Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Siddiqui
Network Security Applications and Countermeasures Ethical hacker Intrusion detection system/intrusion prevention system (IDS/IPS) Access controls User
Domains
CIA Function
Integrity Integrity
Confidentiality Integrity
Failover server
LAN System/Applications
Availability
Automatic updates
Integrity
Cryptography
Confidentiality Integrity
Page 1
Julie Angley IT 255 Unit 8 Assignment 2 Worksheet Date Submitted: 02/27/2012 Mr. Siddiqui
As a reminder, the seven domains of a typical IT infrastructure include the following domains: User domain: Actual users Workstation domain: Workstations, laptops, and end-point devices, such as smartphones and printers LAN domain: Physical and logical LAN technologies100 Mbps/1000 Mbps switched Ethernet, 802.11-family of wireless LAN technologiesused to support workstation connectivity to the organizations network infrastructure LAN-to-WAN domain: Routers, firewalls, demilitarized zones (DMZs), and IDS/IPS
Page 2
Julie Angley IT 255 Unit 8 Assignment 2 Worksheet Date Submitted: 02/27/2012 Mr. Siddiqui
Page 3