IAS MIDTERM (TYPICAL DOMAINS OF IT INFRASTRUCTURE)

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

domain

In networking, ______ a refers to a group of users, workstations, devices, printers,

computers, and database servers that share data via network resources. A

domain controller governs functions and manages security, handling user

authentication, passwords, and resource access.

2
New cards

Key IT Infrastructure Domains and Their Risks

  • User Domain

  • Workstation Domain

  • LAN Domain

  • WAN Domain

3
New cards

User Domain

Covers all users with access to other domains. Risks include intentional or unintentional data destruction, password misuse, and introducing infected media.

4
New cards

Workstation Domain

Individual user computers where production occurs. Risks involve OS vulnerabilities allowing remote access, browser vulnerabilities installing malware, and hard drive failure leading to data loss.

5
New cards

LAN Domain

Contains workstations, hubs, switches, and routers, considered a trusted zone. Risks include malware spreading, OS vulnerabilities, and unauthorized access to workstations.

6
New cards

WAN Domain

Consists of the Internet and semi-private lines. Risks include major network outages from service providers, Denial of Service (DoS) attacks, and anonymous FTP uploads of illegal software.

7
New cards

LAN/WAN Domain

This domain forms the boundary between trusted and untrusted zones, typically filtered by a firewall. Keyrisks include hackers penetrating the IT infrastructure to gain internal network access and firewalls with unnecessary open ports allowing internet access.

8
New cards

System/Application Storage Domain

This domain comprises user-accessed servers like email and databases. Risks include physical destruction of primary data (e.g., by fire), DoS attacks crippling email services, and SQL injection attacks corrupting database data

9
New cards

Remote Access Domain

The ______ ______ ____  allows mobile users to access the local network, often

via a VPN. This increases productivity and enables global collaboration. Technical

support also uses remote access to resolve user issues.

10
New cards

Virtual Private Network

A _______ _______ _______ creates a secure, encrypted connection over less

secure networks like the Internet, enabling remote users and branch offices to

securely access corporate applications and resources.

11
New cards

IPsec VPN

A common remote access technology where a "VPN client" software is

installed on the end user's computer. It's configured with target

network details like gateway IP address and a pre-shared security key.

12
New cards

SSL VPN

Uses Secure Socket Layer encryption for secure communication.

The network administrator publishes the VPN client to the

firewall for download via its public connection.

13
New cards

Microsoft DirectAccess

A newer technology creating an "always on" secure connection at

the operating system level. Users do not need to install software

or launch programs.

14
New cards

System/Application Domain: Threats and Vulnerabilities

  • Unauthorized Physical Acces

  • Unauthorized Logical Access

  • Software Vulnerabilities

  • Server Vulnerabilities

15
New cards

Unauthorized Physical Access

Gaining access to physical areas like computer rooms or data

centers without permission, leading to theft, alteration, or

destruction of systems and data.

16
New cards

Unauthorized Logical Access

Accessing systems digitally without permission, potentially by staff

or experienced attackers, leading to data destruction, alteration,

disclosure, or DoS attacks

17
New cards

Software Vulnerabilities

Flaws in software programming allowing malicious attackers to gain

unauthorized access via exploits or malware. This can affect OS,

common applications, and custom software.

18
New cards

Server Vulnerabilities

Similar to software vulnerabilities but potentially more damaging onservers, affecting services (FTP, SSH, PHP) or the server's operating system.

19
New cards

Data loss

the destruction of digitally stored information, is the greatest risk to the system/application domain. It can occur during storage, transmission, or processing, hindering users from creating, storing, retrieving, and manipulating data.

20
New cards
  • Physically secure sensitive areas

  • Implement encryption and data handling standards.

  •  Minimize data access.

  • Back up data regularly.

  • Monitor all network applications.

  • Plan, configure, and maintain network servers.

  • Develop and implement security standards.

  • Adhere to Acceptable Use Policy and report violations.

21
New cards

Cyber Ethics: Responsible Behavior Online

  • Do Not Use Offensive Language

  • Avoid Cyberbullying

  • Do Not Plagiarize

  • Respect Digital Property

  • Adhere to Copyright

22
New cards

Cyber ethics

refers to the code of responsible behavior on the Internet. The basic rule is: "Do not do something in cyberspace that you would

consider wrong or illegal in everyday life."

23
New cards

Respect Digital Property

Do not break into computers, use others' passwords, or attempt to infect systems

24
New cards

Adhere to Copyright

Respect restrictions when downloading material like software, games, movies, or music.

25
New cards

Ethics Manifesto and Professional Values

  • Right to Remain Natural

  • Right to Be Inefficient

  • Right to Disconnect

  • Right to Be Anonymous

  • Right to Employ People

26
New cards

Gerd Leonhard's Ethics Manifesto

proposes a framework for "ethics in technology," focusing on human rights in an era where machines gain human-like characteristics. It highlights five specific rights

27
New cards

Security Policy

It is the statement of responsible decision makers about the protection mechanism of a company’s crucial, physical, and information assets. Overall, it is a document that describes a company’ssecurity controls and activities

28
New cards