Skip to Content
Fundamentals of Information Systems Security, 4th Edition
book

Fundamentals of Information Systems Security, 4th Edition

by David Kim, Michael G. Solomon
December 2021
Beginner
550 pages
20h 33m
English
Jones & Bartlett Learning
Content preview from Fundamentals of Information Systems Security, 4th Edition

IT and Network Infrastructure

Now, let’s focus our attention on risk to IT and the network infrastructure, of which hardware and software are key pieces. FIGURE 3-7 shows the seven domains of a typical IT infrastructure framework, the components of which connect to a network or to the Internet. Because it is connected to the Internet, both internal and external threats to the IT infrastructure exist. Moreover, vulnerabilities, which are weaknesses in the design, implementation, or software of the IT infrastructure assets, can also exist.

The seven domains in a typical I T infrastructure are the following. User Domain. Workstation Domain. LAN Domain. LAN-to-WAN Domain. WAN Domain. System or Application Domain. Remote Access Domain. A user domain consists of computer users. They utilize computers that are in the workstation domain. The computers are connected to a switch that is also connected to a server. The switch and the server computer are part of the LAN domain. The switch is connected to a router which is further connected to a firewall. The router and firewall are a part of the LAN-to-WAN domain. The firewall is connected to another firewall or router. The domain between the firewall and the firewall or router is called the WAN domain. The firewall or router is further connected to a mainframe, an application or web server and a cloud environment. The firewall or router, mainframe, application or web server, and the cloud environment are a part of the system or application domain. A user on a computer may access the LAN-to-WAN domain by connecting to the router using broadband Internet. This forms the remote access domain.

FIGURE 3-7 The seven domains of a typical IT infrastructure.

Damage to data caused by new threats includes ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Fundamentals of Information Systems Security, 3rd Edition

Fundamentals of Information Systems Security, 3rd Edition

David Kim, Michael G. Solomon

Publisher Resources

ISBN: 9781284220742