Unit 1 Assignment 2
Impact of a Data Classification Standard
Internal use only is information that may or may not be confidential. But is shared within a organization and kept away from the public. With that being said it is imperative that we seek the following to be incorporated within the standards in each domain.
User Domain refers to the people who have access to the organizations equipment User domains is the worst domain for security and personal information can be obtained on this domain under internal use only. The reasoning for this is the multitudes of social networking and the fallacy’s of the employee’s not even meaning to release information that could be detrimental. Employees are responsible for their own equipment. The best way to avoid this is to set up an Acceptable use Policy (AUP) that informs ...view middle of the document...
Monitor of disable the installation of software and Restrict or disable the use of removable data devices unless authorized by system Administrators. A user that violates the AUP they should be given restricted access until further security training is completed and every user should have an annual preventive training they must go through to increase security
LAN Domain because the TCP and UDP are compromised due the fact these are entry and exit point to the wide area network and making private information easily accessible to anyone and it refers to the collection of computers and other hardware within our network. the threats to this domain are the unauthorized access to hardware closets, Switches, Database servers, Wireless Keys, and Routers from unauthorized personal causes a sever security risk. The best fixes for these is equipment closets and server rooms have to be physically secure through access locks or key cards. Have Wireless contingencies in place to prevent leaks of keys such as changing of access and MAC address tables to verify authorized devices. When a device not authorized access list are denied the wireless to though devices. Have employees register for new devices and monitor consistently for maxim security. Have backups and a contingency plan in place.
This will help in securing information and informing employees about what is needed in order to prevent leaks of information the organization does not wish to be made public. Having a weekly report given by Administrators of threats that have occurred will allow for modification of the AUP. Requiring regular backups of the system and stricter access standards creates a redundancy and preventative measures to prevent downtime and unauthorized access.