Essay Module 2
docx
keyboard_arrow_up
School
Liberty University *
*We aren’t endorsed by this school
Course
335
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
6
Uploaded by Joelle14
7 Domains of IT Infrastructure
Joelle Patton Liberty University
CSIS 335: Network Security
Killian P Boston
11 February 2024
Abstract
This paper looks into how network security may be integrated into the 7 different domains of a typical IT system. The seven domains include user, workstation, LAN, LAN-to-WAN, WAN,
remote access, and system/application. In order to protect and ensure the confidentiality, integrity, and availability (CIA) of IT resources, it is very crucial that people implement network security across these domains. This article looks at the topic of network security from a biblical perspective by emphasizing trust, ethics, and stewardship. Integrating biblical themes in network security can help organizations strengthen their ethics and moral technology use.
7 Domains of IT Infrastructure
In today’s world, technology is essential to organizational operations which means protecting IT infrastructure is key. Network security comprises of multiple tactics and approaches for making sure the confidentiality, integrity, and availability of information stays inside an organization. This paper digs into the seven domains of IT architecture and shows how to approach network security from a biblical viewpoint.
User Domain
The user domain is the beginning of every IT infrastructure, which includes people who use the system. These people could be employees, contractors, or third-party users. All users who
have access to the system must sign an acceptable use policy (AUP) before getting access to the organization’s resources. This domain should focus on prioritizing training, secure authentication, granular authorization, and accurate accounting. Also, there are many other safeguards provided to other domains that provide extra security for the User Domain. In terms of a biblical worldview, stewardship is an important biblical idea that emphasizes responsible resource management. Educating users about security regulations, implementing strong authentication, and fostering an ethical culture all line up with biblical teachings of responsible stewardship.
Workstation Domain
This domain refers to the physical devices that users interact with such as a laptop, desktop computer, phone, or any other endpoint device. Implementing network security in this domain includes antivirus software, encryption, and vulnerability software patch management to preserve
the integrity of the device. Philippians 4:7 says, “And the peace of God, which surpasses all understanding, will guard your hearts and your minds in Christ Jesus.” This verse encourages individuals to guard their hearts and minds. This can also be applicable to network security in protecting one’s workstation from malicious threats.
LAN Domain
This domain encompasses the physical and logical local area network (LAN) technologies (i.e., the wired or wireless topology composed of devices and communication protocols) used to link workstations to the organization’s network infrastructure. The focus in this domain is to protect the LAN network from internal threats and unauthorized access. Employing firewalls, intrusion detections systems, and frequent monitoring is consistent with the biblical idea of laying solid foundations. Securing the LAN network provides a stable foundation for the whole IT infrastructure.
LAN-to-WAN Domain
This domain is about the organization’s internetworking and interconnection point between the LAN and WAN network infrastructures. The shift from a LAN to a WAN means strong security measures. Firewalls, DMZs, routers, switches, intrusion detection systems (IDSs), and intrusion prevention systems (IPSs) are common tools used as security monitoring devices in this domain. VPN and encryption technologies can be used to protect data during transmission. From the perspective of a biblical worldview, the need for guarding against foreign influences and defending the integrity of one’s community is very important.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
WAN Domain
Organizations with remote locations require a WAN for interconnection. Organizations usually outsource their WAN connectivity and capacity to service providers. Security measures including secure data transmission methods and network segmentation are critical in the WAN domain since connections typically span in broader geographical areas. A biblical worldview urges care in protecting against external threats and remaining watchful in the face of potential threats.
Remote Access Domain
This domain describes the permitted and authenticated remote access methods for users to remotely access the organization’s IT infrastructure, systems, and data. With the increased usage of remote work, securing remote access is crucial. Galatians 6:4 states, “But let each one test his own work, and then his reason to boast will be in himself alone and not in his neighbor.” Implementing multi-factor authentication and encrypted connections aligns with the biblical concept of accountability by developing a sense of duty while accessing organizational resources
remotely.
System/Application Domain
This domain includes the hardware, operating system software, database software, client/server applications and data that are typically kept in the organization’s data center and/or computer rooms. Implementing access restrictions, conducting frequent audits, and managing patches all contribute to system and application domain security. Romans 14:12 says, “So then each of us will give an account of himself to God.” This verse stresses accountability for one’s actions which promotes proper usage and management of information systems.
In conclusion, including network security within the seven domains of IT infrastructure is crucial
for organizations seeking to secure their data and assets. Organizations with a biblical view can increase their commitment to ethical behavior, responsible stewardship, and technological responsibility. Trust, integrity, and ethical responsibility are biblically based ideas that serve as solid foundation for implementing network security measures throughout the IT architecture.
References
English Standard Version Bible
. (2001). ESV Online. https://esv.literalword.com/
Knapp, Eric., & Broad, James. (2011). Industrial network security securing critical infrastructure
networks for Smart Grid, SCADA, and other industrial control systems
(1st edition). Syngress.
Pramanik, S. (Ed.). (2022). Cyber security and network security
. John Wiley & Sons, Inc.
Stewart, J. M., & Kinsey, D. (2021). Network security, firewalls and VPNS
. Jones & Bartlett.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help