that can cause possible damage. Vulnerabilities are weaknesses. When business functions or assests are compromised, they are losses. This chapter also covered the seven domains of a typical IT infrastructure. These include the User domain (the people, including employees, contractors, and consultants), Workstation domain (the end user’s computer), the LAN domain (the part of the network inside the firewall), the LAN-to-WAN domain (connection between the LAN and the outside network, or WAN), remote…
Words 481 - Pages 2