top of page

What is IT Infrastructure?

When you think about IT Infrastructure, you may envision a cluster of wires running above ceiling tiles. While that is a small component of an infrastructure system, IT infrastructure is a larger collection of everything that is required to run all of the technology. These include software, composite hardware, network services, and resources. The infrastructure system allows team members to deliver services and solutions to customers and partners.

IT infrastructure can be most easily described through its 7 domains. Each domain is unique as it has its own particular function, but each domain is essential in performing different tasks. These work much a like a team would, but each domain also comes with its own set of risks. Below is a list of each domain, its risk, and what it used for.

User Domain

The User Domain consists of all the users that have access to all of the other domains. In other words, the User Domain is all of the team members using technology at the workplace.

Risk:

  1. User can delete data in an application.

  2. User can use a USB flash drive with virus into the work computer.


Workstation Domain

The Workstation Domain is simply an individual user’s computer where work takes place.

Risk:

  1. Computers operating systems have software vulnerability that can be susceptible to hackers.

  2. Web browsers can have a software vulnerability that can be susceptible to malware and other harmful software that can damage a computer.

  3. A workstation’s hard drive can fail and lose data.


LAN Domain

A LAN domain is made up of a group of users that fall under one central security database.

Risk:

  1. LAN domains can have a software vulnerability that can be susceptible to malware and other harmful software that can damage a computer.

  2. LAN domains operating systems have software vulnerability that can be susceptible to hackers.

  3. An unauthorized user can access the organization’s workstations in a LAN.


WAN Domain

A WAN domain is made up of the Internet and semi-private lines. A semi-private private line is data transport service which does not use the public internet. This connects at least two locations with high data speeds.

Risk:

  1. Service providers can have outages.


LAN to WAN Domain

A LAN to WAN domain connects the ports at which all data is sent and received. Much like a port where ships would pick-up and deliver goods, these ports are sending and receiving data. LAN and WAN domains connect these ports to ensure that data can be sent and received successfully.

Risk:

  1. LAN to WAN domains operating systems have software vulnerability that can be susceptible to hackers.


Remote Access Domain

A Remote Access domain is the ability at which users can access a network from a home computer or another device outside of the office.

Risk:

  1. Computer operating systems have software vulnerability that can be susceptible to hackers.

  2. Web browsers can have a software vulnerability that can be susceptible to malware and other harmful software that can damage a computer.

  3. A workstation’s hard drive can fail and lose data.


Systems/Application Domain

A system domain is a subdomain that partners automatically receive with their product.

Risk:

  1. Communication from remote access and VPN connections can unsecured and hacked.

ZeroDay Technology Solutions is proud to enable businesses to offload IT operational burdens to maintain comprehensive coverage of IT systems within a business. Before problems arise, ZeroDay offers an innovative, proactive approach to ensure quality for our partners’ IT Infrastructure. To learn more about ZeroDay’s services, click here!

Featured Posts
Recent Posts
Archive
Search By Tags
Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square
bottom of page