Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

ISSC471 Compliance Within The Workstation and LAN Domains Discussion

ISSC471 Compliance Within The Workstation and LAN Domains Discussion

ISSC471 Compliance Within The Workstation and LAN Domains Discussion

Need to respond to the below two students discussions with at least 150 words minimum per discussion response. Below int he bold will be the questions the students are responding to.
Discussion Points:

1. Briefly discuss how the concept of workstation domains figure into your organizations security policies, please cite and list your references
2. Briefly discuss how the concept of LAN domains figure into your organizations security policies, please cite and list your references
Student one:
This week we learned about the workstation domain and why it’s important to maintain compliance. All users must use workstations to access information and complete their job responsibilities. The workstation domain consists of uninterruptible power supplies (UPS), desktop PCs, laptops, tablets, smartphones, printers, modem, external hard drives, and universal serial buses (USB) (Weiss, 190). These devices must be considered when implementing our organizational security policies. Policies that enforce the use of UPSs will ensure organizational resources remain available at all times. Policies that enforce security on workstations such as desktop PCs will ensure users don’t advertently or inadvertently cause network security breaches. These policies could include things such as preventing the downloading of third-party software, preventing the use of external media devices, and enforcing two factor authentication.
Compliance in the LAN domain is just as, if not more, important than the previously discussed workstation domain. The LAN domain’s primary responsibility is to “provide users with the ability to connect to and share resources” (Weiss, 215). Devices commonly found in this domain include connection media, networking devices, and servers. This domain makes up the very backbone of our networks. Without it, users would have nothing to access with there workstations. Policy in this domain must be strictly enforced to ensure minimal downtime and maximum availability of all network resources. Examples of this type of policy includes locking and protecting server rooms, following widely excepted networking standards for cables, updating software and operating systems on networking devices, and controlling temperatures for all server rooms.
Weiss, M. (2016). Auditing IT Infrastructures for Compliance. Burlington, MA: Jones & Bartlett Learning.
-Matthew
Student two:
Hello Class,
The workstation domain is one of the primary ways that regular users will access network information. Securing the workstation domain is vital to organizational security as this is the domain where most users (one of your largest vulnerabilities) resides (Weiss & Solomon, p. 189, 2015). The text states that protecting this domain is just as important as protecting other major assets as a loss can result in legal and reputation-based consequences as well as disrupt daily operations (Weiss & Solomon, p. 189, 2015). The two main reason for protecting this domain fall under information security and liability. Most organizations’ primary asset is information. Any loss, disruption, or exploitation of this data disrupts how the organization does business (Weiss & Solomon, p. 189, 2015). In addition to disruptions, loss of data can lead to liability issues. Information such as PII, HIPPA, etc. carries with it legal responsibilities for protection. Loss of protected data can result in legal action against the organization and serious loss in reputation (Weiss & Solomon, p. 189, 2015).
The LAN domain is generally the server(s) that most company data resides on and users typically interact with the LAN domain through the workstation domain (Weiss & Solomon, p. 214, 2015). LAN domain protection is often centered on protecting against and limiting remote access to resources (Weiss & Solomon, p. 215, 2015). This is due to the simple fact that the LAN domain involves clients connecting to the server through the use of the network. Protection measures include access controls, communication controls, anti-malware, backups, configuration control, monitoring, and patch management (Weiss & Solomon, p. 215, 2015). Proper controls will help ensure a strong C-I-A triad (Weiss & Solomon, p. 215, 2015).
Cheers!
– Chris Borland
References
Weiss, Martin & Solomon, Michael G. (2015). Auditing IT Infrastructures For Compliance.
Second Edition.Jones & Bartlett Learning: Information Systems Security & Assurance
Curriculum. ISBN: 1284090701 978-1284090703

“Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results.”

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Blackboard Experts only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Blackboard Experts are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Blackboard Experts is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Blackboard Experts, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.