1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
3 years ago
6

Create a security management policy that addresses the management and the separation of duties throughout the seven domains of a

typical IT infrastructure. You are to define what the information systems security responsibility is for each of the seven domains of a typical IT infrastructure?
Computers and Technology
1 answer:
klio [65]3 years ago
6 0

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain.

Explanation:

User Domain : The User Domain covers all theusers (of any rank) that haveaccess to the other six domains.

RISKS:

  • User can destroy data in application(intentionally or not) and delete all
  • User can insert infected CD or USBflash drive into the work computer

Workstation Domain : A computer of an individual user where the production takes place

RISKS:

  • The workstation’s OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.
  • A workstation’s hard drive can fail causing lost data

LAN Domain : Contains all of the workstations,hubs, switches, and routers. TheLAN is a trusted zone

RISKS:

  • A worm can spread through the LANand infect all computers in it.
  • LAN server OS can have a knownsoftware vulnerability.

WAN Domain : Stands for Wide Area Network and consists of the Internet and semi-private lines

RISKS:

  • Service provider can have a major network outage.
  • Server can receive a DOS or DDOS attack.
  • A FTP server can allow anonymously uploaded illegal software

LAN / WAN Domain : The boundary between the trusted and un-trusted zones.The zones are filtered with a firewall

RISKS:

  • Weak ingress/egress traffic filteringcan degrade performance.
  • A firewall with unnecessary portsopen can allow access from the Internet

System / Application Storage Domain : This domain is made up of user-accessed servers suchas email and database

RISKS:

  • A fire can destroy primary data
  • A DOS attack can cripple the organization’s email

Remote Access Domain  :The domain in which a mobileuser can access the local network remotely, usually through a VPN

RISKS:

  • Communication circuit outage candeny connection.
  • Remote communication from officecan be unsecured.
  • VPN tunneling between remotecomputer and ingress/egress routercan be hacked
You might be interested in
Write a C program (doublecopy) that allows a user to extract some part of an existing file (fileSource) and copy it twice to a n
Slav-nsk [51]

Answer:

Check the explanation

Explanation:

#include <stdio.h>

#include <sys/stat.h>

#include <stdlib.h>

#include <fcntl.h>

#include <errno.h>

#include <unistd.h>

extern int errno;

struct stat st;

int main(int argc, char **argv){

  int num1 = atoi(argv[1]); // Getting num1 from user

  int num2 = atoi(argv[2]); // Getting num2 from user

  char *fileSource = argv[3];

  char *fileTarget = argv[4];

 

  int source_fd = open(fileSource, O_RDONLY); // opening the file in read only mode

  int target_fd = open(fileTarget, O_WRONLY | O_CREAT); // opening the target file in Writeonly mode if file is not found it will create

   

  char *ch = (char *) calloc(num2+num1, sizeof(char));

 

  stat(fileSource, &st);

  if(st.st_size < (num1 + num2)){

      printf("File Size is smaller than the specified bytes\n");

      read(source_fd, ch, st.st_size); // reading the file upto the end

      write(target_fd, ch, st.st_size); // write to the file

      write(target_fd, ch, st.st_size); // two times writing to the file

  }else{

      if(lseek(source_fd, (off_t)num1, SEEK_SET) < 0 ) // moving the cursor to after the specified bytes from the start

      {

          printf("Some Error occured while seeking the file");

          return -1;

      }

      read(source_fd, ch, num2); // reading num2 bytes from the source

      write(target_fd, ch, num2); // writing two times to the target

      write(target_fd, ch, num2);

     

  }

 

  return 0;

 

}

1 2 #include <stdio.h> #include <sys/stat.h> #include <stdlib.h> #include <fcntl.h> #include <errno.h> #include <unistd.h> 4

The code screenshot and code output are attached below.

3 0
3 years ago
if the bleeding period of a woman is indicated by days of 1-5, then the days when the woman is highly fertile is between______,s
Lana71 [14]

Drink the blood because it taste like candy and juice.

8 0
3 years ago
The development of computer languages is classified into two categories .<br><br>true or false​
Vikki [24]

Answer:

False

Explanation:

Mark me as a brainliest

6 0
3 years ago
Please help
zvonat [6]

Answer:

First check the if the adapters on the router or site are connected (Ipconfig)

Next run a flush Dns to clear the sites dns logs (ipconfig/flushdns)

If non of that works you would run a restart on the server that is transfering data through the site.

If that doesn't work you will have to call a tech support from another company or your boss to tell him that there is nothing you can do and to ask for help!

Explanation:

Hopefully this helps! BTW I'm 13 so I wouldn't rely on my information that is personal what I would do though.

6 0
3 years ago
Briefly describe three (3) obstacles to becoming
Bingel [31]

Obstacles to becoming digital literates and solutions include:

1. Poor network connectivity. Solutions are:

  • Use good network service providers.
  • Find a good location with good internet facilities.

2. Authenticating Information. Solutions are:

  • Ensure you do a thorough research before sharing any information on the internet.
  • Learn to be critical with information.

3. Excessive Use of the Internet. Solutions are:

  • Always have a target of what you want to achieve with the internet.
  • Avoid unproductive activities.

<h3>What is Digital Literacy?</h3>

Digital literacy can be defined as the ability or skills needed to be able to access information and communicate via internet platforms, mobile devices, or social media.

<h3>Obstacles to becoming Digital Literates</h3>

1. <u>Poor Network Connectivity</u>: In areas where network connectivity is poor, digital literacy becomes difficult to achieve as accessing the internet to source information would be impeded. The solutions to this are:

  • Use good network service providers.
  • Find a good location with good internet facilities.

2. <u>Authenticating Information:</u> The internet is awash with information, most of which may not be verifiable, when a user becomes misinformed, they tend to have biases which affects their critical thinking. Solutions to this are:

  • Ensure you do a thorough research before sharing any information on the internet.
  • Learn to be critical with information.

3. <u>Excessive Use of the Internet:</u> People tend to spend much time on the internet which at the end of the day becomes unproductive. Solutions to this include:

  • Always have a target of what you want to achieve with the internet.
  • Avoid unproductive activities.

Learn more about digital literacy on:

brainly.com/question/14242512

6 0
3 years ago
Other questions:
  • You’ve been hired to help with installing cable at a new office building for the local branch of the Social Security Administrat
    14·1 answer
  • Identify the correct options to complete the following passage.
    6·1 answer
  • Why are video texts an example of multimedia? A. They use audio and visual elements together. B. They use one type of medium to
    13·2 answers
  • Which type of natural hazard is sometimes caused by human activity?
    6·1 answer
  • True or false: its okay to sometimes compromise our values in order to resolve a conflict
    15·1 answer
  • What network monitoring technology enables a switch to copy and forward traffic sent and received on multiple interfaces out ano
    9·1 answer
  • You have the following code: string name; cout &lt;&lt; "Enter your name : "; cin &gt;&gt; name; If a user enters "Mary Smith" a
    10·1 answer
  • Does anyone have a pdf of the greatest by eddie van der meer????
    15·1 answer
  • It is important to consider the quality of the data being used when considering the accuracy of a conclusion. Incorrectly collec
    11·2 answers
  • Is there a way to delete a question on brainly?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!