Module 1 New Discussion: Seven Domains Module 01 Discussion: Seven Domains A typical IT infrastructure has seven domains: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. Each domain requires proper security controls that must meet the requirements of confidentiality, integrity, and availability. Answer the following question(s):

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter11: Security Maintenance
Section: Chapter Questions
Problem 16RQ
icon
Related questions
Question

Module 1 New Discussion: Seven Domains

Module 01 Discussion: Seven Domains

A typical IT infrastructure has seven domains: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. Each domain requires proper security controls that must meet the requirements of confidentiality, integrity, and availability.

Answer the following question(s):

In your opinion, which domain is the most difficult to monitor for malicious activity? Why?

In your opinion, which domain is the most difficult to protect? Why?

Submission Instruction and Grading Evaluation Criteria:

  • Students fully addressed the question(s) in the discussion instructions.
  • Students included justification or rationale for their choices, where applicable.
  • Reply to at least 2 post using a minimum of 50 words.  When responding, "I agree", "I like your post", etc. are NOT considered professional responses. Either agree, with explanation; disagree, with explanation; or add something additional to the topic at hand.  Post and respond to this discussion professionally (do NOT attach a file or give me link, unless explicitly specified by me).
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Types of Security Models
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,