Exploring_the_Seven_Domains_of_a_Typical_IT_Infrastructure_4e_-_Alejandro_Benavides

pdf

School

American Military University *

*We aren’t endorsed by this school

Course

422

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

20

Uploaded by mrvidez

Report
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 Student: Email: Alejandro Benavides alejandro.benavides@mycampus.apus.edu Time on Task: Progress: 14 hours, 45 minutes 100% Report Generated: Friday, February 9, 2024 at 12:12 AM Section 1: Hands-On Demonstration Part 1: Explore the Workstation Domain 4. Make screen capture showing the Sign-in options for Alice’s account . Page 1 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 7. Make a screen capture showing the View configured update policies page . 14. Make a screen capture showing the Virus & Threat Protection Settings . Page 2 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 18. Make a screen capture showing the security warning from attempting to run an executable file . 24. Make a screen capture showing the blocked attachment message . Page 3 of 20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 28. Make a screen capture showing a successful connection to the adodson user folder . 29. Make a screen capture showing a failed connection to another user folder . Page 4 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 31. Make a screen capture showing a successful connection to the Marketing shared folder . 32. Make a screen capture showing a failed connection to another shared folder . Part 2: Explore the LAN Domain Page 5 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 5. Make a screen capture showing the vWorkstation’s original ARP table . 10. Make a screen capture showing the vWorkstation's updated ARP table. Page 6 of 20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 20. Make a screen capture showing the Switch01 forwarding table . 30. Make a screen capture showing the contents of the Employees directory . Part 3: Explore the LAN-to-WAN Domain Page 7 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 6. Make a screen capture showing the Outbound NAT settings . 9. Make a screen capture showing the permissive LAN rules . Page 8 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 12. Make a screen capture showing the Static Routes page . 16. Make a screen capture showing the result of your tracert to the pfsense-dc appliance . Page 9 of 20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 22. Make a screen capture showing the Port Forward rules for the web server . 25. Make a screen capture showing the DMZ firewall rules . Page 10 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 Section 2: Applied Learning Part 1: Explore the WAN Domain 5. Make a screen capture showing the static route for the point-to-point connection . Page 11 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 9. Make a screen capture showing the BPG neighbor ping results . 12. Make a screen capture showing the traceroute to the file server . Part 2: Explore the Remote Access Domain Page 12 of 20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 9. Make a screen capture showing the successful connection to the email server . 14. Document whether the VPN connection is split tunnel or full tunnel, based on the tracert results. The VPN connection is split tunneling. Means some of the connection goes through the VPN and some through the internet. 172.31.0.40 is going through the VPN and 203.30.340 is going through the internet. Page 13 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 16. Make a screen capture showing the successful reverse DNS lookup for the internal host . Part 3: Explore the System/Application Domain Page 14 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 4. Make a screen capture showing the whoami results . 10. Make a screen capture showing the members of the Developers AD group . Page 15 of 20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 16. Make a screen capture showing the password policy settings in the Group Policy Management Console . 20. Make a screen capture showing the DNS entries . Page 16 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 28. Make a screen capture showing the Docker service status . 31. Make a screen capture showing the juiceshop.com web page . Page 17 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 36. Make a screen capture showing the disks in the tank volume . Page 18 of 20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 Section 3: Challenge and Analysis Part 1: Explore the User Domain Based on your research, identify at least two compelling threats to the User Domain and two effective security controls used to protect it. Be sure to cite your sources. The two compelling threats to the User Domain are phishing attacks and insider threats. The two effective security controls used to protect the User Domain are user awareness training and access controls. Divya Aradhya. (2018, April 13). What are three risks and threats of the user domain? http://www.divyaaradhya.com/2018/01/15/what-are-three-risks-and-threats-of-the-user-domain/ Iainfoulds. (n.d.). Best practices for securing active directory . Microsoft Learn. https://learn.microsoft.com/en -us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active- directory Part 2: Research Additional Security Controls Page 19 of 20
Exploring the Seven Domains of a Typical IT Infrastructure (4e) Fundamentals of Information Systems Security, Fourth Edition - Lab 01 Based on your research, identify security controls that could be implemented in the Workstation, LAN, LAN-to-WAN, WAN, Remote Access, and System/Application Domains. Recommend and explain one security control for each domain. Be sure to cite your sources. The recommended security controls for each domain are: Workstation Domain - Antivirus software, LAN Domain - Firewalls, LAN-to-WAN Domain - VPNs, WAN Domain - Intrusion detection systems, Remote Access Domain - Multi-factor authentication, System/Application Domain - Secure coding practices. Dan Wand, M. (2020, June 30). Securing the seven domains of IT infrastructure . LinkedIn. https://www.linkedin.com/pulse/securing-seven-domains-infrastructure-dan-wand/ Powered by TCPDF (www.tcpdf.org) Page 20 of 20