Network Domain Basics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is the most accurate description of a 'domain' in the context of networking?

  • A physical area containing servers and networking devices.
  • A specific type of server used to store user passwords.
  • A group of users, workstations, and devices sharing data via network resources. (correct)
  • A type of firewall that filters traffic between trusted and untrusted networks.

In the context of network domains, which domain is most vulnerable to physical damage, such as fire?

  • System/Application Storage Domain (correct)
  • Remote Access Domain
  • User Domain
  • LAN/WAN Domain

What is the primary function of a domain controller?

  • To govern basic domain functions and manage network security. (correct)
  • To act as a firewall between the LAN and WAN.
  • To store user data and application files.
  • To provide internet access to all users within the domain.

Which domain is most directly affected by communication circuit outages, potentially denying connection to the network?

<p>Remote Access Domain (B)</p> Signup and view all the answers

A company wants to allow its employees to work remotely while ensuring a secure connection to the corporate network. Which technology would be most suitable?

<p>Virtual Private Network (VPN) (B)</p> Signup and view all the answers

Which preventative measure is most effective in mitigating the risk of data loss within the system/application domain?

<p>Performing regular data backups. (C)</p> Signup and view all the answers

What is a key difference between local users and domain users in a Windows environment?

<p>Local users' credentials are stored on the computer itself, while domain users' credentials are stored on a domain controller. (A)</p> Signup and view all the answers

Which of the following activities would be considered unethical according to cyber ethics principles?

<p>Downloading copyrighted software without permission. (D)</p> Signup and view all the answers

Consider a scenario where a company prioritizes the use of human employees over automated systems, even if it means reduced efficiency. Which of Leonhard's 'ethics in technology' human rights is the company upholding?

<p>The right to be inefficient (D)</p> Signup and view all the answers

A security professional is asked to assess the vulnerabilities of a system. To maintain objectivity, what should they avoid?

<p>Allowing personal biases to influence their assessment. (D)</p> Signup and view all the answers

Flashcards

Domain

Any group of users, workstations, devices, printers, computers, and database servers that share different types of data via network resources.

Domain Controller

Governs basic functions and manages network security of a domain.

User Domain

Covers all the users that have access to the other domains; potential for intentional or unintentional data destruction.

Workstation Domain

Computer of an individual user where production takes place; vulnerable to software vulnerabilities and data loss.

Signup and view all the flashcards

LAN Domain

Contains workstations, hubs, switches, and routers within a trusted zone; susceptible to malware.

Signup and view all the flashcards

WAN Domain

Consists of the Internet and semi-private lines; prone to network outages and denial-of-service attacks.

Signup and view all the flashcards

LAN/WAN Domain

Boundary between trusted and untrusted zones

Signup and view all the flashcards

System/Application Storage Domain

Made up of user-accessed servers such as e-mail and databases; vulnerable to data corruption.

Signup and view all the flashcards

Remote Access Domain

Domain in which a mobile user can access the local network, usually through a VPN; susceptible to unsecured remote communication.

Signup and view all the flashcards

Remote Access Domain

Remote users can access files, which increases productivity. Creates a safe and encrypted connection.

Signup and view all the flashcards

Study Notes

  • A domain is a group of users, workstations, devices, printers, computers, and database servers sharing data via network resources, and it has subdomains.
  • A domain controller manages domain functions and network security, overseeing user functions like usernames, passwords, resource authentication, and access, also assigning resource privileges.
  • A simple network domain connects computers and workgroups, comprising combined systems, servers, and workgroups.
  • Multiple server types (Web, database, print) can exist in a domain depending on network needs.

Domain Types and Risks

  • User Domain includes all users with access to other domains.
    • Risks include data destruction/deletion and password misuse.
    • Users can insert infected CDs/flash drives.
  • Workstation Domain is an individual user's computer.
    • Risks: OS vulnerabilities may allow remote data theft
    • Browsers may have vulnerabilities that allow silent malware installs
    • Hard drive failure can cause data loss.
  • LAN Domain contains workstations, hubs, switches, and routers and is a trusted zone.
  • Risks: Malware spread, server OS vulnerabilities
  • Unauthorized LAN workstation access.
  • WAN Domain includes the Internet and semi-private lines.
    • Risks: Service provider outages, Denial-of-Service (DOS/DDOS) attacks
    • File Transfer Protocol (FTP) can allow illegal software uploads.
  • LAN/WAN Domain is the boundary between trusted and untrusted zones, filtered by a firewall.
    • Risks include hackers penetrating IT and firewalls misconfigured to allow unauthorized internet access.
  • System/Application Storage Domain includes user-accessed servers like email and database.
    • Risks include fires destroying data
    • DOS attacks can cripple email, SQL injection attacks can corrupt databases.
  • Remote Access Domain enables mobile users to access the local network via VPN.
    • Risks: communication outages and unsecured remote communication.

Local and Domain Users in Windows

  • A local user's username and password are stored on the computer itself.
  • Domain user information is kept on a domain controller.
  • Domain users evolved due to administrators managing large numbers of computers, peripherals, services and users.

LAN and WAN Domains

  • The LAN domain is a sub-network of servers and clients managed by a centralized database, in which user approval comes from a central server or domain controller.
  • Domain can also refer to Internet sites or LAN subnetworks.
  • The WAN Domain is a communication network spanning a large geographic area.
    • It can be private or public.

Remote Access Domain

  • Remote Access Domain lets remote users access files and resources on networked devices as well as improving collaboration.
  • This strategy increase the flexibility to hire.
  • Remote access is commonly provided via a VPN which creates a secure connection over the Internet
  • VPN tech was developed to securely enable remote log-in to corporate applications and other resources

Remote Access Methods Comparison

  • IP Security VPN (IPsec VPN).
    • Pros: Plenty of licenses included with firewall purchase, low processing overhead. Established and familiar technology.
    • Cons: Requires software installation and configuration on user's computer.
  • Secure Socket Layer VPN (SSL VPN) is a common encryption technology.
    • Pros: End users can install the VPN client from a public portal
    • No IT involvement needed for each machine
    • Admins can set up granular security policies down to single web applications and has software clients for mobile devices.
    • Cons: More configuration needed on the firewall, requires more processing overhead and SSL VPN licenses are sold as hardware add-ons
  • Microsoft DirectAccess
    • Pros: is a seamless technology and can allow work remotely.
    • Cons: Elaborate changes required on the corporate network, designed for IPv6 primarily, and requires additional software on the LAN for IPv4 access.

System/Application Domain

  • This consists of a business' mission-critical systems, applications, and data.
  • Attacks are denial, destruction, alteration, and disclosure.

Unauthorized Access

  • Unauthorized Physical Access is gaining access to a physical entity or area without permission.
    • This leads to stealing, altering, or destroying the systems and data.
    • This threat is dangerous for sensitive areas like computer rooms, data centers, or wiring closets.
  • Unauthorized Logical Access is similar to physical access, but targets intangible data.
    • Attackers can destroy, alter, and disclose information, causing denial of service.

Vulnerabilities and Data Loss

  • Software Vulnerabilities are flaws in software that allow unauthorized access, which can be exploited to install "malware."
  • Server software vulnerabilities are similar, where the potential to more damaging.
    • Exists in services the server uses (FTP, SSH, PHP) or the server's OS itself.
  • Data Loss is the destruction of digitally stored information in emails, documents, images, and databases during storage, transmission, or processing.
    • Preventative measures include data backups and complete system images, off-site storage allows recovery in data loss events.

Reducing Risks with System/Application Domains

  • Secure physical areas with sensitive systems.
  • Implement encryption and data handling standards.
  • Minimize data access and back up data.
  • Be aware of all applications on the network.
  • Plan, configure, and maintain network servers.
  • Develop and implement standards.
  • Read and understand the provided Acceptable Use Policy.
  • Report suspected IT policy violations to the supervisor.

Cyber Ethics

  • Cyber ethics means responsible behavior on the Internet, defined as not doing anything in cyberspace considered wrong or illegal in everyday life
  • Considerations include avoiding rude language, cyberbullying, plagiarism, breaking into computers, using passwords, infecting computers, and adhering to copyright when downloading material.

Ethics Manifesto

  • The Ethics Manifesto by Gerd Leonhard focuses on human rights in a technological future, focusing on the right to remain natural, to be inefficient, to disconnect, to be anonymous, and to employ people instead of machines.
  • The Code of Ethics for Information Security Professionals encompasses values such as integrity, objectivity, professional competence, and due care.
  • Descriptions of integrity include performing duties under laws, not engaging in conflicts of interest, and acting in stakeholders' best interests.
  • Objectivity means acting honorably, justly, responsibly, and legally in all aspects of your profession.
  • Professional competence and due care involve unbiased judgment, opinion marking when necessary, performing services diligently, promptness, meeting professional standards, supporting colleagues, sharing progress, and avoiding harming the profession's reputation.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser