Answer:
a. User Domain: Create awareness for acceptable user-policies and security risk to educate employees of pending risk.
b. Workstation Domain: Install anti-virus and constantly update the system software.
c. LAN Domain: Access control list or ACL should be configured in routers and port security in switches to avoid hackers physically connecting to the network.
d. LAN-to-WAN Domain: Configure firewalls and intrusion detection and prevention protocols to mitigate unwanted access.
e. WAN Domain: Configure demilitarized or demarcation zone to provide secure access and prevent unwanted users from accessing network information.
f. Remote Access Domain: The use of VPNs to grant remote access to users or employees working from home and internet protocol security (IPsec) to encrypt the packet transmission.
g. Systems/Applications Domain: Administration should be well trained and ensure to get security software patches from appropriate vendors and testing them before use.
Step-by-step explanation:
Risk monitoring is one of the IT infrastructure risks management plan that observes and analyzes the threats of risk in an IT infrastructure.