Preview

Tui Itm 550 Network Administration

Better Essays
Open Document
Open Document
1839 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Tui Itm 550 Network Administration
ITM 550

MODULE FOUR CASE ASSIGNMENT

5 June 2011

Why do companies find it necessary to distinguish between network administration and systems administration?

The first line of defense for almost every organization is typically the system administrator. This is the person that actively interacts with the company network on a daily basis, and by extension has intimate knowledge of it. So it stands to reason that this person would hopefully be the first to notice any signs of possible compromise would it not? Sadly that is often not the case. Whether it is due to a lack of IT Training, complacency, or laziness is anyone’s guess.
Several of the company networks that I have been involved with have the same story. All of them have been compromised by exploits, which have been out in the wild for some time. In other words a patch for the exploit has been released and is available. Why then did the system administrator not go out and download then install this patch? Surely it cannot be ignorance? A system administrator is a knowledgeable person who has specialized knowledge. If they can successfully administer a large LAN composed of hundreds of users and a dozen servers what is the issue then?
I’m too busy!
One possible issue is that the administrator is simply too busy. Though as I am sure they will admit it is easier to simply go to the vendor site and get the patch then it is to rebuild an entire machine. This is especially so if it is one of your critical servers. That also begs the question of: does the sys admin regularly check that the backups actually work? Should the worst happen and you are compromised does your backup actually have what it is supposed to have? Nothing is worse then finding out your backup plan actually doesn’t work. Rather imperative I would think that you would need to verify the integrity of your restoration media. Few and far between are the admins that actually do check their backups in my experience. An unacceptable



Bibliography: Parker, DP. (2005, July 21). System adminstrator friend or foe. Retrieved from http://www.windowsecurity.com/articles/Sys-Admin-Friend-Foe.html Wikipedia. (2011, May 27). Network administrator. Retrieved from http://en.wikipedia.org/wiki/Network_administrator

You May Also Find These Documents Helpful

  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    network monitoring and maintenance, the need for an additional system administrator, and the risks of not…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To recap, the security breach was reported on a Friday. On Monday, looked on Microsoft’s website to see when the patch would be released, and it indicated that it would take 3 days for it to be available. Counting Monday, 3 days would be, Wednesday. Depending on the time that the patch is released on Wednesday, would need an additional 2 days to download and test the patch before deploying, if early Wednesday, then Thursday to test. But if it comes late Wednesday, then it would take Thursday and Friday to test. Then that would leave the weekend, if the IT staff would work on the weekend. But if not, then it is going to restart on Monday and complete on…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NTC 415 Network Integration Project Entire Course http://www.accttutorials.com/downloads/ntc-415-network-integration-project-entire-course/ Click above Link to get this A Graded Material For More information visit our website: http://www.accttutorials.com NTC 415 Network Integration Project Entire Course NTC 415 Week 1 DQs. NTC 415 Week 1 Individual Enterprise Network Architectures. NTC 415 Week 2 DQs. NTC 415 Week 2 Individual Network Connections Paper.…

    • 146 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    ISSC342 Assignment5

    • 338 Words
    • 1 Page

    In addition to removing programs and services network administrators should also restrict the accesses the users have on client systems limit what they can do to effect the security of the network. If users could change the security settings or download third party software from potentially unsafe websites they could very easily compromise the security of the network. By limiting user access and defining user roles network administrators can potentially prevent future system vulnerabilities that a user may introduce to the system either unwittingly or maliciously. Another system hardening measure that should be taken to help secure the client side of the network is disabling the default administrator account after you create additional administrator accounts assigned to different roles. (Solomon, 2014)…

    • 338 Words
    • 1 Page
    Good Essays
  • Good Essays

    Lab 4

    • 327 Words
    • 2 Pages

    MBSA scans for missing updates and vulnerability where Microsoft updates only scans for missing updates…

    • 327 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    100 NT 2580 U2A1

    • 465 Words
    • 2 Pages

    Let’s say for this particular scenario, that the attack hole was detected on Tuesday morning at 9:00am, and the attack happened the next day, or on Wednesday, around 8:00am. If the software company or manufacturer can’t have the patch ready for about 3 days, this means that we’ll most likely receive the patch around Monday or Tuesday of the following week. This is because in most cases, business days are when anything from a software company will be carried out. Once this patch has been received by the LAN administrator, he/she will need to install it and conduct tests to make sure that everything within the patch is fully…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This can be through a desktop, company laptops, tablets, or any device that connects to the network. Employees should always remember to log off their workstations to avoid unauthorized use as well as not giving out their passwords to co-workers. A good idea is to enable the screen lockout when the desktop is idle. Also block or limit user rights to download, install software, and their access to certain files on the web. This can decrease the threat of viruses, malware, and any harmful files being seen, downloaded, and installed into the system through the workstation. It is very easy for threats to spread throughout the network so it is very important to have a top shelf Anti-virus in place and enable it to scan any CD, DVD, or USB drives inserted into the…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What elements are needed in a workstation domain policy regarding use of anti-virus and malicious…

    • 1020 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Unit 1

    • 578 Words
    • 3 Pages

    The first domain that would be affected is the User Domain. The User Domain defines the people who access an organization’s information system. One of the roles and tasks is that the user can access systems, applications, and data depending upon their defined access rights. Inside the User domain is where the user would find the acceptable user policy or AUP. The AUP defines what users are allowed to do within the organization-owned IT assets. The User Domain is considered the weakest and most affected domain. One reason why is that it has a lack of user awareness. Another reason is that when users are downloading various content and different files, they generally do not conform to the established security guidelines. To protect from these issues, there should be enabled content filtering as well as automatic antivirus scans. A way to protect from an user doing Employee blackmail or extortion is to enable intrusion detection system/intrusion prevention system (IDS/IPS) monitoring. The monitoring will examine the IP data streams for inbound and outbound traffic.…

    • 578 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Advanced Topologies, Inc. needs to look at its Human Resources department and how they train their new employees. Right now the threat will mostly come from Matthias because he has been working without the knowledge needed to look for security threats. Without the right training for your employees, you run the risk of being your own threat. To remove the risk that Matthias may bring to ATI, he should have been properly trained before starting. All administrators should have the information security training before working on ATI’s network. Alfonso should be aware of what security concern will affect ATI, but as the superior, he did not seem overly concerned about the security of the network. Ensuring that personnel have the right skills to administer your network is a plus for a superior. Alfonso should not have not allowed Matthias to work on the network, without first informing him of all of his responsibilities. Once the inside threat has been removed we can now move on to looking at other users. Network monitoring is just important as knowing how your network runs. With the right training, you will know what threats to be aware of.…

    • 621 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There are many ways to tighten up security when it comes to network security, but the most important part of the security in the actual user. If the user is not trained on the system and does not know ones regulations of the company then security is out the door. First and for most, the personal must continues training on the systems that they will have access to. Then there system must be prepared for the environment that they will be placed in. If the policy allows access to facebook then the server address won’t be blocked. If they don’t allow any other programs, software, or web sites then for work, then the computer must be set up for that purpose of working only. That is how one lowers the threat level on the user’s level. For authentication, authorization, and accounting the IT department must stay on top of their duties and have the passwords changed every so often. The IT team must also give the correct level of access to the person that is due it. And continue with follow ups on the system to insure that all is still well. For prevention they must try and stay one step ahead of the intruders. They must think like the hackers and try and get through their systems. For responding to intrusions a company should have a response team or a Disaster Recovery Team in place to act in cases of intrusions. There should be back systems in place to as not hinder the company day to day operation. Files should be backed up in a timely manner also. But a system is never fully…

    • 310 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Failures can occur at any level of a network and the network admin must be prepared in the wake of these occurrences. There are varying types of centralized systems that businesses can implement.…

    • 652 Words
    • 3 Pages
    Good Essays
  • Better Essays

    There are a few reasons why McAfee’s antivirus software created so many problems for their users. First, when test simulations were done, management did not run these tests for Windows XP, with service pack 3, users using the McAfee VirusScan version 8.7 (Laudon & Laudon, 2012, p. 304). Most McAfee users of VirusScan were using Windows XP service pack 3 and the VirusScan version 8.7, these were the individuals most affected by this faulty update download. The update for VirusScan was intended to deal with the new virus ‘W32/wecorl.a’. However, it was not known that this virus could make itself appear as the name svchost.exe, which is a Windows file that is critical to PC’s performance (Laudon & Laudon, 2012, p. 304). It was also the slipup of the company to not detect this problem sooner. There was such a high demand for faster antivirus updates that lead to this slipup.…

    • 1828 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Electronic Crime

    • 3971 Words
    • 13 Pages

    The first vulnerability that will cause hackers to infect company daily routine is companies that do not deal with any monitoring of the system and setup of a machine that did not take security as prior. Furthermore, no regular audit and upgrade of software will also cause defective in the company and make hackers steal company confidential information more easily. If a company is adapting this kind of working environment, Distributed Denial of Services (DDOS) will often experience by this organization and company will not last long in the market because always be the target of attackers.…

    • 3971 Words
    • 13 Pages
    Better Essays

Related Topics