This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Customer

Network domains

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Network domains

Q3. The business impact of the risk to a Video-on-Demand system distortion in the pricing and deletion of the content. A hacker who gains unauthorized access to the system may alter critical information such as the pricing of the available programs and may overcharge customers. Also, some content may be deleted, making the organization incur massive amounts of losses. The legal battles and fines that may follow after that will cause substantial financial injuries for the organization.

Q4. The domains with the highest number of threats and vulnerabilities are the LAN-to-WAN domain and the System/Application domain.

Q5. Critical Impact- Hacker penetrates IT infrastructure and gains access to your internal network. Significant Impact- WLAN access points are needed for LAN connectivity within a warehouse. Minor Impact- Weak ingress/aggress traffic filtering degrades the performance

Q6. The risk, threat, and vulnerability of loss of production data server would require a disaster recovery plan and a business continuity plan to help ensure continuity in case of an outage.

Q7. The User domain represents the most significant risk and uncertainty because the threat is faced from within the organization.

Q8. Remote Access domain requires encryptions and access controls for connectivity from home because the user is not under close organization surveillance while using it. Also, it restricts systems access from the wrong hands.

Q9. Annual employees’ background checks and awareness training are required for the User Domain to help mitigate risk. It is essential because the organization must make sure the employees follow the policies and procedures of the organization.

Q10. Software vulnerability assessment should be done on the Workstation Domain to help mitigate risk.

Q12. It is necessary to have acceptable use policies on the User domain to minimize unnecessary user-initiated internet traffic. It is controlled and monitored by web content filters.

Q13. Web filters are implemented in the LAN-to-WAN Domain because it is the immediate domain facing the WAN into the public internet.

Q14. WLAN will fall under the LAN Domain if you implement WLAN to support connectivity for laptops in the Workstation Domain.

Q15. When a bank implements an online banking solution, its online banking servers and the public internet hosting will fall under the System/Application domain and LAN-to-WAN Domains, respectively. This system is fitted with firewalls and other intrusion detection systems.

Q16. The Statement is true. A customer who uses their personal computers to conduct online banking must use the HTTPS the secure and encrypted version.

Q17. A layered security strategy will help mitigate the risk of all seven domains through the provision of protection measures such as authentication of users, anti-virus, off-site data recovery storage, and encryption of data. The system allows for multiple controls to avert every threat that many passes. The strategy is highly effective, with most treats being thwarted.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask