What-is-cybersecurity-all-about-Week-1-3 (1)
What-is-cybersecurity-all-about-Week-1-3 (1)
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information;
extorting money from users through ransomware; or interrupting normal business processes.
Implementing effective cybersecurity measures is particularly challenging today because there are more
devices than people, and attackers are becoming more innovative.
A successful cybersecurity posture has multiple layers of protection spread across the computers,
networks, programs, or data that one intends to keep safe. In an organization, a unified threat
management gateway system can automate integrations across products and accelerate key security
operations functions: detection, investigation, and remediation. People, processes, and technology must
all complement one another to create an effective defense from cyberattacks.
People
Users must understand and comply with basic data protection and privacy security principles like
choosing strong passwords, being wary of attachments in email, and backing up data. Learn more about
basic cybersecurity principles from these Top 10 Cyber Tips (PDF).
Processes
Organizations must have a framework for how they deal with both attempted and successful
cyberattacks. One well-respected model, the NIST cybersecurity framework, can guide you. It explains
how you can identify attacks, protect systems, detect and respond to threats, and recover from
successful attacks.
Technology
Technology is essential to giving organizations and individuals the computer security tools needed to
protect themselves from cyberattacks. Three main entities must be protected: endpoint devices like
computers, smart devices, and routers; networks; and the cloud. Common technology used to protect
these entities include next-generation firewalls, Domain Name System (DNS) filtering, malware
protection, antivirus software, and email security solutions.
In today's connected world, everyone benefits from advanced cybersecurity solutions. At an individual
level, a cybersecurity attack can result in everything from identity theft to extortion attempts, to the loss
of important data like family photos. Everyone relies on critical infrastructure like power plants,
hospitals, and financial service companies. Securing these and other organizations is essential to keeping
our society functioning.
Everyone also benefits from the work of cyberthreat researchers, like the team of 250 threat researchers
at Talos, who investigate new and emerging threats and cyberattack strategies. They reveal new
vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open-source tools.
Their work makes the internet safer for everyone.
Network Administration Definition
Network administration aims to manage, monitor, maintain, secure, and service an organization’s
network. However, the specific tasks and procedures may vary depending on the size and type of an
organization.
Network administration primarily consists of, but isn’t limited to, network monitoring, network
management, and maintaining network quality and security.
Network monitoring is essential to monitor unusual traffic patterns, the health of the network
infrastructure, and devices connected to the network. It helps detect abnormal activity, network issues,
or excessive bandwidth consumption early on and take preventative and remedial actions to uphold the
network quality and security.
o applying security patches and updating the firmware of the networking infrastructure, such as
routers, hubs, switches, and firewalls
o evaluating quality and capacity to increase or decrease network capacity and manage resource
wastage
Network security employs various techniques to ensure a network is secure. For example, it uses
multiple tools such as firewalls, intrusion detection or prevention systems, and anti-malware software to
prevent or detect malicious activity in the network.
Network administration aims to ensure a reliable, secure network conducive to business operations.
o plan and improve network capacity to enable seamless network access and operations
o leverage networking tools for network systems administration and better network
administration control
o track and document relevant changes
1. Fault management: Monitors the network infrastructure to identify and address issues
potentially affecting the network. It uses standard protocols such as Simple Network
Management Protocol (SNMP) to monitor network infrastructure.
3. Account management: Tracks network utilization to bill and estimate the usage of various
departments of an organization. In smaller organizations, billing may be irrelevant. However,
monitoring utilization helps spot specific trends and inefficiencies.
5. Security management: Aims to ensure only authorized activity and authenticated devices and
users can access the network. It employs several disciplines such as threat management,
intrusion detection, and firewall management. It also collects and analyzes relevant network
information to detect and block malicious or suspicious activity.
o distributing software upgrades efficiently using tools such as Windows Server Update Services
(WSUS)
There is a wide range of professional IT software on the market that helps network administrators in
their daily tasks. One of the most widely used software are remote access and management tools which
allows network administrators to control computers remotely. It is a useful tool for network
administrators in small companies because it can help them to provide remote support to users, manage
user accounts and monitor network activity.
Network administrators use various networking software and tools to optimally perform network
operations, including compliance, automation, configuration, real-time monitoring and alerting, network
inventory management, performance management, and vulnerability assessment.
A network administrator focuses on the day-to-day aspects of managing and maintaining a network;
whereas, a network engineer focuses on network engineering aspects, specifically the lifecycle of a
network and its design and strategic implementation.
In a larger enterprise, a network engineer may oversee a team of network administrators and collaborate
with them to solve network issues and improve overall utilization and efficiency. Similarly, the roles and
responsibilities of network administrators and engineers may overlap, but the differences are outlined
below.
Network Administrator:
o ensures the network is secure by blocking suspicious activity and mitigating the risk of security
breaches
o applies utilization, authentication, and authorization policies to maintain the quality and security
of the network
Network Engineer:
o designs network architecture and develops the entire network based on an organization’s
requirements
o researches and introduces better technologies and implements them into the network lifecycle