networking administrator

networking administrator
networking administrator image
The management of the network is different from that of the administrator. The administrative system for all the activities involved in an independent computer system. If the management of the network, when put the system to a network, interact with many other systems. All the fast pace of today's discerning modern world network, which is much higher than the previous one. We need more security and better network management.Network management usually involves activities such as assigning network addresses, routing protocols and configuration of authentication and authorization -directory. Often it includes maintenance of network infrastructure in individual machines, such as drivers and settings of personal computers. Sometimes the maintenance of certain network: gateways, intrusion detection systems, etc.The task of network administration is done by the network administrator. Network administrator is responsible for the design and network security.Drawn by:Designing a network name as the network architecture. network architecture can be defined as the principles of design, physical layout of the data structures and planning and implementation organizational processes of the communication network.In this scenario, the fastest growing network architecture is also an expression of differentiation and classification of distributed processing architecture.To address the problem of the collision of a certain set of rules is formulated with up to a computer to send a packet through the data cable.Safety:Sometimes security has more to do with politics and the issue of networking of human resources. The security administrator especially looking forward to decide the priority is to maintain an adequate level of security and provides the flexibility for users to do their job. The security administrator must seek a balance between two contradictory desires. Security should be like clothes that the clothes are designed so that they are not too tight so as not to restrict movement, and it should not be so loose that reveals to the public.When you think of ensuring the corporate network to keep in mind three ways that someone can gain access to the corporate network:1) via the Internet.2) The dial-in access.3) virtual private networks.Network Management System:The combination of network systems, hardware and software to monitor and manage the network. Some network elements operated by analysis systems.Network management refers to the activities, methods, procedures and tools that are related to operating systems, administrative, and update network.O operation deals with keeping the network (and the services provided on the network) and smooth operation. These include the problems of monitoring the network as soon as possible, preferably before users are affected.Tenders or keep track of network resources and the way in which they are interested. It covers all "domestic", which is necessary to control the network.or perform maintenance and repairs of the developments concerned - for example, whenEquipment must be replaced if a router needs a patch of an image of the operating system when a new switch is added to the network. Maintenance also involves corrective and preventive actions to transform the network run "better" in that configuration settings.or As for the configuration, provisioning of network resources to support the service. For example, this may be part of the creation of the new network, a customer can use the service item.Dynamic change of network administration:Maybe you prefer to work out of the office, such as the golf course. When you're away, it would be useful for monitoring servers and network remotely. You are lucky; It is a set of utilities that allow you to monitor, diagnose and repair problems, and remote management tasks on a smartphone or handheld device is connected to data center servers.Most offer allows you to manage your passwords, contact printer, messaging programs, database server or a Blackberry, Palm, or Nokia smartphone is connected to a network server that is connected to other networks. But while Sonic-Admin from Avocent ECUT IC2 (command and control infrastructure) ASG Mobile Control and other solutions are likely to work well; various security agencies have reservations.Security questionsThe idea of ​​network management applications that use the wireless device is a dream come true for many network administrators, but it will take a while 'to grasp the concept. In fact, the potential market for these services, but only to a reduced security concerns, emerging markets, and debut utility was too small to follow, says Gerry Purdy analyst Mobile Trax."Of course, the demand for this type of application to the end of grow kits and smart phones have been able to withstand the loads necessary software," said Purdy. "But at the same time, these devices and applications security [threats] spirit [administrators], as when someone leaves the company and access to the network with his mobile phone, or if the mobile device can offer the opportunity for someone to hack the network with a smart phone. "Recognizing that dispel concerns about the safety of the hardest to sell, Robert Touw, director of business development of the group in the Mobile Solutions Avocent supports IT administrators are increasingly buying both the idea of ​​remote network management and security services offering. He also said that the financial companies in which safety is the biggest concern now is the utility.Freedom Remote and WirelessFirst, administrators can use the services of the wireless network and provides remote administration. "And 'quality of life: a sudden not give dinner to fix something right away," said Touw. "Now, all of a sudden, you can also do things 10 minutes which took 40 minutes."For added security, he said Avocent provides 3DES encryption authentication transaction Sonic Admin and marker so that the server only accepts data packets valid tokens recognized. RSA SecurID authentication levels are supported by authentication of the user includes Sonic Admin, authentication devices, authentication or NT / AD and the RSA SecurID option capable. Data as confidential, personal network of contacts stored on mobile devices. In addition, registration of remote administration server and managed servers of Sonic Admin.ECUT said the IC2 six layers of security software. The server, which operates behind the firewall, for example, signals and data centers and servers and mobile devices using a minimum of 128-bit encryption. The certification is based on Web and RSA SecurID administration of a customer. There is also the function of a server of IC2 complete audit trail and IC2 automatically after 30 minutes of inactivity.ASG said Mobile Control Administrator user interface must be logged for a PIN and domain powers. The systems can also enjoy the benefits of RSA SecurID, SSL, VPN and security solutions for servers and third-party wireless gateway. Sensitive data such as passwords are never stored on the wireless device, and a stopwatch function on any mobile device to prevent unauthorized access to the network, when the wireless device is lost or stolen.According to Purdy, the application will probably eventually take root once sellers to convince administrators that security risks are minimized. Purdy said, "It 's just a matter of these companies in the news that [these devices] are safe and work."Networking has become an indispensable part of the business world today. Most business houses and multinational companies that use the network in some way to run your business and communicate with field devices that can spread throughout the continent and even the world. Of course, this labor demand by the network administrator. However, you must understand the responsibility of the network perfectly able to work in the best director.System and Network AdministratorPeople often confuse the two terms "network" and "system" as synonyms. In fact, they are completely different. The tasks specific administrators, such as updating the system software development.In addition, it also offers director with the management and use of basic account management. Although they are not the domain of network administrators. Of course, small environments, the difference should not be too pronounced. A person can perform two tasks. However, according to the environment large, computer, two different tasks.For example, when the management of the directors of the university library are concerned about the way the system store, preserve and display the information as interactive environment will be affected by the creation of centers and units at various points in the network administrator.Examples ITUOne of the best examples of how a network administrator can be seen working on the operation of the International Telecommunication Union, or ITU global consortium of telecommunications companies. Setting guide management of the telecommunications network TMN or work, they have developed the model Ecaps, which is the first model in the world.Essence Training NetworkLike many other technical systems, we can not expect a high level of expertise and experience with the network without effective training. In fact, networking, data processing most important training institutions and universities, in which the subject is taught.Administrator ResponsibilityIn general, the network administrator would be responsible for the maintenance of parts of hardware and software computer network. Everything, including the design, maintenance and inspection is the responsibility within the network. In particular, the network administrator is responsible for security and network integrity administered to him. As the highest level of technical director of the organization and user support are rarely affected mainly the overall health of the network.In the realm of business and key password and server systems. Unconsciously, it puts organizations in a precarious situation that the misuse of these keys can cause everything from a minor inconvenience to a catastrophic loss of business. I do not want to throw all your network administrator to potential perpetrators of serious crimes and malicious activity, but also to address the possibility that a rogue network administrator, and how to reduce the risk of network abuse. There is no doubt that the majority of network administrators employees work hard, conscientious and faithful. The fact that they are innocent enough simply take a vacation or to give a report at an inopportune time.For the safe and continuous operation of a computer, an administrator must have access to the system administrator-level server, firewall, router, applications and email systems sometimes use to run your business. In general, it is impossible to separate duties between administrators and passwords, particularly for smaller organizations, it's usually all or nothing in terms of superuser. Such is the nature of work, if you've ever wanted to inflict harm, to cover their tracks easily and is more than likely to delay an attack negative long after leaving the organization. This grim situation of bad administrator scarce, but what about the administrator who accidentally in the calculation of the "Wages 2010.xls" during recovery of another file in the same place? The best-intentioned administrator. give in to the temptation and take a peak before deciding to return to paper and pencil, or performing administration of yourself, here are some tips to help alleviate the risks:

    
Trust - Microsoft Security Response Center has developed a list of 10 laws unchanged Security. Law # 6 states that "The computer is as secure as the administrator reliable." Therein lies the crux of the matter ... if you have a reliable system administrator, you have absolutely no security. If you hire an administrator can check their references thoroughly, not a full background check, background checks regularly and that individual circumstances may change. It goes without saying that if you do not trust the system administrator will change. If this is the case, be sure to follow the tips below 6.
    
Responsibility - You have to login and sign registration documents in the server room. If possible, leave the network, so administrators do not have the power. Also, when upgrading or installing the software to assign two people to the task.
    
Acquisition of equipment and software revision - Buy. Just because you have no idea what is the perimeter intrusion detection tool is based does not mean it can be assumed that it is the CFO, ensure that you have installed. The reason is that the risk is that the administrator can control the hardware or software and sell on eBay without anyone knowing.
    
Kill the administrator password - Windows operating systems to install the so-called root user and the corresponding password for the account that everyone is super user-level access to the system. Assuming you already have a relationship with super user access (language in Windows, administrative access to Active Directory), so useless password administrator account unknown. This forces the associated administrative access to each connection (ie the users), as opposed to all share the administrator account. If necessary, you can remove this access for the user deletes an account.
    
File Encryption - Keep in mind that the "salary" file that I said? Just save the file with a password, which happens also to encrypt the file, and share the password only you need to know.
    
Dismissal - Be prepared when you cook a network administrator, especially if you have one (see Tip 7). Accompany them to the door right away, do not let them have access to the network and disable the connection.
    
System passwords - At least three people of high rank in the organization need a separate access to the super user level access daily. We also need to know all the router password, firewall, online services, phone system, etc. Passwords should be tested at random times during the year. These passwords should be kept in a safe place, not on the network.
    
Documentation Network - Networks incredibly complicated, and router connections in offices and the Internet, backup systems, sub-IP networks, the policy of the firewall and telephony systems complex, so much so that even the best network engineer could spend days relaxing and the understanding of the network without documentation. If the administrator is not available in the crisis of the system; Password system and network documentation will save the day.
    
Email privacy - If you need to calmly e-mail, consider using an Internet e-mail service like Gmail or MSN. Keep in mind that this e-mail can be "sniffed" and there may be legal reasons to bypass the internal messaging system.

0 Response to "networking administrator"

Posting Komentar