Organization-owned IT assets Essay

In the user domain you will find an acceptable use policy (ALAS). An LIP defines what a user can and cannot do with organization-owned IT assets.

It is like a rulebook that the employees must follow. Failure to follow these rules can be grounds for termination. The user domain is the weakest link in an IT infrastructure. Anybody who is responsible for computer security understand what motivates someone to compromise an organization system, application, or data. Now I am going to list risk and threats commonly found in the user domain and plans you can use to prevent them.Lack of user awareness – solution – conduct security awareness training, display security awareness posters, insert reminders in banner greeting, and send email reminders to employees. Security policy violation- solution – place employee on probation, review LIP and employee Manuel, discuss during performance review.

We Will Write a Custom Essay about Organization-owned IT assets Essay
For You For Only $13.90/page!


order now

Employee blackmail or extortion- solution – track and monitor abnormal employee behavior and use of IT infrastructure during off hours. Alarms and alerts programmed within an IDS/PIPS help identify abnormal traffic and can block IP traffic as per policy definition.Workstation domain The workstation domain is where most users connect to the IT infrastructure. The workstation can be a desktop computer, laptop computer, or any other devise that connects to a network. The staff should have the access necessary to be productive.

Tasks include configuring hardware. Hardening systems and verifying antivirus files. Hardening a system is the process of ensuring that controls are in place to handle any known threats. The workstation domain requires tight security and access controls.

This is here users first access systems, applications and data.The workstation domain requires a logon ID and password for access. Now I will list risks, threats and vulnerabilities commonly found in the workstation domain, along ways to protect against them. Unauthorized accesses to workstation- (solution) enable password protection on workstations for access. Enable auto screen lockout for inactive times.

Viruses, malicious code, or mallard infects a user’s workstation or laptop. User downloads photos, music, or videos via the internet-(solution) use intent filtering and antivirus scanning at internet entry and exit.Enable workstation auto-scans for all new files and automatic file quarantine for unknown types. User inserts compact or universal serial bus thumb drive into organization computer- (solution) deactivate all CD, DVD, and USB ports. Enable automatic antivirus scans for inserted CDC, DVD’s, and USB thumb drives that have files.

The third and final infrastructure I will talk about is the LANA domain. * LANA Domain Local area network (LANA) is a collection of computers connected to one another or to a common connection medium.It needs strong security and access controls. Its can access company-wide systems, applications, and data from the LANA domain.

The LANA support group is in charge of the LANA Domain. Am now going to list risks, threats and vulnerabilities commonly found in the LANA domain with appropriate risk reducing strategies. Unauthorized access to LANA- solution – make sure wiring closets, data centers, and computer rooms are secure. Unauthorized access to systems application and data- solution – define strict access control policies, standards, reoccurred and guidelines.