IT Employees may lack the experience, or the time, in designing and maintaining a secure network. Limited IT security knowledge by employees can lead to the introduction of malware and social engineering schemes.Įmployee negligence from a lack of policy can lead to legal ramifications for the business. The following risks have been identified within this domain:Įmployees that fail to lock their computers when getting up from their desks.Įmployees that leave sensitive company information on their desks. With almost 90% of cyber-attacks caused by human error or behavior, this domain needs strong scrutiny. This domain includes any end-user accessing information at the organization.

The User Domain represents a great weakness within the IT infrastructure. The following information will help demonstrate the importance of securing the seven domains of IT infrastructure. When these duties are performed in the absence of clear direction from policy and best practices, risk can grow exponentially. Additionally, the people within the organization can intentionally or unintentionally introduce risk simply by performing their daily job duties. These risks must be identified and managed in order to defend and protect the organization from attack. When a business environment is opened up to the Internet, many risks can be introduced into the organization. Please assit with Lab 8 question 10 of Security Risk Managmentġ0.) In your Lab Report file, create an outline of the BCP sections and subtopics that apply to the Mock IT infrastructure.Module 9: The Seven Domains of a Typical IT Infrastructure
