Preview

Network and Security

Good Essays
Open Document
Open Document
397 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network and Security
With network security in place, your company will experience many business benefits. Your company is protected against business disruption, which helps keep employees productive. Network security helps your company meet mandatory regulatory compliance. Because network security helps protect your customers ' data, it reduces the risk of legal action from data theft.
Ultimately, network security helps protect a business 's reputation, which is one of its most important assets.

Network Security Administrator

Network security is designed to protect the network and data from different threats like viruses, worms, and Trojan horses. Network and security targets variety of threats and stops them from entering or spreading on the network. In every field we can see that network and security has played vital role and how it helps to protect the network. There are different types of jobs related to networking and security one of which is network security administrator.
The main responsibility of network security administrators is that it keeps an organization 's computer systems and data secure from internal and external threats. They also make sure that system backups are in place and also create recovery procedures. Another key duty of security administrators is adding anti-virus software to the system.
According to May 2009 data provided by the U.S. Bureau of Labor Statistics (BLS), network security administrators earned a median salary of $67,710. It is also said that several industries paid higher than the average which is more than $88,000 per year.
Network security administrators must be organized, analytical and capable of identifying and solving problems. They must be computer experts, staying current with the latest technology monitoring and security programs. They should possess excellent communication skills, quickly alerting management and employees when security has been breached or needs updating. Along with those things, security



References: http://education-portal.com/articles/Salary_and_Career_Info_for_a_Network_Security_Administrator.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    network monitoring and maintenance, the need for an additional system administrator, and the risks of not…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The network infrastructure is the first line of defense between the Internet and public facing web servers. Firewalls provide the first line of defense in network security infrastructures. They accomplish this by comparing corporate policies about users' network access rights to the connection information surrounding each access attempt. User policies and connection information must match up, or the firewall does not grant access to network resources; this helps avert break-ins.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The more time you spend hardening your network, the safer it will be for not only your customers but your employees as well. Your Human Resources department will undoubtedly have confidential personal information on file for every employee. This could include social security numbers, information on dependents, emergency contacts, home addresses and telephone numbers, etc. That information will most likely be stored in an electronic format somewhere on your network. Keeping that information safe and secure from prying eyes should be a…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Threats can be encounter by a network administrator. One can come from the administrator because even after training is complete, they still can make errors if they do not understand what they have learned. Human error is still a factor but from a different point of view. If an administrator had the training and his expectation was just to be an administrator and not deal with security, he may not be too concerned about the security aspect of the job. New administrators must clearly understand what position they are being hire for. Matthias did know he was going to have to take basic information security training; it was a surprise to him. Another thing that will affect a new employee is if the supervisor is not engaged in the training of the new employees. This also can be one of the…

    • 621 Words
    • 2 Pages
    Good Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Types of controls, that an admin can implement, are login identifiers, system and data audits, firewalls, encryption, and session timeouts. All of these controls help to prevent, defect, and correct the network from potential threats. Identifiers are simply authentication methods used to gain access to a network. Audits need to be completed to investigate the activities of personnel as well as identify the status of the overall network. Firewalls must be put in place to protect the network against unwanted users and bugs. Encryption should be used to ensure all data traffic is protected from prying eyes or individuals scanning the network for information they can steal or abuse. Lastly, a policy implementing session timeouts must be enforced to hold all users liable for not properly locking their computers when walking away from it.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Security is a fundamental aspect of any network infrastructure. The goal is to always have the most up to date programs and protocols to ensure the protection of the network. No aspect is too small to over look. That could mean the difference between a secure network and a compromised network. The best way to achieve this is to break down every level and approach each one as a separate entity and secure it. Then you can modify it to suit the needs of your network.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Better Essays

    It is sad but true: One reason administrators don't put as much security on networks as they could is because they do not want to have to deal with the false positives. As a security administrator, you must seek a balance between being overwhelmed with too much unneeded information and knowing when something out of the ordinary is occurring. Although collecting as much information as possible is important, no one can be blamed for trying to protect their data. While it may be admirable to catch a crook deleting your data, if you can keep the data from being deleted, you will stand a much better chance of still being employed tomorrow.…

    • 1817 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Network Administrator

    • 792 Words
    • 4 Pages

    The network administrator (or "network admin") is usually the level of technical/network staff in an organization and will rarely be involved with direct user support.[citation needed] The network administrator will concentrate on the overall integrity of the network, server deployment, security, and ensuring that the network connectivity throughout a company's LAN/WAN infrastructure is on par with technical considerations at the network level of an organization's hierarchy. Network administrators are considered Tier 3 support personnel that only work on break/fix issues that could not be resolved at the Tier1 (helpdesk) or Tier 2 (desktop/network technician) levels.…

    • 792 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 2009 proceedings…

    • 4413 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Responsibilities of Information Security Administrator include the management and supervision of use of security measures to protect data, and conduct of personnel in relation to the protection of data. Information Security Administrator responsible for defining security frameworks for existing and new systems. He is responsible for system security planning, developing, and implementing security policies across multiple platforms; ensures successful implementation and maintenance of the defined standards; ensures compliance of IT Security Policies; provides support in security management and security architect standards and documentations; manages and supports networking and security services in LAN, WAN and Internet network infrastructure; manages…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    information security

    • 528 Words
    • 3 Pages

    IT security: Sometimes referred to as computer security, Information Technology Security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory (even a calculator). IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.…

    • 528 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Security is one of the most important things on the network, the staff needs to practice on the field of security in the network, as they need to learn and awareness on the dangers of network security, You must deal with their recommended, for example, they should not open e-mail facilities, except in the case of trust and find out the source of the sender. They must also training on how to recognize and identify the hackers, phishing attempts, there several ways Prowler are used, for example, asks the user name and password of the sites that show like areal sites .…

    • 914 Words
    • 4 Pages
    Good Essays