I have been asked to outline a brief study refering the “Internal Use Only” informations categorization criterion for Richman Investments. The intent of the study is to depict the criterions set by Richman Investments. the potency of a security menace and recommendations to rectify any possible exposure. “Internal Use Only” definition – is any information or information shared internally by a company or organisation. Even though confidential information is non included this information is non intended to go forth the company or organisation. The undermentioned three IT substructure domains affected by the “Internal Use Only” informations categorization criterion I will be discoursing are ; User Domain. Work Station Domain and LAN-to-WAN Domain. I believe by understanding these countries will assist minimise the menace and assist maintain the information internal. There are several alterations I will be urging that are really simple holes that will do Richman Investments more secure. The User Domain is the first bed and besides the weakest nexus in the substructure that is affected by the “Internal Use Only” criterion. Your personal information is created in this sphere. The information that is obtained in this country is for “Internal Use Only” . This is besides where you will happen your acceptable usage policy ( AUP ) ; this is the rulebook for employees to follow. Once you enter this sphere it allows users to hold entree to the system and applications. Some of the most common menaces to the system are non knowing. They include but are non limited to: installation CD’s. USB’s. exposure. music and downloading anything. Merely by disenabling the USB ports and Cadmium thrusts will assist cut down the figure of menaces to the system. Access control works within the Work Station Domain and the 2nd bed of the substructure that is affected by the “Internal Use Only” criterion.
This is where users foremost entree the system ; it requires a
login and watchword hallmark before you are allowed to see any information. A work station can be described as a computing machine. laptop. ache phone or any devise that allows you entree to the system. It besides has some of the same common menaces as the user sphere by an employee installation and downloading. While logged onto the workstation you are now unfastened to viruses and uneases Acts of the Apostless from outside beginnings. By cut downing the entree to certain countries to a demand to cognize footing. this will cut down the figure of employee entree to countries and the figure of internal and external menaces. Security Architecture and Design work in the LAN-to-WAN Domain and the 4th bed of the substructure that is affected by the “Internal Use Only” criterion. This is where you can entree the cyberspace and you can go unfastened to anyone. Understand cyberspace traffic is broadcasted in cleartext and it is non encrypted. This country uses Transmission Control Protocol ( TCP ) and User Diagram Protocol ( UDP ) when you transmit a package it attaches a port figure in the heading and it tells what type of package it is and allows others to see what you are conveying. It is the country where information enters and leaves your web. This country is made up of physical and logical pieces. Puting extra limitations. firewalls and or another watchword hallmark is compulsory for protecting all personal information. After careful consideration. I believe the beds discussed in this study explain the cause and affects that “Internal Use Only” information criterions have on the IT Infrastructure. I believe security precedence in these countries should be carefully monitored. updated and implemented right off. Along with preparation. modifying work Stationss. and curtailing entree to a demand to cognize footing will assist procure the web. These few little alterations will maintain Richmond Investment secure. safe and trusted by its investors and clients.
Kim. David ; Solomon. Michael. 2012. Fundamentalss of Information Systems Security. Jones & A ; Bartlett Learning.