system application domain

system application domain

System/ application domain

System/ application domain are made up of all the business’s mission-critical systems, applications, and data it is important to important that this domain is protected at all times. Failure to do so will result in large amounts of sensitive information as well as the threat of having productions cease to function. Unauthorized physical access is when one is gaining access to a physical entity without authorization. This is potentially dangerous because if an individual were to gain such access they could destroy the systems and data within the systems. This threat is centered on access to such places as data centers with a great deal of sensitive information. To prevent unauthorized physical access policies, standards, procedures and guidelines must be followed. For example, all guests must be escorted by an employee at all times. Staff should immediately report any suspicious activity and question persons that do not have an employee ID or batch visible.
Software vulnerabilities are flaws that exists in the creation stage of software or systems that allow an attacker to gain unauthorized access to the system. These vulnerabilities are most commonly malicious software such as malware. Software vulnerabilities can allow an attacker to steal, alter, or destroy sensitive data. Make certain that security updates are carry out on a regular basis to mitigate the impact of software vulnerabilities. Data loss occurs when any stored data is destroyed. This is considered a great risk to the system/ application domain. To protect against data loss, backups should take place regularly. The backups should be stored at an offsite location to allow full data recovery in the event of data loss

Similar Essays