The User Domain defines the people who have access to a company’s information system. This domain contains all of the user information and will enforce an Acceptable use policy (ALAS) that will define what each user has permissions to do with any company data that they may have access to. This domain is also the weakest link in any company’s infrastructure. The Workstation Domain is where all the user information will be verified, and an account will be set up.
They will need to have a user name and password that is assigned to them by the IT department, before they can access the systems, application or data. No personal devices or removable media will be allowed on the network, and all systems will undergo regular updates, and have anti- virus and anti-mallard installed on each workstation for monitoring. There will also be an Access Control List (CAL) drawn up to define what access each individual will have on the network.
The LANA domain includes all data closets and physical as well as logical elements of the CAN. This domain needs strong security, being that it is the entry and exit points to the wide area network, and makes private information easily accessible to anyone. Users will be screened and authorized by the IT department head and given a special access code. The biggest threat to the LANA domain is unauthorized access. This will be monitored closely to make sure all policies are being followed.