Premium Essay

Internal Use Only

In: Computers and Technology

Submitted By mikaunailo
Words 286
Pages 2
I was asked to identify three domains that are affected by our “Internal Use Only” data classification standard. After doing some research I have found that the three domains most affected by the classification are the: User domain, Workstation domain, and LAN domain.
The user domain is made up of the people who access our information system. We currently have an AUP (Acceptable Use Policy) set in place for this domain. Any third party that requires access to our network is to sign an AUP and a confidentiality agreement. This domain is the weakest and the most affected by the classification for multiple reasons. There is lack of user awareness; make sure to conduct security training and place reminders around the office. You have blatant security violations; when there are violations place employees on probation and review the AUP. We also have users downloading various different files; Enable content filtering and automatic antivirus scans.
The workstation domain is made up of the devices that employees use to connect to the IT infrastructure. It is necessary to make sure all employees can easily access any tools needed to perform their work duties. This domain requires tight security and access controls because this is where users first access the system. This is where someone can enter the system to do damage. You can have unauthorized user access; make sure strong password protection and auto screen lockout are enabled. There can be software vulnerabilities and software patch updates; define a workstation OS vulnerability window policy to make sure it is consistently monitored and updated. Also we can get viruses or malware; again make sure to have automatic antivirus scanning enabled and set workstation antivirus and malicious code…...

Similar Documents

Free Essay

Internal Use Only

...NT2580 Unit 1 Assignment 2 Internal Use Only Here at Richmond Investments we need to ensure we meet a data classification standard when it comes to our employees accessing the internet from work provided computers and having access to privileged work related data. Under this standard we will implement standards for the LAN Domain, Workstation Domain, and the User Domain. For the LAN Domain we will need to secure the wiring closets, data centers, and computer rooms are secure. For access to these areas personnel will have to have the proper credentials and without them they will not be allowed access. We will need electronic door locks with a push button code. This would ensure that nobody can get into those rooms without that code. For the Workstation Domain we will require user name and passwords on all computers. This will ensure that access to the system will only be available to those that have already been added to the network by an IT Administrator. We will keep the computers up to date with current anti-virus software and regular monitoring. Only approved devices will be allowed to function with the workstations. This will eliminate possible outside threats from getting any data off the network in case they do gain access to an unlocked workstation. For the User Domain we will have an employee manual and acceptable use policy for all employees to follow. Each employee will be placed under the group in which they work for and only have access to the data......

Words: 421 - Pages: 2

Premium Essay

Internal Use Only

...​I was asked to identify three domains that are affected by our “Internal Use Only” data classification standard.  After doing some research I have found that the three domains most affected by the classification are the: User domain, Workstation domain, and LAN domain. ​The user domain is made up of the people who access our information system.  We currently have an AUP (Acceptable Use Policy) set in place for this domain.  Any third party that requires access to our network is to sign an AUP and a confidentiality agreement.  This domain is the weakest and the most affected by the classification for multiple reasons.  There is lack of user awareness; make sure to conduct security training and place reminders around the office.  You have blatant security violations; when there are violations place employees on probation and review the AUP.  We also have users downloading various different files; Enable content filtering and automatic antivirus scans. ​The workstation domain is made up of the devices that employees use to connect to the IT infrastructure.  It is necessary to make sure all employees can easily access any tools needed to perform their work duties.  This domain requires tight security and access controls because this is where users first access the system.  This is where someone can enter the system to do damage.  You can have unauthorized user access; make sure strong password protection and auto screen lockout are enabled.  There can be software......

Words: 426 - Pages: 2

Premium Essay

Internal Use Only Domains

...Internal use only is information that may or may not be confidential. That is shared within our organization and kept away from the public. With this being said it is imperative that we seek the fallowing to be incorporated within the standards in each domain. User Domain refers to the people who have access to the organizations equipment User domains tend to be the worst domain for security. The reasoning for this is the multitudes of social networking and the fallacy’s of the employee’s not even meaning to release information that could be detrimental. Employees are responsible for their own equipment. The best way to avoid this is to set up an Acceptable use Policy (AUP) that informs employees what they can and cannot do with company information, equipment, and resources. We must hold employees accountable who are abusing company’s AUP. Workstation Domain refers to the computers or electronic devices in which a user uses to access the system. The threats to this domain which vary from unauthorized access to downloading personal files, the best way to fix this is to “Harden” the system by setting up firewalls, anti-virus, malware programs and restricted access to popular web page such as Social networking websites, Music sites, and video web pages. Monitor of disable the installation of software and Restrict or disable the use of removable data devices unless authorized by system Administrators. A user that violates the AUP they should be given restricted access until......

Words: 457 - Pages: 2

Free Essay

Internal Use

...Investments “Internal Use Only” data classification policy applies to. “Internal Use Only” is used to classify any internal data shared within our organization that may or may not be confidential in nature but is not intended to leave the company. The three main domains affected by this policy are the User Domain, Workstation Domain, and the LAN Domain. The User Domain is anyone who accesses the company’s information system and is the weakest link in the infrastructure. Users will be strictly held to the acceptable use policy (AUP) which acts as a guidebook for what users are allowed to do with the company’s IT assets. Violation of the AUP can be grounds for immediate dismissal and/or legal actions. Any third party that may need access to our systems will need to adhere to these policies as well and will need to sign an agreement before any access is given. The Human Resources department will be responsible for ensuring that all employees have signed an agreement to the AUP. All employees must pass a background check and their identities verified by HR before any access to Richman’s systems are granted. The Workstation Domain is where most users will connect to Richman’s IT infrastructure. This includes all desktops, laptops, PDAs, smartphones, and tablets. No personal devices or removable media will be allowed to connect to Richman’s system. Any devices or removable media needed to conduct business will be issued by Richman’s IT department and be used for official matters......

Words: 334 - Pages: 2

Premium Essay

Internal Use Only

...at Richman investments, I was s asked to write a brief report that describes the "internal use only" data classification standard of Richman investments. I will list a few of the IT infrastructure domains that are affected by the standard and how they are affecting the domain and their security here at Richman investments. * User domain The user domain defines the people who access an organizations information system. In the user domain you will find an acceptable use policy (AUP). An AUP defines what a user can and cannot do with organization-owned IT assets. It is like a rulebook that the employees must follow. Failure to follow these rules can be grounds for termination. The user domain is the weakest link in an IT infrastructure. Anybody who is responsible for computer security understand what motivates someone to compromise an organization system, application, or data. Now I am going to list risk and threats commonly found in the user domain and plans you can use to prevent them. Lack of user awareness - solution - conduct security awareness training, display security awareness posters, insert reminders in banner greeting, and send email reminders to employees. Security policy violation- solution - place employee on probation, review AUP and employee Manuel, discuss during performance review. Employee blackmail or extortion- solution - track and monitor abnormal employee behavior and use of IT infrastructure during off hours. Alarms and alerts programmed within an......

Words: 297 - Pages: 2

Premium Essay

Internal Use Only Classification

...infrastructure. Assignment Requirements You are a networking intern at Richman Investments, a mid-level financial investment and consulting firm. Your supervisor has asked you to draft a brief report that describes the “Internal Use Only” data classification standard of Richman Investments. Write this report addressing which IT infrastructure domains are affected by the standard and how they are affected. In your report, mention at least three IT infrastructure domains affected by the “Internal Use Only” data classification standard. Your report will become part of an executive summary to senior management. Required Resources None Submission Requirements * Format: Microsoft Word * Font: Arial, Size 12, Double-Space * Citation Style: Chicago Manual of Style * Length: 1–2 pages * Due By: Unit 2 Self-Assessment Checklist * I have identified at least three IT infrastructure domains affected by the “Internal Use Only” data classification standard. * In my report, I have included details on how those domains are affected. Internal Use Only The term “internal use only” is a term that refers to information or data that could also include communications are intended to stay within the company. Items that are classified as “internal use only” is not always classified material. The results of this information being compromised could have a lasting negative affect on the company’s profits, any contracts or customers, and the creative......

Words: 835 - Pages: 4

Premium Essay

Internal Use Only

...infrastructure domains that are affected by the internal use only data classification standards as used in Richman Investment. The three main IT infrastructure domains that will be discussed in this report are User domain, Workstation domain, and LAN. “Internal Use Only”- This refers to data shared internally in an organization, which is not supposed to be disseminated beyond the confines of the company. Before such data can be shared, it must be approved. This information is considered critical. If compromised and found in the wrong hands, it may cost the organization lots of money and time before such problem can be solved and restored. “User Domain”- Most users who have access to the computer information system of the company have access to the user domain and this is the weakest domain in the infrastructure. Everyone who has this access must comply with an ‘Acceptable Use Policy(AUP)” whether you are a contractor, company employees, customers or third party representative. All users with access to this domain understand that wrongful dissemination of company`s data could compromise the whole computer information system. “Workstation Domain”- This domain includes workstations and computers that are approved by the company for an individual user. Users need verification before allowed access to the workstation domain. Most verifications are done with the use of usernames and passwords; everyone is asked to log in to ensure only people with the right......

Words: 404 - Pages: 2

Premium Essay

Richman Investments “Internal Use Only” Data Classification Standard Brief Report

...RICHMAN INVESTMENTS “INTERNAL USE ONLY” DATA CLASSIFICATION STANDARD Brief Report This Brief Report is to describe Richman Investments policy of “Internal Use Only” data classification standard. This document is to be used as an informational guide for any employee or third party representative who is to access any or all of Richman Investments internal data base information system. To access Richman Investments internal data base any user, employee or third party representative must agree to the acceptable use policy (AUP). “While confidential information or data may not be included, communications, documents or any data are not intended to leave the organization.” (Beecher, 2013) There are 3 types of IT infrastructure domains that are affected by the “Internal Use Only” data classification standard of Richman Investments listed as follows: User Domain is the first layer of the infrastructure and is defined as any person (single user) accessing Richman Investments internal data base information system who has agreed to the AUP. This Domain defines the user permissions. This is where the IT department defines what access each individual user will have on the network. This is considered to weakest link in the company’s infrastructure. Workstation Domain is the second layer of the infrastructure and is defined as the first access point to the Richman Investments internal data base information system, applications and data. This layer requires a login and password......

Words: 440 - Pages: 2

Free Essay

Medical Use Only

...say that it has a “high potential for abuse” (Medical) and should remain illegal. Among the arguments, proponents for medical marijuana have presented a stronger argument for legalization through their use of research and evidence. Opponents of medical marijuana have given many reasons for why it should not be legalized. One of the main reasons they argue is that “Marijuana smoke contains known carcinogens and produces dependency in users” (Medical). In many studies it has shown that it does have some harm such as the harms associated with smoking, but the National Academy of Science affirmed that “marijuana’s short term medical benefits outweigh any smoking-related harms for some patients”(Medical). Though marijuana has been proven to be damaging to the lungs than tobacco, a study in 2006 “found no evidence that marijuana smokers had higher rates of lung cancer” (Medical Marijuana). The FDA has tested the effectiveness of marijuana and has found that the cannabinoids are helpful in “treating pain associated with chemotherapy, postoperative recovery, and spinal cord injury, as well as neuropathic pain, which is often experienced by patients with metastatic cancer, multiple sclerosis,[and] diabetes” (Medical Marijuana). There is also no evidence shown that patients who use marijuana become addicted. Though the opposing side argues this, they show no evidence in supporting this claim, which therefore, the claim is invalid. There are many pharmaceutical drugs used for......

Words: 781 - Pages: 4

Premium Essay

I'M Only Posting This so I Can Use This Site

...heavy use of emotional appeal, and an underlying message. This is a flag for propaganda. The Kite Runner by Khaled Hosseini begins in the 1970s in Kabul, Afghanistan, when the country is in a time of an ending monarchy. The main character, Amir, is the son of wealthy Afghanistan business man, and his playmate, Hassan, the son of his father's houseman, Ali. Hassan is a Hazara and Amir is a Pashtun, which makes them from different social classes. The author has undoubtedly stirred my emotions and I admit that I did cry several times. I think that this was the author's objective; this is an appeal to emotion, one of the fallacies of propaganda. Propaganda is a message or an idea that persuades the audience to change their perspectives in one way or another. There are many faces of propaganda but this to my knowledge is one that is easy to recognize. I ‘m not saying I didn't like The Kite Runner, the author had me after the first chapter and then I couldn't put it down. However I am naïve when it comes to politics and propaganda, so at first I didn't even consider this book a form of persuasion. But as I thought about it, I came to the conclusion that The Kite Runner is just that. There are many oversimplifications and stereotypes, even if they may be from a reality-based ideology. The ethnic group of the Hazara and the Pashtun is not entirely developed. Amir was always referred to as a Pashtun but the background of the Pashtun isn't fully touched upon. The narrator only......

Words: 1102 - Pages: 5

Free Essay

Nt2580 Unit 1 Assignment: Internal Use Only Policy

...Charles Elliot 6/20/15 To: Richman Investments Employees. Subject: Internal Use Only Policy This report is to inform all members of Richman investments of their Internal Use Only policy. We will be discussing what this policy means, its effect on running day to day tasks on the network, and what protocols we are to follow when under the enforcement of this policy. Internal use only simply means that the data stays on site, or that an organization shares the information internally. And while the information may or may not be of a sensitive nature, there will be no exchange of data or communication of any kind outside of the organization. Any person(s) who wish to gain access to any information within Richman Investments infrastructure must authenticate themselves by logging on to their User profile and entering their password. All Users must agree and adhere to the AUP-Acceptable Use Policy. The AUP is a policy that states what a user can or cannot do with information from Richman Investments. Failure to adhere to the AUP will result in disciplinary actions both in their profession as well as legal disciplinary actions. The workstation is where the User connects to the infrastructure. There are no personal or recording devices or removable media of any kind allowed at the workstation. Richman Investments will provide and devices and removable media themselves, also these devices are never to leave the premises. The infrastructure administrators will determine which......

Words: 317 - Pages: 2

Premium Essay

Richman Investments “Internal Use Only” Data Classification Standard

...RICHMAN INVESTMENTS “INTERNAL USE ONLY” DATA CLASSIFICATION STANDARD Brief Report This Brief Report is to describe Richman Investments policy of “Internal Use Only” data classification standard. This document is to be used as an informational guide for any employee or third party representative who is to access any or all of Richman Investments internal data base information system. To access Richman Investments internal data base any user, employee or third party representative must agree to the acceptable use policy (AUP). “While confidential information or data may not be included, communications, documents or any data are not intended to leave the organization.” (Beecher, 2013) There are 3 types of IT infrastructure domains that are affected by the “Internal Use Only” data classification standard of Richman Investments listed as follows: User Domain is the first layer of the infrastructure and is defined as any person (single user) accessing Richman Investments internal data base information system who has agreed to the AUP. This Domain defines the user permissions. This is where the IT department defines what access each individual user will have on the network. This is considered to weakest link in the company’s infrastructure. Workstation Domain is the second layer of the infrastructure and is defined as the first access point to the Richman Investments internal data base information system, applications and data. This layer requires a login and password......

Words: 306 - Pages: 2

Premium Essay

Internal

...materials, waste, electricity, water, land, warehouses, security Cutting tools, documents, ... other things owned by company. * Employees have responsibility with use with the right purposes, keep and preserve the assets of company. Forbidden using the assets of company wastefully, carelessly, irresponsibly or stealing. * Any loss or damage the assets of company is caused by squandering, careless and irresponsibility or theft is disciplined. The employee is forced paying compensation and prosecuted in court in serious cases according to law. * The employee does not bring documents, books, specimens, supplies, machinery and equipment of the company out of the construction site, except with having the agreement of the Head of Department and announce to record tracking. * When there is no demand to use or when employee quits, the employee must be handed over the assets of company. Article 18: Awareness of thrift and anti-wastefulness * Absolutely do not use the telephone of company for personal purposes. In case, hearing the personal call by the telephone of company does not affect other important calls of company. Using the telephone for working must be reasonable, concise, and save enough to convey or handle work. * Only use the printer, copier, scanner, ... for the work of the company. Use of assets of company in save way while ensuring the job done well is priority. * Turn off electrical devices (computers, printers, lighting, air- conditioner,......

Words: 718 - Pages: 3

Free Essay

Internal Use Only

...Intern Douglas Jaycox I was asked to prepare a report concerning the “Internal Use Only” data classification standard set by Richmond Investments. This report will pertain to three layers of the IT infrastructure at risk concerning the Internal Use Only standard.. The first is the User Domain. The User Domain is the weakest link in the infrastructure Personal information is created at this layer of the infrastructure. That information can be used to obtain Internal Use Only information. The second is the Workstaion Domain. The Workstation domain is vulnerable due to the fact that it is where the user accesses the system, applications, and data for the company. You need login and password authentication to be allowed to access information. The third is the Remote Access Domain. At this layer security is very vulnerable due to wireless access. When using Remote Access more layers of security are needed to avoid someone intercepting the information sent over the Internet. By using Remote Access devices there are many ways that secure data can be compromised. In all of these areas login and passwords need to be used I also suggest using a second level of authentication by the use of security questions. After a specified number of failed attempts user should be locked out of system and an IT manager should be notified before access for that user is granted. VPN tunnels are another good thing to use because data is encrypted both going out and coming in. Above all......

Words: 299 - Pages: 2

Free Essay

Internal Use Only

...Investments “Internal Use Only” data classification policy applies to. “Internal Use Only” is used to classify any internal data shared within our organization that may or may not be confidential in nature but is not intended to leave the company. The three main domains affected by this policy are the User Domain, Workstation Domain, and the LAN Domain. The User Domain is anyone who accesses the company’s information system and is the weakest link in the infrastructure. Users will be strictly held to the acceptable use policy (AUP) which acts as a guidebook for what users are allowed to do with the company’s IT assets. Violation of the AUP can be grounds for immediate dismissal and/or legal actions. Any third party that may need access to our systems will need to adhere to these policies as well and will need to sign an agreement before any access is given. The Human Resources department will be responsible for ensuring that all employees have signed an agreement to the AUP. All employees must pass a background check and their identities verified by HR before any access to Richman’s systems are granted. The Workstation Domain is where most users will connect to Richman’s IT infrastructure. This includes all desktops, laptops, PDAs, smartphones, and tablets. No personal devices or removable media will be allowed to connect to Richman’s system. Any devices or removable media needed to conduct business will be issued by Richman’s IT department and be used for official matters......

Words: 365 - Pages: 2

Thám Tử Lừng Danh Conan chap 219 | Economics and Globalization - 1030 Words | Скачать