Impacts of Data Classification Standards Essay

Through my research I have found three basic domains that are affected by the “internal use only” data classification standard. What I would like to discuss in this report addressing IT infrastructure is how these three domains are affected. I will be discussing the User Domain, Workstation Domain, and LAN Domain and will cover everything from the end user to the internet.

The User Domain controls who has what access to what information within the organization and enforces the APU or Acceptable Use Policy. The APU only allows the user to access or work within the set parameters of what has be set as acceptable use. This is the weakest point in the IT infrastructure and it is the user’s responsibility act with integrity around this domain.

The Workstation Domain is where the user is able to access the company network and use resources that are not on their host station. This is to allow the worker to easily be able to get the data or applications they may need. For the company’s network’s security usually the IT departments will set up user names and passwords or can allow access through managing the active directory. They will also have anti-virus protection as well as undergo regular updates and scans. Since this would be a company network it would be not acceptable to have personal devices on the network unless preauthorized by management.

The LAN Domain is the big picture of what the company network has. It is a collection of all the host and devices on the network and also including all the physical networking of the company’s network. The LAN Domain needs to be very secure due to the vast amount of components involved. One of the biggest threats can be as simple as unauthorized access on the company’s local area network.

Read also  Checkpoint Switching

More Essays

  • Impact of a Data Classification Standard

    IMPACT OF A DATA CLASSIFICATION STANDARD Being a mid-level financial investment and consulting firm, we are governed by laws to protect personal data of our customers. To reduce risks and threats the company needs to develop an IT Security Policy Framework that contains four main components: Policy,...

  • The Dawn of the Net

    In the video of warriors of the . net the whole way of accessing the internet is described, the devices which the information goes through in the form of packaged data, the summary is as follows: When we enter a web address on the internet explorer it is considered as a package in which all the information...

  • Networking Concepts

    I would tell Fred to use the Peer-to-Peer architecture or the Client Server architecture both have pro's and con's. The reason that I would tell him to use the Peer-to-Peer architecture is in a peer to peer architecture, workstation on the network will be able to shares its files equally with the other...

  • Patton Fuller Community Hospital Request for Project

    The following document shall serve as the RFP (Request for Project) for the Patton-Fuller Community Hospital. Team A has researched the hospital's current IT systems seeking ways to ensure many years of continued success and compliance with the very best practices in the IT community today. Specific areas...

  • Why Is It Impractical for an Organization to Own the Entirety of a Wan_

    Why is it impractical for an organization to own the entirety of a WAN? There are no limitations on WANs so they can be custom built for the size of the organization. Why is it favorable for an organization to maintain ownership of the entirety of the LAN? For the purpose of organizational...

  • Backbone Network

    The chapter starts out explaining how a BN (Backbone Network) works. Backbone Network: Connecting all of the LANs of an organization entails another type of network (BN). A properly designed backbone network provides a high-speed circuit that serves as the central conduit across which the LANs of an...

  • Checkpoint Switching

    Packet switched networks move data in small blocks, or packets based on the destination address in each packet. When they are received the packets are reassembled in sequence to make up the message. Circuit switched networks rely on dedicated point-to-point connections during transmission. There are many...

  • Performing Protocol Captures

    1.Which tool is better at performing protocol captures and which tool is better at performing protocol analysis? Wireshark is better for performing protocol analysis and Netwitness Investigator is best at performing protocol captures. Wireshark does well at both aspects, which makes it a little...

  • Network Security

    The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure...

  • Introduction to Information Security

    Security Domains and Strategies Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT...

Read also  Performing Protocol Captures