Lab 01 issc 422
pdf
keyboard_arrow_up
School
American Public University *
*We aren’t endorsed by this school
Course
422
Subject
Information Systems
Date
Feb 20, 2024
Type
Pages
19
Uploaded by PresidentRiverWasp4
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
Student:
Email:
Steven Engelken
steven.engelken@mycampus.apus.edu
Time on Task:
Progress:
7 hours, 24 minutes
100%
Report Generated:
Saturday, December 9, 2023 at 11:22 PM
Section 1: Hands-On Demonstration
Part 1: Explore the Workstation Domain
4.
Make screen capture showing the Sign-in options for Alice’s account
.
Page 1 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
7.
Make a screen capture
showing the View configured update policies page
.
14.
Make a screen capture showing the Virus & Threat Protection Settings
.
Page 2 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
18.
Make a screen capture showing the security warning from attempting to run an
executable file
.
24.
Make a screen capture
showing the blocked attachment message
.
Page 3 of 19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
28.
Make a screen capture
showing a successful connection to the adodson user folder
.
29.
Make a screen capture
showing a failed connection to another user folder
.
Page 4 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
31.
Make a screen capture
showing a successful connection to the Marketing shared folder
.
32.
Make a screen capture
showing a failed connection to another shared folder
.
Part 2: Explore the LAN Domain
Page 5 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
5.
Make a screen capture
showing the vWorkstation’s original ARP table
.
10.
Make a screen capture
showing the vWorkstation's updated ARP table.
Page 6 of 19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
20.
Make a screen capture showing the Switch01 forwarding table
.
30.
Make a screen capture
showing the contents of the Employees directory
.
Part 3: Explore the LAN-to-WAN Domain
Page 7 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
6.
Make a screen capture
showing the Outbound NAT settings
.
9.
Make a screen capture showing the
permissive LAN rules
.
Page 8 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
12.
Make a screen capture showing the Static Routes page
.
16.
Make a screen capture
showing the result of your tracert to the pfsense-dc appliance
.
Page 9 of 19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
22.
Make a screen capture
showing the Port Forward rules for the web server
.
25.
Make a screen capture
showing the DMZ firewall rules
.
Page 10 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
Section 2: Applied Learning
Part 1: Explore the WAN Domain
5.
Make a screen capture showing the static route for the point-to-point connection
.
Page 11 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
9.
Make a screen capture showing the BPG neighbor ping results
.
12.
Make a screen capture showing the traceroute to the file server
.
Part 2: Explore the Remote Access Domain
Page 12 of 19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
9.
Make a screen capture
showing the successful connection to the email server
.
14.
Document whether the VPN connection is split tunnel or full tunnel, based on the tracert
results.
The VPN for 172.31.0.40 is a full tunnel, where the VPN for 203.30.3.40 is a split tunnel.
Page 13 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
16.
Make a screen capture
showing the successful reverse DNS lookup for the internal host
.
Part 3: Explore the System/Application Domain
Page 14 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
4.
Make a screen capture
showing the whoami results
.
10.
Make a screen capture
showing the members of the Developers AD group
.
Page 15 of 19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
16.
Make a screen capture showing the password policy settings in the Group Policy
Management Console
.
20.
Make a screen capture
showing the DNS entries
.
Page 16 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
28.
Make a screen capture
showing the Docker service status
.
31.
Make a screen capture
showing the juiceshop.com web page
.
Page 17 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
36.
Make a screen capture showing the disks in the tank volume
.
Page 18 of 19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e)
Fundamentals of Information Systems Security, Fourth Edition - Lab 01
Section 3: Challenge and Analysis
Part 1: Explore the User Domain
Based on your research, identify
at least two compelling threats
to the User Domain and two
effective security controls
used to protect it. Be sure to cite your sources.
Two sources that are compelling threats to User Domains are phishing and malware. Two effective
security controls that are used to protect User Domains are two-factor authentication and firewalls.
Part 2: Research Additional Security Controls
Based on your research, identify
security controls that could be implemented in the Workstation, LAN,
LAN-to-WAN, WAN, Remote Access, and System/Application Domains. Recommend
and explain
one security control for each domain. Be sure to cite your sources.
The security controls implemented to the Workstation is to overhaul of older hardware and up-to-date
equipment. Security for controls for LAN is a proper build out and strong security policies. Security
controls for LAN-to-WAN is to have a strong firewall between networks. For WAN, shoring up the LAN-
to-WAN and using SFTP instead of FTP. Security for Remote Access will be creating solid controls
and policies surrounding remote access and utilizing best practices like auditing and logging. As for
System/Application security the use of antimalware and antivirus software as well as security training
would be best for control.
References
[1] Kelly, R. (2017, May 7). Almost 90% of Cyber Attacks are Caused by Human error or Behavior.
Retrieved from https://chiefexecutive.net/almsot-90-cyber-attacks-casued -human-error-behavior/
[2] Johnson, R. (2014). Business Challenges within the Seven Domains of IT Responsibility. In
Security policies and implementation issues. Jones & Bartlett Learning.
Powered by TCPDF (www.tcpdf.org)
Page 19 of 19