Topic > Network Management - 1212

In the following report I will discuss the role of network management and how the network manager contributes to the security of an organization's network. Network security will be discussed in depth to inform the extent of impact network attacks can have on an organisation. Once I've covered the impact of network security, I'll look at all the possible threats that can harm an organization and the steps network managers should take to protect a network to the best of their ability. The importance of networking tools will be introduced last along with the benefits they can offer. Network Management Network managers are responsible for ensuring efficiency across a network, this includes a range of jobs such as monitoring the network for problems and fixing them before they impact users of the network. , ensuring that network security is fully up to date and capable of protecting the network from all threats, limiting employee access to files they don't need, updating networks with different routing protocols, and ensuring that two networks are compatible in the event of a merger or business expansion and resource conservation. Resource maintenance refers to keeping track of resources on a network and making sure users who need them have access. Network managers may be responsible for other tasks, which vary depending on the workplace, such as planning and developing new networks. In relation to the designed network, the network manager should ensure that all routers are compatible with each other, regarding router protocols such as EIGRP where a process ID must match if routers are to become adjacent and addressed correctly to ensure that the data can be sent to its destination from any point on the network,...... middle of paper. .....ONLINE] Available at: http://www.cisco.com/cisco/web/UK/solutions/small_business/resource_center/articles/secure_my_business/what_is_network_security/index.html. [Accessed 16 December 2013]. Zero-day attack - Wikipedia, the free encyclopedia. 2013. Zero-day attack - Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/Zero-day_attack. [Accessed December 16, 2013]. Intrusion prevention system - Wikipedia, the free encyclopedia. 2013. Intrusion Prevention System - Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/Intrusion_prevention_system. [Accessed December 16, 2013].Five free network monitoring tools - TechRepublic. 2013. Five Free Network Monitoring Tools - TechRepublic. [ONLINE] Available at: http://www.techrepublic.com/blog/five-apps/five-free-network-monitoring-tools/. [Accessed 16 December 2013].