1/27
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
domain
In networking, ______ a refers to a group of users, workstations, devices, printers,
computers, and database servers that share data via network resources. A
domain controller governs functions and manages security, handling user
authentication, passwords, and resource access.
Key IT Infrastructure Domains and Their Risks
User Domain
Workstation Domain
LAN Domain
WAN Domain
User Domain
Covers all users with access to other domains. Risks include intentional or unintentional data destruction, password misuse, and introducing infected media.
Workstation Domain
Individual user computers where production occurs. Risks involve OS vulnerabilities allowing remote access, browser vulnerabilities installing malware, and hard drive failure leading to data loss.
LAN Domain
Contains workstations, hubs, switches, and routers, considered a trusted zone. Risks include malware spreading, OS vulnerabilities, and unauthorized access to workstations.
WAN Domain
Consists of the Internet and semi-private lines. Risks include major network outages from service providers, Denial of Service (DoS) attacks, and anonymous FTP uploads of illegal software.
LAN/WAN Domain
This domain forms the boundary between trusted and untrusted zones, typically filtered by a firewall. Keyrisks include hackers penetrating the IT infrastructure to gain internal network access and firewalls with unnecessary open ports allowing internet access.
System/Application Storage Domain
This domain comprises user-accessed servers like email and databases. Risks include physical destruction of primary data (e.g., by fire), DoS attacks crippling email services, and SQL injection attacks corrupting database data
Remote Access Domain
The ______ ______ ____ allows mobile users to access the local network, often
via a VPN. This increases productivity and enables global collaboration. Technical
support also uses remote access to resolve user issues.
Virtual Private Network
A _______ _______ _______ creates a secure, encrypted connection over less
secure networks like the Internet, enabling remote users and branch offices to
securely access corporate applications and resources.
IPsec VPN
A common remote access technology where a "VPN client" software is
installed on the end user's computer. It's configured with target
network details like gateway IP address and a pre-shared security key.
SSL VPN
Uses Secure Socket Layer encryption for secure communication.
The network administrator publishes the VPN client to the
firewall for download via its public connection.
Microsoft DirectAccess
A newer technology creating an "always on" secure connection at
the operating system level. Users do not need to install software
or launch programs.
System/Application Domain: Threats and Vulnerabilities
Unauthorized Physical Acces
Unauthorized Logical Access
Software Vulnerabilities
Server Vulnerabilities
Unauthorized Physical Access
Gaining access to physical areas like computer rooms or data
centers without permission, leading to theft, alteration, or
destruction of systems and data.
Unauthorized Logical Access
Accessing systems digitally without permission, potentially by staff
or experienced attackers, leading to data destruction, alteration,
disclosure, or DoS attacks
Software Vulnerabilities
Flaws in software programming allowing malicious attackers to gain
unauthorized access via exploits or malware. This can affect OS,
common applications, and custom software.
Server Vulnerabilities
Similar to software vulnerabilities but potentially more damaging onservers, affecting services (FTP, SSH, PHP) or the server's operating system.
Data loss
the destruction of digitally stored information, is the greatest risk to the system/application domain. It can occur during storage, transmission, or processing, hindering users from creating, storing, retrieving, and manipulating data.
Physically secure sensitive areas
Implement encryption and data handling standards.
Minimize data access.
Back up data regularly.
Monitor all network applications.
Plan, configure, and maintain network servers.
Develop and implement security standards.
Adhere to Acceptable Use Policy and report violations.
Cyber Ethics: Responsible Behavior Online
Do Not Use Offensive Language
Avoid Cyberbullying
Do Not Plagiarize
Respect Digital Property
Adhere to Copyright
Cyber ethics
refers to the code of responsible behavior on the Internet. The basic rule is: "Do not do something in cyberspace that you would
consider wrong or illegal in everyday life."
Respect Digital Property
Do not break into computers, use others' passwords, or attempt to infect systems
Adhere to Copyright
Respect restrictions when downloading material like software, games, movies, or music.
Ethics Manifesto and Professional Values
Right to Remain Natural
Right to Be Inefficient
Right to Disconnect
Right to Be Anonymous
Right to Employ People
Gerd Leonhard's Ethics Manifesto
proposes a framework for "ethics in technology," focusing on human rights in an era where machines gain human-like characteristics. It highlights five specific rights
Security Policy
It is the statement of responsible decision makers about the protection mechanism of a company’s crucial, physical, and information assets. Overall, it is a document that describes a company’ssecurity controls and activities