School of Information Systems

The seven domain of a typical IT Infrastructure

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain. Each of these domains is viewed as portals for attackers if countermeasures are missing or fail. It is very imperative for businesses to protect each of these seven domains. It only takes one unprotected domain for an attacker to gain access to private data.

  • User Domain.
    The User Domain covers all theusers (of any rank) that haveaccess to the other six domains.

RISKS:

  1. User can destroy data in application(intentionally or not) and delete all
  2. User can find that his girlfriendcheated on him and use her passwordto delete all of her work so that shewould be fired.
  3. User can insert infected CD or USBflash drive into the work computer
  • Workstation Domain.
    A computer of an individual user where the production takes place

RISKS:

  1. The workstation’s OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.
  2. A workstation’s browser can have a software vulnerability which allowsunsigned scripts to silently installmalicious software.
  3. A workstation’s hard drive can fail causing lost data
  • LAN Domain.
    Contains all of the workstations,hubs, switches, and routers. TheLAN is a trusted zone

RISKS:

  1. A worm can spread through the LANand infect all computers in it.
  2. LAN server OS can have a knownsoftware vulnerability.
  3. An unauthorized user can access the organization’s workstations in a LAN
  4. WAN Domain.
  5. Stands for Wide Area Network and consists of the Internet and semi-private lines

RISKS:

  1. Service provider can have a major network outage.
  2. Server can receive a DOS or DDOS attack.
  3. A FTP server can allow anonymously uploaded illegal software
  • LAN / WAN Domain.
    The boundary between the trusted and un-trusted zones.The zones are filtered with a firewall

RISKS:

  1. A hacker can penetrate your ITinfrastructure and gain access toyour internal network.
  2. Weak ingress/egress traffic filteringcan degrade performance.
  3. A firewall with unnecessary portsopen can allow access from theInternet
  • System / Application Storage Domain.
    This domain is made up of user-accessed servers suchas email and database

RISKS:

  1. A fire can destroy primary data
  2. A DOS attack can cripple the organization’s email
  3. A database server can beattacked by SQL injection,corrupting the data
  • Remote Access Domain
    The domain in which a mobileuser can access the local network remotely, usually through a VPN

RISKS:

  • Communication circuit outage candeny connection.
  • Remote communication from officecan be unsecured.
  • VPN tunneling between remotecomputer and ingress/egress routercan be hacked

References

Kim, David, dan Michael G Solomon. 2012. Fundamentals of Information Systems Security. Jones & Bartlett Learning, United State of America

Jennifer Alexandra