preview

Network Management

Better Essays
In the following report I will discuss the role of network management and how the network manager contributes to the network security of an organisation. Network security will be discussed in full to inform on how big of an impact network attacks can have on an organisation. Once the impact of network security has been covered I will go through all possible threats that can harm an organisation and the steps network managers should go through to secure a network to the best of their ability. The importance of network tools will be introduced last along with benefits they can provide.
Network management
Network managers are responsible for ensuring efficiency through a network, this includes a number of jobs such as monitoring the network for problems and fixing them before they affect the network users, making sure network security is fully updated and capable of protecting the network from all threats, restricting employee access to files they do not require, updating networks with different routing protocols and making sure two networks are compatible in the event of a business merger or expansion and resource keeping. Resource keeping refers to keeping track of the resources on a network and making sure that users who need it have access. Network managers can be responsible for other jobs, which vary depending on their place of work, such as planning and developing new networks.
In relation to the network that has been designed the network manager should ensure that all routers are compatible with each other, regarding router protocols such as EIGRP where a process ID must match if you want the routers to become adjacent, and are addressed correctly to make sure data can be sent to its destination from anywhere on the network,...

... middle of paper ...

...ONLINE] Available at:http://www.cisco.com/cisco/web/UK/solutions/small_business/resource_center/articles/secure_my_business/what_is_network_security/index.html. [Accessed 16 December 2013].
Zero-day attack - Wikipedia, the free encyclopedia. 2013. Zero-day attack - Wikipedia, the free encyclopedia. [ONLINE] Available at:http://en.wikipedia.org/wiki/Zero-day_attack. [Accessed 16 December 2013].
Intrusion prevention system - Wikipedia, the free encyclopedia. 2013. Intrusion prevention system - Wikipedia, the free encyclopedia. [ONLINE] Available at:http://en.wikipedia.org/wiki/Intrusion_prevention_system. [Accessed 16 December 2013].
Five free network monitoring tools - TechRepublic. 2013. Five free network monitoring tools - TechRepublic. [ONLINE] Available at:http://www.techrepublic.com/blog/five-apps/five-free-network-monitoring-tools/. [Accessed 16 December 2013].