Lab 01 issc 422

pdf

School

American Public University *

*We aren’t endorsed by this school

Course

422

Subject

Information Systems

Date

Feb 20, 2024

Type

pdf

Pages

19

Uploaded by PresidentRiverWasp4

Report
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 Student: Email: Steven Engelken steven.engelken@mycampus.apus.edu Time on Task: Progress: 7 hours, 24 minutes 100% Report Generated: Saturday, December 9, 2023 at 11:22 PM Section 1: Hands-On Demonstration Part 1: Explore the Workstation Domain 4. Make screen capture showing the Sign-in options for Alice’s account . Page 1 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 7. Make a screen capture showing the View configured update policies page . 14. Make a screen capture showing the Virus & Threat Protection Settings . Page 2 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 18. Make a screen capture showing the security warning from attempting to run an executable file . 24. Make a screen capture showing the blocked attachment message . Page 3 of 19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 28. Make a screen capture showing a successful connection to the adodson user folder . 29. Make a screen capture showing a failed connection to another user folder . Page 4 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 31. Make a screen capture showing a successful connection to the Marketing shared folder . 32. Make a screen capture showing a failed connection to another shared folder . Part 2: Explore the LAN Domain Page 5 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 5. Make a screen capture showing the vWorkstation’s original ARP table . 10. Make a screen capture showing the vWorkstation's updated ARP table. Page 6 of 19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 20. Make a screen capture showing the Switch01 forwarding table . 30. Make a screen capture showing the contents of the Employees directory . Part 3: Explore the LAN-to-WAN Domain Page 7 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 6. Make a screen capture showing the Outbound NAT settings . 9. Make a screen capture showing the permissive LAN rules . Page 8 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 12. Make a screen capture showing the Static Routes page . 16. Make a screen capture showing the result of your tracert to the pfsense-dc appliance . Page 9 of 19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 22. Make a screen capture showing the Port Forward rules for the web server . 25. Make a screen capture showing the DMZ firewall rules . Page 10 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 Section 2: Applied Learning Part 1: Explore the WAN Domain 5. Make a screen capture showing the static route for the point-to-point connection . Page 11 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 9. Make a screen capture showing the BPG neighbor ping results . 12. Make a screen capture showing the traceroute to the file server . Part 2: Explore the Remote Access Domain Page 12 of 19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 9. Make a screen capture showing the successful connection to the email server . 14. Document whether the VPN connection is split tunnel or full tunnel, based on the tracert results. The VPN for 172.31.0.40 is a full tunnel, where the VPN for 203.30.3.40 is a split tunnel. Page 13 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 16. Make a screen capture showing the successful reverse DNS lookup for the internal host . Part 3: Explore the System/Application Domain Page 14 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 4. Make a screen capture showing the whoami results . 10. Make a screen capture showing the members of the Developers AD group . Page 15 of 19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 16. Make a screen capture showing the password policy settings in the Group Policy Management Console . 20. Make a screen capture showing the DNS entries . Page 16 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 28. Make a screen capture showing the Docker service status . 31. Make a screen capture showing the juiceshop.com web page . Page 17 of 19
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 36. Make a screen capture showing the disks in the tank volume . Page 18 of 19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 Section 3: Challenge and Analysis Part 1: Explore the User Domain Based on your research, identify at least two compelling threats to the User Domain and two effective security controls used to protect it. Be sure to cite your sources. Two sources that are compelling threats to User Domains are phishing and malware. Two effective security controls that are used to protect User Domains are two-factor authentication and firewalls. Part 2: Research Additional Security Controls Based on your research, identify security controls that could be implemented in the Workstation, LAN, LAN-to-WAN, WAN, Remote Access, and System/Application Domains. Recommend and explain one security control for each domain. Be sure to cite your sources. The security controls implemented to the Workstation is to overhaul of older hardware and up-to-date equipment. Security for controls for LAN is a proper build out and strong security policies. Security controls for LAN-to-WAN is to have a strong firewall between networks. For WAN, shoring up the LAN- to-WAN and using SFTP instead of FTP. Security for Remote Access will be creating solid controls and policies surrounding remote access and utilizing best practices like auditing and logging. As for System/Application security the use of antimalware and antivirus software as well as security training would be best for control. References [1] Kelly, R. (2017, May 7). Almost 90% of Cyber Attacks are Caused by Human error or Behavior. Retrieved from https://chiefexecutive.net/almsot-90-cyber-attacks-casued -human-error-behavior/ [2] Johnson, R. (2014). Business Challenges within the Seven Domains of IT Responsibility. In Security policies and implementation issues. Jones & Bartlett Learning. Powered by TCPDF (www.tcpdf.org) Page 19 of 19