In the following report I will discuss the role of network management and how the network manager contributes to the network security of an organisation. Network security will be discussed in full to inform on how big of an impact network attacks can have on an organisation. Once the impact of network security has been covered I will go through all possible threats that can harm an organisation and the steps network managers should go through to secure a network to the best of their ability. The importance of network tools will be introduced last along with benefits they can provide.
Network management
Network managers are responsible for ensuring efficiency through a network, this includes a number of jobs such as monitoring the network for problems and fixing them before they affect the network users, making sure network security is fully updated and capable of protecting the network from all threats, restricting employee access to files they do not require, updating networks with different routing protocols and making sure two networks are compatible in the event of a business merger or expansion and resource keeping. Resource keeping refers to keeping track of the resources on a network and making sure that users who need it have access. Network managers can be responsible for other jobs, which vary depending on their place of work, such as planning and developing new networks.
In relation to the network that has been designed the network manager should ensure that all routers are compatible with each other, regarding router protocols such as EIGRP where a process ID must match if you want the routers to become adjacent, and are addressed correctly to make sure data can be sent to its destination from anywhere on the network,...
... middle of paper ...
...ONLINE] Available at:http://www.cisco.com/cisco/web/UK/solutions/small_business/resource_center/articles/secure_my_business/what_is_network_security/index.html. [Accessed 16 December 2013].
Zero-day attack - Wikipedia, the free encyclopedia. 2013. Zero-day attack - Wikipedia, the free encyclopedia. [ONLINE] Available at:http://en.wikipedia.org/wiki/Zero-day_attack. [Accessed 16 December 2013].
Intrusion prevention system - Wikipedia, the free encyclopedia. 2013. Intrusion prevention system - Wikipedia, the free encyclopedia. [ONLINE] Available at:http://en.wikipedia.org/wiki/Intrusion_prevention_system. [Accessed 16 December 2013].
Five free network monitoring tools - TechRepublic. 2013. Five free network monitoring tools - TechRepublic. [ONLINE] Available at:http://www.techrepublic.com/blog/five-apps/five-free-network-monitoring-tools/. [Accessed 16 December 2013].
IDS is a device or software application that monitors a network for an unauthorised attack.
Introduction On September 11, 2001, the World Trade Center buildings one and two were attacked. However, who we were attacked by and even if we were attacked is a hard decision to make. There have been many different claims about how everything on that fateful day happened. There are facts that we know are true, though; Flight 11 flew into the North Tower at eight forty- six in the morning.
Don’t hesitate to bring in experts to make sure your network is configured properly. Correct assessment, however the lesson doesn’t factor in when to bring in an expert. Despite an over-reliance on technology, there needs to be a timeframe for this expert and how their analysis will support overall technological requirements.
The Aim Higher College’s system administrators and network engineers have described seeing some strange behaviors such as high levels of traffic from many hosts that are causing system outages. The web servers of the college have been shutting down frequently by this traffic, it must be from a hacker group trying to attack the school with malicious software. I will review the network traffic from the college’s intrusion detection system and use an intrusion prevention system to block off these threats from the hackers.
“Institute rigorous network change control.” This will create a safety net was anyone new in the system to learn the procedure for creating a change in the network in order to stay consistent with how the rest of the company is operating.
9/11 Attacks History.com Articles, Video, Pictures and Facts. (n.d.). History.com History Made Every Day American & World History. Retrieved September 30, 2013, from http://www.history.com/topics/9-11-attacks
In 1980, James Anderson’s paper, Computer Security Threat Monitoring and Surveillance, bore the notion of intrusion detection. Through government funding and serious corporate interest allowed for intrusion detection systems(IDS) to develope into their current state. So what exactly is IDS? An IDS is used to detect malicious network traffic and computer usage through attack signatures. The IDS watches for attacks not only from incoming internet traffic but also for attacks that originate in the system. When a potential attack is detected the IDS logs the information and sends an alert to the console. How the alert is detected and handled at is dependent on the type of IDS in place. Through this paper we will discuss the different types of IDS and how they detect and handle the alerts, the difference between a passive and a reactive system and some general IDS intrusion invasion techniques.
...work Security Article). With this given information in the essay, is a great start to learn how to keep your network secure. This is only a small part of the prevention of infiltration of your network and computer. If one desires to learn more, go above and beyond and continue to learn on how to keep your network secure.
Although Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) have been grouped together here (IDPS), there are distinctions between them. On the most basic level, both will monitor the network...
Without proper protection, any part of any network can be susceptible to attacks or unauthorized activity. Routers, switches, and hosts can all be violated by professional hackers, company competitors. In fact, according to several studies, more than half of all network attacks are waged internally. To determine the best ways to protect against attacks, we should understand the many types of attacks that can be instigated and the damage that these attacks can cause to data. The most common types of attacks include Denial of Service (DoS), password, an...
...vantage of the overall network design and implement usable subnets with virtual local area networks. Use encryption and encapsulation to secure communications of public segments to enable extranets and cross-Internet company traffic. Use items such as intrusion detection systems and firewalls to keep unauthorized users out and monitor activity. Taken together, these pieces can make a secure network that is efficient, manageable, and effective.
Corporate Networks in organisations can be complex structures that “requires a great deal of attention” (Clemm 2007). Even small companies can have quite complex networks that are a considerable investment to the business. The notion that corporate network management is a cost to a business rather than a continual beneficial investment is a naive assumption that requires further investigation to the benefits that network management brings. Clemm (Clemm 2007) states in his text that the ultimate goal of network management “is to reduce and minimize total cost of ownership”, improving operational efficiency and lowering cost. Clemm (Clemm 2007) also notes that “Network Management is not just related to cost and quality”, which will be an continual concept presented throughout the report. The report will address key issues with corporate network management and ultimately argue and justify that corporate network management must be seen as a positive benefit to the business and not as a continual expense. The supporting articles will also provide sound evidence that networking is crucial to a business’s processes and production which can be seen from the OpenSSL Heartbleed Security vulnerability fiasco (Nieva 2014) or the QANTAS Amadeus system failure (Heasley 2012).
If you’ve ever been a network administrator, the call you dread the most might be one you receive in the middle of the night by some panicked employee stating that a portion of your critical network has gone down. What troubleshooting options are available to provide answers to your network problem? Besides having a proactive helpdesk that can “read” the mind of your network, an important part of troubleshooting involves using a network protocol analyzer. If you’ve done your research, you realize that there are many choices on the market today that may satisfy your needs but make a dent your company’s pocket book. Plus, you have to factor in training your helpdesk on how to use this new tool and if it will provide some type of return on investment (ROI).
Network management planning and security planning involves identifying the best and most appropriate systems and hardware that the firm can use to better manage network and plan security systems. Therefore, the management required me to examine the best software and hardware systems in the market place that the company can adopt to enable it to manage the network and security. The management required me to advice on the implementation procedure of various plans that are going to be adopted. My responsibility also involved finding out or predicting the impact of the plan on the future operations. They required me to evaluate the challenges the company might face while adopting the changes in the network management plan and security plans.
A critical part of network planning involves setting up of security mechanisms. Deploying the network with security configuration provides superior visibility, continuous control and advanced threat protection across the extended network. Additionally, security procedures define policies to monitor the network for securing critical data, obtain visibility, mitigate threats, identify and correlate discrepancies.