1 / 50100%
Running Head: LAN/WAN COMPLIANCE AND AUDITING
Week 7: Worksheet 4: LAN/WAN Compliance and Auditing
Aalsa Caspher
Course:
Instructor:
Strayer University
November 16, 2017
LAN/WAN COMPLIANCE AND AUDITING
Week 7
Worksheet 4: LAN/WAN Compliance and Auditing
Course Learning Outcome(s)
Analyze information security systems compliance requirements within the Workstation and LAN
Domains.
Design and implement ISS compliance within the LAN-to-WAN and WAN domains with an
appropriate framework.
As auditors, we presume that no data produced on a computer is 100% secure regardless of whether it’s
a standalone device or connected to a local area network (LAN) or a wide area network (WAN).
Organizations implement controls, which are developed and implemented based on regulations and best
security practices. Security is implemented throughout an organizations enterprise from the host the
user sits and throughout the devices data traverses or is stored. Here’s an example of a basic enterprise
and the security controls that may be implemented. Remember, controls can be physical or logical
devices, software or encryption.
Host A host is a computer, tablet or other device that a user interfaces with to perform a function. The
device you’re reading this on is a host. The security controls that could be implemented onto a host
include a Host Based Intrusion Detection Systems (HIDS), Host Based Intrusion Prevention System
(HIPS), a software Firewall, and Antivirus protection. Policy controls implemented on a host include Role
Based Access Control (RBAC), Discretionary Access Control (DAC), Mandatory Access Control (MAC),
Login requirements, lockout settings and others that restrict what a user can and can’t do while logged
into a host and software to manage (allow and deny) policies electronically (ePo).
Local Area Network Think of a LAN as an internal network used by an organization that allows user to
execute functions using various applications and storage while also having the ability to connect to other
organizations using the Internet or Virtual Private Networks (VPN’s). A host connects to a switch and data
is routed to a router where it either access systems on the LAN or to a router where it’s going to exchange
Students also viewed