A long time ago there was a place, a safe community, where children were capable of running free and we left doors to homes and cars unlocked. There was sense of peace and minds were at ease. Today most people supervise their children at play time, check the doors two or three times before actually stepping back. They also make it a point to announce that the door is locked, by clicking the lock button several times, to deter anyone watching or stalking. The simple life convenience of being able to securely lock doors from a mobile to application to vehicle or home is soothing now. For large organizations, the idea of large application is not as simple. There is more to worry about with an organization. What has been established …show more content…
Understanding the seven domains is the first step to protecting the network. The seven domains are: user, workstation, local area network (or better known as LAN), wide area network (better known as WAN), LAN-to-WAN, remote access, and systems/application. (Johnson, 2011) understanding each domain allows to protect the domain individual. Teaching seven warriors how to fight the same way is good but teaching them how to defend from seven different tactics is strength. That is exactly what happens with network, each domain is protected and each battle can be fought either individual or together. The User domain is the domain with the most human element and the domain normally at risk. This domain consists of user accessing appropriate information on the network. The next domain is the workstation domain, refers to the devices that are placed on the network such as computers, printers, servers, smart phones, things of that nature. This domain is what the user domain connects to. LAN domain is the organizations network infrastructure, this is an office or a building that connects to each other within the local …show more content…
The Internet is an example of a WAN.” (Johnson, 2011, p. 67) The WAN domain is a great way to cover and connect a large organization from one location to another location. Similar to WAN domain, there is LAN-to-WAN, which refers to the connection of local area network over the access and sharing of data into a wide area network. (Stewart, 2011) Remote access domain regulates how users are authorized to connect to the organizations local network or LAN from either inside or outside the network when accessing through virtual private Network. (Stewart, 2011) The last domain allows for the access of hardware and software; such as extra devices that may need to connect to the workstation domain or the programs on the workstation domain to allow the end user to complete their functions of collecting, processing and storing the appropriate information. (Johnson, 2011)
Each domain helps play a valuable for in communicating with each other, whether it is inside the building, inside the organization, and even consumers to the organization. Understanding each domain is a part of the solution. Now that we are familiar with what each domain consist of we can begin to look at in the larger picture in information security compliance. The next portion is to identify how organization can apply information security compliance to each domain. This will help the organization establish a better understanding of the regulation is and a more