0% found this document useful (0 votes)
9 views

What-is-cybersecurity-all-about-Week-1-3 (1)

Cybersecurity involves protecting systems, networks, and programs from digital attacks aimed at accessing or destroying sensitive information, extorting money, or disrupting business processes. Effective cybersecurity requires a combination of people, processes, and technology, with a focus on user education, established frameworks like the NIST cybersecurity framework, and protective technologies. Network administration, a key aspect of cybersecurity, involves managing and securing an organization's network through monitoring, configuration, and performance management.

Uploaded by

jhegs tindugan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

What-is-cybersecurity-all-about-Week-1-3 (1)

Cybersecurity involves protecting systems, networks, and programs from digital attacks aimed at accessing or destroying sensitive information, extorting money, or disrupting business processes. Effective cybersecurity requires a combination of people, processes, and technology, with a focus on user education, established frameworks like the NIST cybersecurity framework, and protective technologies. Network administration, a key aspect of cybersecurity, involves managing and securing an organization's network through monitoring, configuration, and performance management.

Uploaded by

jhegs tindugan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

What is cybersecurity all about?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information;
extorting money from users through ransomware; or interrupting normal business processes.

Implementing effective cybersecurity measures is particularly challenging today because there are more
devices than people, and attackers are becoming more innovative.

A successful cybersecurity posture has multiple layers of protection spread across the computers,
networks, programs, or data that one intends to keep safe. In an organization, a unified threat
management gateway system can automate integrations across products and accelerate key security
operations functions: detection, investigation, and remediation. People, processes, and technology must
all complement one another to create an effective defense from cyberattacks.

People

Users must understand and comply with basic data protection and privacy security principles like
choosing strong passwords, being wary of attachments in email, and backing up data. Learn more about
basic cybersecurity principles from these Top 10 Cyber Tips (PDF).

Processes

Organizations must have a framework for how they deal with both attempted and successful
cyberattacks. One well-respected model, the NIST cybersecurity framework, can guide you. It explains
how you can identify attacks, protect systems, detect and respond to threats, and recover from
successful attacks.

Technology

Technology is essential to giving organizations and individuals the computer security tools needed to
protect themselves from cyberattacks. Three main entities must be protected: endpoint devices like
computers, smart devices, and routers; networks; and the cloud. Common technology used to protect
these entities include next-generation firewalls, Domain Name System (DNS) filtering, malware
protection, antivirus software, and email security solutions.

Why is cybersecurity important?

In today's connected world, everyone benefits from advanced cybersecurity solutions. At an individual
level, a cybersecurity attack can result in everything from identity theft to extortion attempts, to the loss
of important data like family photos. Everyone relies on critical infrastructure like power plants,
hospitals, and financial service companies. Securing these and other organizations is essential to keeping
our society functioning.

Everyone also benefits from the work of cyberthreat researchers, like the team of 250 threat researchers
at Talos, who investigate new and emerging threats and cyberattack strategies. They reveal new
vulnerabilities, educate the public on the importance of cybersecurity, and strengthen open-source tools.
Their work makes the internet safer for everyone.
Network Administration Definition

Network administration aims to manage, monitor, maintain, secure, and service an organization’s
network. However, the specific tasks and procedures may vary depending on the size and type of an
organization.

What does network administration consist of?

Network administration primarily consists of, but isn’t limited to, network monitoring, network
management, and maintaining network quality and security.

Network monitoring is essential to monitor unusual traffic patterns, the health of the network
infrastructure, and devices connected to the network. It helps detect abnormal activity, network issues,
or excessive bandwidth consumption early on and take preventative and remedial actions to uphold the
network quality and security.

Network management encompasses multiple administrative functions, including network planning,


implementation, and configuration. It involves:

o replanning the network based on changing organizational requirements

o implementing the network for maximum efficiency

o configuring various networking and security protocols

o applying security patches and updating the firmware of the networking infrastructure, such as
routers, hubs, switches, and firewalls

o assessing the network for weaknesses

o evaluating quality and capacity to increase or decrease network capacity and manage resource
wastage

Network security employs various techniques to ensure a network is secure. For example, it uses
multiple tools such as firewalls, intrusion detection or prevention systems, and anti-malware software to
prevent or detect malicious activity in the network.

Network administration goals

Network administration aims to ensure a reliable, secure network conducive to business operations.

Generally, network administration goals include:

o maintain a resilient, high-quality network

o plan and improve network capacity to enable seamless network access and operations

o leverage networking tools for network systems administration and better network
administration control
o track and document relevant changes

o evaluate possible risks and orchestrate effective mitigations

o prevent activities compromising or using the network as an attack vector

o identify and mitigate intrusions to avoid security breaches

Network administration key areas

Networks administration consists of 5 key areas:

1. Fault management: Monitors the network infrastructure to identify and address issues
potentially affecting the network. It uses standard protocols such as Simple Network
Management Protocol (SNMP) to monitor network infrastructure.

2. Configuration management: Tracks configuration and related changes of network components,


including switches, firewalls, hubs, and routers. As unplanned changes can affect the network
drastically and potentially cause downtime, it’s essential to streamline, track, and manage
configuration changes.

3. Account management: Tracks network utilization to bill and estimate the usage of various
departments of an organization. In smaller organizations, billing may be irrelevant. However,
monitoring utilization helps spot specific trends and inefficiencies.

4. Performance management: Focuses on maintaining service levels needed for efficient


operations. It collects various metrics and analytical data to continually assess network
performance, including response times, packet loss, and link utilization.

5. Security management: Aims to ensure only authorized activity and authenticated devices and
users can access the network. It employs several disciplines such as threat management,
intrusion detection, and firewall management. It also collects and analyzes relevant network
information to detect and block malicious or suspicious activity.

What does a network administrator do?

A network administrator typically manages an organization’s network and is responsible for:

o installing, monitoring, troubleshooting, and upgrading network infrastructure, including both


hardware and software components

o monitoring network activity

o implementing optimization techniques to improve network efficiency and utilization

o managing and granting network access to users and endpoint devices

In smaller organizations, the responsibilities of a network administrator also include:

o distributing software upgrades efficiently using tools such as Windows Server Update Services
(WSUS)

o planning and executing routine backups


o managing and distributing licenses and maintaining compliance with licensing agreements

o installing new software applications and hardware appliances

There is a wide range of professional IT software on the market that helps network administrators in
their daily tasks. One of the most widely used software are remote access and management tools which
allows network administrators to control computers remotely. It is a useful tool for network
administrators in small companies because it can help them to provide remote support to users, manage
user accounts and monitor network activity.

Network administrator tools and software

Network administrators use various networking software and tools to optimally perform network
operations, including compliance, automation, configuration, real-time monitoring and alerting, network
inventory management, performance management, and vulnerability assessment.

Due to the increasing number of networking components in an organization’s network, it becomes


difficult to manage the network manually, which is also error-prone. By implementing basic and
advanced tools, network administrators can automate several tasks and focus on more value-adding
tasks needing their attention.

What is the difference between a network administrator and a network engineer?

A network administrator focuses on the day-to-day aspects of managing and maintaining a network;
whereas, a network engineer focuses on network engineering aspects, specifically the lifecycle of a
network and its design and strategic implementation.

In a larger enterprise, a network engineer may oversee a team of network administrators and collaborate
with them to solve network issues and improve overall utilization and efficiency. Similarly, the roles and
responsibilities of network administrators and engineers may overlap, but the differences are outlined
below.

Network Administrator:

o is responsible for managing and maintaining the network in real time

o ensures the network is secure by blocking suspicious activity and mitigating the risk of security
breaches

o implements security programs based on hardware and software

o manages on-site networking servers responsible for business operations

o ensures network integrity and resilience to maintain service levels

o tests the network to uncover weaknesses and mitigate them

o monitors and tracks utilization

o applies utilization, authentication, and authorization policies to maintain the quality and security
of the network
Network Engineer:

o designs network architecture and develops the entire network based on an organization’s
requirements

o plans and implements both wired and wireless networks

o broadly manages the underlying network equipment

o strategically ensures network performance is as desired

o researches and introduces better technologies and implements them into the network lifecycle

o collaborates with network administrators to manage and remediate network issues

You might also like