Hello there, here is the complete paper. Go through it and in case of anything, feel free to alert me.Regards
DST Systems Inc. Outline
DST Systems Inc. deals with information processing and other products and
services related to computer software.
This paper discusses the worst problems that could affect each of the seven
domains in the DST Systems Inc.
B. User domain
The worst threat facing the user domain of this firm is the susceptibility of users
to social engineering.
It should ensure the conduction of security training and awareness to all users.
C. Workstation domain
The worst thing that may happen to the workstation domain of DST Systems Inc
is the access by unauthorized individuals.
Such a threat is best mitigated by the use of strong passwords to lock screens.
D. LAN domain
The worst thing that could affect the LAN domain of this firm is access by
This threat is best mitigated by ensuring that all computer rooms, data centers,
and wiring closets are made secure from any illegal individual.
E. LAN to WAN domain
The most dangerous threat regarding this domain is the port scanning and network
probing by individuals that are not authorized by the company.
The best way to counter this risk by ensuring that some applications on the
exterior IP devices using the domain are disabled.
F. WAN domain
The worst threat regarding the WAN domain of DST Systems Inc is the use of a
connection that is open to the public.
The firm should have policies that guide the use of the connection.
G. Remote access domain
The riskiest thing that may affect business through the remote access domain is
the password attacks and the use of brute-force user ID.
Such a threat should be avoided through the establishment of policies to guide the
use of passwords and user IDs
H. Application domain
The most significant threat is the access of unauthorized people to the closets of
wiring, data centers, and computers.
The company should have standards and policies to guide the staff and visitors.
Users make the weakest link towards the achievement of secure systems in a
Running head: D...
15 Million Students Helped!
Sign up to view the full answer