Preview

Network and Security

Good Essays
Open Document
Open Document
397 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network and Security
With network security in place, your company will experience many business benefits. Your company is protected against business disruption, which helps keep employees productive. Network security helps your company meet mandatory regulatory compliance. Because network security helps protect your customers ' data, it reduces the risk of legal action from data theft.
Ultimately, network security helps protect a business 's reputation, which is one of its most important assets.

Network Security Administrator

Network security is designed to protect the network and data from different threats like viruses, worms, and Trojan horses. Network and security targets variety of threats and stops them from entering or spreading on the network. In every field we can see that network and security has played vital role and how it helps to protect the network. There are different types of jobs related to networking and security one of which is network security administrator.
The main responsibility of network security administrators is that it keeps an organization 's computer systems and data secure from internal and external threats. They also make sure that system backups are in place and also create recovery procedures. Another key duty of security administrators is adding anti-virus software to the system.
According to May 2009 data provided by the U.S. Bureau of Labor Statistics (BLS), network security administrators earned a median salary of $67,710. It is also said that several industries paid higher than the average which is more than $88,000 per year.
Network security administrators must be organized, analytical and capable of identifying and solving problems. They must be computer experts, staying current with the latest technology monitoring and security programs. They should possess excellent communication skills, quickly alerting management and employees when security has been breached or needs updating. Along with those things, security



References: http://education-portal.com/articles/Salary_and_Career_Info_for_a_Network_Security_Administrator.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    network monitoring and maintenance, the need for an additional system administrator, and the risks of not…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Between every network and the outside host of threats there is a first line of defense. For almost every network this will be a firewall. A firewall can be both hardware and software and is usually a combination of the two. A firewall creates a barrier between networks. Any outside computer or client must pass through the firewall to access the network or its resources. Only a computer or system that has proper access can easily access a network protected by a properly configured firewall. Though it is not infallible, a firewall is the first and perhaps best means of security…

    • 855 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The more time you spend hardening your network, the safer it will be for not only your customers but your employees as well. Your Human Resources department will undoubtedly have confidential personal information on file for every employee. This could include social security numbers, information on dependents, emergency contacts, home addresses and telephone numbers, etc. That information will most likely be stored in an electronic format somewhere on your network. Keeping that information safe and secure from prying eyes should be a…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Threats can be encounter by a network administrator. One can come from the administrator because even after training is complete, they still can make errors if they do not understand what they have learned. Human error is still a factor but from a different point of view. If an administrator had the training and his expectation was just to be an administrator and not deal with security, he may not be too concerned about the security aspect of the job. New administrators must clearly understand what position they are being hire for. Matthias did know he was going to have to take basic information security training; it was a surprise to him. Another thing that will affect a new employee is if the supervisor is not engaged in the training of the new employees. This also can be one of the…

    • 621 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Types of controls, that an admin can implement, are login identifiers, system and data audits, firewalls, encryption, and session timeouts. All of these controls help to prevent, defect, and correct the network from potential threats. Identifiers are simply authentication methods used to gain access to a network. Audits need to be completed to investigate the activities of personnel as well as identify the status of the overall network. Firewalls must be put in place to protect the network against unwanted users and bugs. Encryption should be used to ensure all data traffic is protected from prying eyes or individuals scanning the network for information they can steal or abuse. Lastly, a policy implementing session timeouts must be enforced to hold all users liable for not properly locking their computers when walking away from it.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Confidentiality and information security are key factors for an organisation. It allows organisations to ensure they preserve these along with…

    • 2721 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    Security is a fundamental aspect of any network infrastructure. The goal is to always have the most up to date programs and protocols to ensure the protection of the network. No aspect is too small to over look. That could mean the difference between a secure network and a compromised network. The best way to achieve this is to break down every level and approach each one as a separate entity and secure it. Then you can modify it to suit the needs of your network.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Good Essays

    A computer security manager must have knowledge of the latest computer and network policies, patches, and have good technical experience with many types of hardware and software products, superior communication skills, and willingness to learn and update skills, and a knack for problem solving skills.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Better Essays

    It is sad but true: One reason administrators don't put as much security on networks as they could is because they do not want to have to deal with the false positives. As a security administrator, you must seek a balance between being overwhelmed with too much unneeded information and knowing when something out of the ordinary is occurring. Although collecting as much information as possible is important, no one can be blamed for trying to protect their data. While it may be admirable to catch a crook deleting your data, if you can keep the data from being deleted, you will stand a much better chance of still being employed tomorrow.…

    • 1817 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings…

    • 4413 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    information security

    • 528 Words
    • 3 Pages

    IT security: Sometimes referred to as computer security, Information Technology Security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory (even a calculator). IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.…

    • 528 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Security is one of the most important things on the network, the staff needs to practice on the field of security in the network, as they need to learn and awareness on the dangers of network security, You must deal with their recommended, for example, they should not open e-mail facilities, except in the case of trust and find out the source of the sender. They must also training on how to recognize and identify the hackers, phishing attempts, there several ways Prowler are used, for example, asks the user name and password of the sites that show like areal sites .…

    • 914 Words
    • 4 Pages
    Good Essays