-
Essay / Network Management - 1212
In the following report, I will discuss the role of network management and how the network manager contributes to the security of an organization's network. Network security will be covered in its entirety to inform the extent of the impact that network attacks can have on an organization. Once the impact of network security is addressed, I will review all the possible threats that can harm an organization as well as the steps network managers should take to secure a network to the best of their abilities. The importance of network tools will be presented last along with the benefits they can offer. Network Management Network managers are responsible for ensuring the efficiency of a network, this includes a number of tasks such as monitoring the network to detect problems and resolving them before they affect users of the network. network. , ensuring that network security is fully updated and capable of protecting the network from all threats, restricting employee access to files they do not need, updating networks with different routing protocols and ensuring that two networks are compatible in the event of a merger or company expansion. and resource conservation. Resource conservation refers to tracking resources on a network and ensuring that users who need them have access to them. Network managers may be responsible for other tasks, which vary depending on where they work, such as planning and developing new networks. Regarding the designed network, the network manager must ensure that all routers are compatible with each other, regarding router protocols such as EIGRP where a process ID must match if you want the routers to become adjacent and are correctly addressed to ensure that data can be sent to its destination from anywhere on the network,...... middle of paper. .....ONLINE] Available at: http://www.cisco.com/cisco/web/UK/solutions/small_business/resource_center/articles/secure_my_business/what_is_network_security/index.html. [Accessed December 16, 2013]. Zero-day attack - Wikipedia, the free encyclopedia. 2013. Zero-day attack - Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/Zero-day_attack. [Accessed December 16, 2013].Intrusion prevention system - Wikipedia, the free encyclopedia. 2013. Intrusion prevention system - Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/Intrusion_prevention_system. [Accessed December 16, 2013]. Five Free Network Monitoring Tools - TechRepublic. 2013. Five Free Network Monitoring Tools - TechRepublic. [ONLINE] Available at: http://www.techrepublic.com/blog/five-apps/five-free-network-monitoring-tools/. [Accessed December 16 2013].