how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local Area Network-to-Wide Area Network (LAN-to-WAN), Wide Area Network (WAN), Remote Access, and System/Application domains
User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.
Work Station Domain:
The workstation domain has some software vulnerability that connects remotely and steals data.
A workstation can fail because of lost data.
LAN domain
A worm can spread and infect the computer.
LAN have some known software vulnerability.
An unauthorized access of the organization workstation in
LAN WAN domain
LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems.
Server can receive the DOS File Transfer protocol can allow uploaded illegal software.
LAN/WAN Domain
The boundary between the trusted and untrusted zones.
Hacker can penetrate the IT infrastructure and gain access.
Week ingress and egress filtering performance.
A firewall with the ports open can allow access to the internet.
System Storage Domain:
A fire can destroy the data DOC can cripple the organization's email.
A database server can be attacked by the injection of SQL and corrupting data.
Remote Access Domain
Communication circuit outage the connections
Remote communication from the office can be unsecured VPN tunneling between the remote computer and router