Seven Domains Of A Typical It Infrastructure

Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions: * Where does the countermeasure belong in the seven domains of a typical IT infrastructure? * What CIA functions does the countermeasure provide? Provide your answers in the table below. Network Security Applications and Countermeasures | Domains | CIA Function | Ethical hacker | * Workstation domain | Availability |Intrusion detection system/intrusion prevention system (IDS/IPS) | * System/Application domain * Remote access domain * LAN-to-WAN domain | Integrity | Access controls | * LAN-to-WAN domain * WAN domain | Confidentiality | Failover server | * WAN domain * LAN-to-WAN domain | Availability | Automatic updates | * Workstation domain | Availability | Cryptography | * LAN-to-WAN domain | Confidentiality | Data backups | * System/Application domain | Availability | Logon rights | * LAN domain | Integrity |Computer cluster | * Workstation domain | Integrity | Firewalls | * LAN domain | Confidentiality | Proxies | * LAN-to-WAN domain | Integrity Confidentiality | Antivirus scanners | * Workstation domain | Confidentiality | As a reminder, the seven domains of a typical IT infrastructure include the following domains: * User domain: Actual users * Workstation domain: Workstations, laptops, and end-point devices, such as smart phones and printers * LAN domain: Physical and logical LAN technologies—100 Mbps/1000 Mbps switched Ethernet, 802. 1-family of wireless LAN technologies—used to support workstation connectivity to the organization’s network infrastructure * LAN-to-WAN domain: Routers, firewalls, demilitarized zones (DMZs), and IDS/IPS * WAN domain: Routers, circuits, switches, firewalls, gateways, and equivalent gear at remote locations, sometimes under a managed service offering by the service provider * Remote access domain: Virtual private networks (VPNs), laptops with VPN software, and secured socket layer/VPN (SSL/VPN) tunnels * System/Application domain: Hardware, operating system software, database oftware, client/server applications, and data that are typically housed in the organization’s data center and computer rooms Representation of the Seven Domains of a typical IT Infrastructure

Leave a Reply

Your email address will not be published. Required fields are marked *

x

Hi!
I'm Heidi!

Would you like to get a custom essay? How about receiving a customized one?

Check it out