Free Essay

Network Management and Security

In:

Submitted By mutenyo
Words 2230
Pages 9
(Name)
(Instructors’ name)
(Course)
(Date)
Network Management and Security A telecommunication Management Network, commonly known as TMN, is an infrastructure that provides interfaces for connection between several types of operating systems and telecommunications equipment, so as to manage the telecommunication service and network. This is from Glenn Warnock and Nathoo Amin (215). Also, it enables the functioning of the management information, which is exchanged through these interfaces. On the other hand, 5620 SAM is widely used for developing distributed systems, as it provides the infrastructure for interoperability of several object oriented management applications. With this application, the 5620 enables applications of operating systems to interoperate with the service access manager, allowing it to provide connections, isolate and manage network issues across an Alcatel network (225). With this, users can access management information transparently and independent of the hardware and software platform. This therefore enhances the portability of applications, which are developed across the multiple platforms of management. The principles and concepts of the TMN that can be matched with the features and functions of the 5620 platforms include the specification translation and the interaction translation. Redundancy is also an important feature. It is the automatic transfer of data network to stand by, and protects the network against hardware failure, software failure and connectivity problems. According to Kent Hudley (128), fault tolerance is also significant in the carrier networks so as to provide reliability and maintain the availability of the system, even under the conditions of failure. For this to occur, the 5620 SAM has to use the hardware and software for redundancy. It duplicates both the software and the hardware of the database and the server, to monitor active and back up components to ensure recovery from failure automatically. The 5620 SAM also protects the server from any form of failure in the database or the server software or hardware platform, also from connectivity issues, which isolate the server from the network (Hundley 132). Duplication in the 5620 can be achieved by using the out of band and in band management connections to protect from issues in the connection between the managed network and the server. The open standards and technology platform that support the development of 5620 SAM include the open standards; Simple Object Access Protocol (SOAP) and XML, the J2EE framework of Java, web service interfaces and multi-tier layering. The open standards are usually used widely. Their inclusion in the 5620 SAM supports interoperability with the other systems (Warnock & Nathoo 232). SOAP is usually designed to enable separate distributed computing platforms, which enhance interoperability, which is accomplished by using the same protocols like flexibility, simplicity, platform neutrality, firewall friendliness, as it can get past the firewall, due to using the HTTP protocol and XML based messaging (Warnock & Nathoo 240). The use of open standards enables extendibility and good support. It is also resilient; therefore it is unlikely that future modifications of this infrastructure will have any impact on the applications that use this method. J2EE is a technology, whose aim is to make the design and implementation of enterprise applications simple. With this technology, the low level services are already implemented in that it separates these services from the logic of the application, since they are implemented by other servers (Hundley 145). Additionally, it is well documented and easily understood, standardized and reliable. It is also flexible such that it can be deployed anywhere, with just a few minor changes. Its architecture, which has four tiers namely; client tier, web tier, business tier and enterprise tier, matches well with the architecture of the 5620. The functionality of the multi tier architecture is well defined, separate and can be coded quickly. It is also easy to maintain and used together with several components of vendor products. The scales of changes in the system are usually contained within the components that provide flexibility for expanding (Hundley 147). Furthermore, different components can be extended over multiple processors or replicated for execution on multiple processors. The web services are usually developed when applications export their XML interfaces across the web that allows remote components and web portals to have access to the services. The XML access to the 5620 SAM functionality allows third party vendors to create customized windows into the services of 5620 SAM. Brijendra Singh, in network Security and Management (68) states that most operations of the SAM are structured as reads and writes, to and from a registry and a domain account. Basically, the SAM client calls public SAM routines. These routines then call internal routines, which encapsulate the RPC. On the side of the server, the internal routine does most of the work. The 5620 SAM client uses the component interface, which uses the industry –standard protocols for communication between itself and the server. The client interface provides access to the SAM server and other networks. The client sends request to the server, so as to view and change data objects in the data model and perform operations on the network (Singh 72). The server communicates with the client as follows; first, the OSS (Operating System Software) on the client side creates requests in XML form for processing on the server. The schema files provide the XML interface and definition for data objects, packages the related domain objects together and describe the attributes and methods of the objects. The JML interface also works at this point. The SAM Graphical User Interface (GUI) sends a request to the server EJB session using the Java RMI, the functionality of the auto client uses HTTPS or HTTP for updates communication and file downloads (Hundley 152). The XML and JMS services run on the same physical station as the server, but on different JVM, which reduces the stack size for processing threads and supporting multiple simultaneous connections of the client. The SAM GUI and SAM-O OSS clients use the JMS channel to receive real time information of the network event from the server (Singh 78).

Fig.1: Illustration of the interaction between the SAM client and server, other networked devices and the database. The 5620 SAM network management system provides a flexible network access, which allows users to interact with the network on a per customer or per service basis, or even at the level of individual devices (Hundley 162). The ability of the 5620 SAM to link services, customers, equipment and faults provide the ability to manage a complex network efficiently, by making routine operations simple and permitting bulk provisioning. The 5620 SAM creates a data model of the network, which includes the relationship between services, equipment and customers. The main and auxiliary servers collect data from the managed devices and collate them for billing, troubleshooting, performance monitoring, alarm reporting and inventory at both the customer and service level (Warnock and Nathoo 258). The main server deploys user commands to the network and performs an independent function like device discovery and backups. SAM-E is responsible for element management, which provides service and network discovery, device commissioning, alarm management, performance metrics display and mediation for the OSS system. Additionally, it also offers the generic network element (GNE) management capabilities, which extend to service topology, common session launch and alarm collection to the premise of the customer equipment, which is attached to the Ethernet switches and Alcatel-Lucent IP router. This is according to Carr Houston, Charles Snyder and Bliss Bailey in The Management of Network Security (122). On the management of equipment by the SAM-E, when a physical equipment is discovered, the database of the 5620 SAM is populated. It is then resynchronized with the database and its content is matched with the content of the physical device database. Thereafter, it is configured when clients send requests to add new equipment or change the existing one. The server then makes the changes to the data model and installs the updates on the relevant nodes. The network configuration is supported for LSP, MLSP and service tunnels, as well as routing protocols like ISIS, RIP and BGP, which are requested by the client and installed to the network (Bailey et al 132). Moreover, new nodes can be discovered automatically through server polls or on user request. If a new equipment or node is discovered, it is added to the data model and set to a state that is managed.

Fig. 2: Illustration of the virtual connections of a network
CE-Customer Edge
PE-Provider Edge
P-Provider Router The customer edge device (CE), provides access of the customer to the network of the service provider, over a data link to one or more provider edges (PE).They are usually operated by the end users. They are used in the 2nd layer, as an Ethernet switch, therefore they do not have to participate in the protocols of routing, but they have to know the VLAN running in the network of the customer. The Provider edge device (PE) is a router that is connected directly to the CE. They are Label Edge Routers (LER) in a MPLS network. The Provider Router (P) is the core network provider. In the MPLS, the routers network provider is LSR.
The dynamic and static labels of switched paths are included, which are used to support services for subscribers. Therefore, the network can be tracked for its billing, performance monitoring, alarms, reporting and inventory. The Multi Protocol Switching (MPLS) alters the routed network to a network that is switched. It also provides efficiency in transport, which is not in a traditional Internet protocol (IP) network that is, routed (Bailey et al 156). Consequently, predetermined paths are established for certain destinations, rather than forwarding packets. It is these paths, the (LSP) label-switched paths, which make the MPLS work. For the static configuration, the static LSPs are not similar to static routes. The Label Switching Routes (LSR) and LSP are configured manually and since no protocols signal the LSP dynamically, the load on the LSR is reduced. However, if changes in the topology are made, then the paths will not adapt to the new network and as a result, the topology changes the black holes of the routing (Bailey et al 167). On the other hand, the dynamic update is a key set back, which should not be overlooked but used whenever feasible. For the dynamic set up, the dynamic LSPs use signaling protocol, which establish themselves and transmit LSP information to other LSRs present in the network. The ingress router can be configured with the LSP information, which is transmitted all through the network, when the signaling protocols are transmitted across the LSR in the network. Since the LSRs need to exchange and process signaling instructions and packets, the dynamic LSPs consume more resources than the static LSPs. Nevertheless, the dynamic LSPs can avoid the black holes on the network, like those of static LSPs. This can be done by identifying the changes in the topology and establishing new LSPs dynamically, to move around the failure. The service management capabilities of the 5620 SAM permit the operations staff of the network to prerequisite Virtual private LAN service (VPLS), which is the layer two multipoint service, Virtual leased line (VLL), layer two point to point service, Virtual Private Routed Network (VPRN), a layer 3 IP multipoint service, Internet Enhanced Service (IES), a direct internet access service from an IP interface for internet connectivity or VLAN services for subscribers (Kent 183). These service networks can then be tracked for billing, performance monitoring, reporting, inventory and alarms. The Network Operations staff can then track the managed data of the network, from the traps of the SNMP, traffic analysis data, billing and SNMP MIB performance data. The data is then rolled up and correlated using the business logic and the data model on the server (Kent 185). The 5620 SAM is a single management platform, which offers element, network, Layer 2 and layer 3 service management. The management system excels at streamlining the service activation, network commissioning, troubleshooting, maintenance, service activation and integration of the Operation Support Systems (OSS), which allows service providers to improve their level of competitiveness. The VPRN considers a provider network, like an IP cloud, where only nodes are part of the VPN description. It is a class of VPN, which allows the connection of several sites in a routed domain over a network managed by the IP/MPLS. All the sites usually look like they are connected to a private router meant for customers only, on the side of the users. However, the service provider can reuse the infrastructure of the IP/MLPS to provide several services at the same time. Each of the VPRN look like an additional routing instance for a service between the several PE’s are exchanged using Multiple Protocol (MP-BGP).

Works Cited
Bailey, Bliss, Houston, Carr H and Snyder, Charles. The Management of Network Security: Technology, Design, and Management Control. Upper Saddle River, N.J: Prentice Hall, 2010. Print.
Hundley, Kent. Alcatel-lucent Scalable Ip Networks Self-Study Guide: Preparing for the Network Routing Specialist I (nrs 1) Certification Exam. Indianapolis, IN: Wiley, 2009. Internet resource.
Singh, Brijendra. Network Security and Management. New Delhi: Prentice-Hall of India, 2009. Print.
Warnock, Glenn, and Amin Nathoo. Alcatel-lucent Network Routing Specialist Ii (nrs Ii) Self- Study Guide: Preparing for the Nrs Ii Certification Exams. Indianapolis, Ind: Wiley, 2011. Internet resource.

Similar Documents

Premium Essay

Nt1310 Unit 1 Network Security Management System

...• an attempt to access a file or resource is denied due to insufficient privilege. • the permissions of a user or group are changed. • a new processes is created and the system activity related to the process. • a user changes their level of privilege. • when the host-based firewall denies a network connection. • all significant application events. For each audit event logged the system includes sufficient information to investigate the event, including related IP address, timestamp, hostname, username, application name and/or other details as appropriate. System logs are written to a different remote system in such a way that they cannot be altered by any user on the system being logged. Network Security The various departments have both intranets and extranets that are used to share information with...

Words: 913 - Pages: 4

Free Essay

A Fully Functional Network Design for Shelly Fashion

...NETWORKS AND TELECOMMUNICATONS A FULLY FUNCTIONAL NETWORK DESIGN FOR SHELLY FASHION PRESENTED BY: Osazuwa Olufemi George Business requirement Shelly fashion is a clothing boutique that sells clothes to both male and female customers. Their goal is to be the biggest retail clothing store in the country which aims to provide customers from the ages of 5 to 45 years of age a wide variety of quality clothing. The clothing retail store is open six days a week to customers who come in and buy their clothes directly at the store. The transaction is recorded and stored on the store’s computer with a Store Management Software which keeps track of inventory, sales, and computes the profits of the retail store biannually. Shelly fashion is looking to expand its reach using internet technology so it would be able to meet with the growing number of customers and also to connect all its other and future branches together to form a centralized network. With the network the retail store would be able to launch its home delivery option where customers would be able to buy clothes online and have their goods brought to them at their homes without having to be physically present at store. The business owners want to embark on a project to set up a telecommunications network which should be able to reach their business requirements. Shelly fashion’s business requirements for the proposed network are as follows: * Reduce operating cost by cutting cost too make telephone calls...

Words: 2953 - Pages: 12

Free Essay

Application Security on Windows and Linux

...of patch management, the importance and considerations of a written business security policy and cross-platform security. Contents Table of Contents 1 Abstract 2 Contents 2.1 Table of Contents 2.2 Table of Figures 2.3 List of Tables 3 Patch Management 3.1 Patch Management Defined 3.2 Patch Management Applications 3.3 Patch Management Scripting 4 The Written Business Security Policies 4.1 Importance of the Written Business Security Policy 4.2 Considerations of Creating the Written Business Security Policy 5 Cross-Platform Security Configurations 6 Conclusion  Table of Figures Figure 1: Windows to Linux Authentication  List of Tables Table 1: Patch Management Applications  Patch Management Patch Management Defined Over the years common security practices have evolved. With these practices the view on patch management has evolved as well. Just a few years ago the common mentality regarding patches was to install and forget. Many systems were deployed and left to their own, few were ever updated. With the rise of worms and malicious code such mentality is no longer accepted. With the new threat levels comes a new focus on patch management. In today’s network environment different methods of deploying and managing patches exist. Networks are unique, like fingerprints, most often no two are identical, and for this reason patch management has to be...

Words: 890 - Pages: 4

Premium Essay

Network Security Policy

...Leonardo Journal of Sciences ISSN 1583-0233 Issue 13, July-December 2008 p. 7-21 Network Security: Policies and Guidelines for Effective Network Management Jonathan Gana KOLO, Umar Suleiman DAUDA Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. jgkolo@gmail.com, usdauda@gmail.com Abstract Network security and management in Information and Communication Technology (ICT) is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password. This...

Words: 3892 - Pages: 16

Free Essay

Netw420 Cisco Network Management System

...Cisco Network Management System NETW-420 Enterprise Network Mgmt Professor Introduction Cisco uses the International Organization for Standardization network management model which defines five functional areas of Network management. The model consists of Fault Management, Configuration Management, Performance Management, Security Management, and Accounting Management. In this paper we will cover the models five functional areas. Fault Management Fault management detects, logs, notifies users of, and tries to automatically fix network problems to keep the network running effectively. Fault management is perhaps the most widely implemented of the ISO network management elements. The reason is because faults can cause downtime or unacceptable network degradation. Fault Management uses a network management platform deployed in an enterprise infrastructure that consists of multivendor network elements. Network management platforms can be viewed as the main console for network operations in detecting faults in the infrastructure. The platform receives and processes events from network elements in the network. Events from servers and other critical resources can also be forwarded to a management platform. A standard management platform consists of Network discovery, Topology mapping of network elements, Event handler, and Performance data collector and graphed. Configuration Management Configuration management monitors network and system configuration...

Words: 646 - Pages: 3

Premium Essay

Aircraft Solutions

...Principles of Information Security and Privacy Phase II Course Project Company Overview Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. Located in Southern California, AS has a dedicated, trained workforce and maintains a large capacity plant and extensive equipment to meet customer requirements. Much of the equipment is automated to increase production while reducing costs. The company's workforce has a large skill base: design engineers, programmers, machinists, and assembly personnel to work its highly-automated production systems. The mission of AS is to provide customer success through machined products and related services, and to meet cost, quality, and schedule requirements. The company strategy is to offer low-cost design and computer-aided modeling packages to customers to reduce their development expenses. AS will help the customer through all phases of new product deployment, from initial prototypes through final large-volume production and assembly. By involving itself in all phases of customer product development, AS hopes to establish long-term relationships and secure repeated follow-on business with its customers. In addition, AS continues to invest heavily in workforce education and training, so as to improve capability to serve its customers. Security Vulnerabilities Overall the network has solid hardware firewall...

Words: 1895 - Pages: 8

Premium Essay

Tnm Project

...Subject: Telecommunication Networks Management Assignment Number: Project Part A Date Submitted: 2 September 2010 Assignment Title: Identification of Video Delivery management items in LTE Mobile network Student Name(s) and Number(s): Tutorial Group: Qian LI (10948368) (10901573) Shang LI Declaration of Originality: The work contained in this assignment, other than that specifically attributed to another source, is that of the author(s). It is recognised that, should this declaration be found to be false, disciplinary action could be taken and the assignments of all students involved will be given zero marks. In the statement below, I have indicated the extent to which I have collaborated with other students, whom I have named. Signature: Qian Li, Shang Li Statement of Collaboration: Fault Management functions: For mobile data service demands in LTE network, the functions that enable the detection, isolation and correction should be support to manage fault. The measurements which are qualified for Fault Management depend on the requirement. RAS: Reliability, Availability and Survivability is designed to achieve the goal. Business management layer    Service management layer    Network management layer    Elements management layer    Goal of Reliability, Availability, and Survivability should be assessed and organised. The main point is to control the quality of LTE video services...

Words: 1662 - Pages: 7

Premium Essay

Nt1310 Unit 3 Network Analysis Essay

...Distance Vector: DVRP use a distance to a remote network to find the best path. It is called hop when each time a packet of data goes through a router. The best is considered to be with the least number of hopes. The vector is the determination of direction to the remote network. Examples for distance vector routing protocols are RIP and IGRP. RIP (Routing information protocol): RIP is a true distance vector routing protocol. Every 30 seconds, RIP sends the entire routing table out to all active interfaces. It only uses hop count to find the best way to a remote network, but it has a only maximum allowable hop count of 15, which means one more hop count of 16 is deemed unreachable. They...

Words: 969 - Pages: 4

Premium Essay

Information and Technology

...and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human Resources Team and Management team, for perspective departments. The company works primarily through a LAN/WAN set up, and work is performed primarily over the web. CPO must keep personal information safe, as they are trusted by each customer. CPO must also keep the information held within the facility and network safe, belonging to their employees. The Human Resource Team and Management Teams must look at each associate as...

Words: 1127 - Pages: 5

Premium Essay

Is2007

...WHAT IS INFORMATION SECURITY? 0.2 WHY INFORMATION SECURITY IS NEEDED? 0.3 HOW TO ESTABLISH SECURITY REQUIREMENTS 0.4 ASSESSING SECURITY RISKS 0.5 SELECTING CONTROLS 0.6 INFORMATION SECURITY STARTING POINT Information security is defined as the preservation of confidentiality, integrity and availability of information … Information security is defined as the preservation of confidentiality, integrity and availability of information … 0.7 CRITICAL SUCCESS FACTORS 0.8 DEVELOPING YOUR OWN GUIDELINES 1 SCOPE 2 TERMS AND DEFINITIONS 3 STRUCTURE OF THIS STANDARD 3.1 CLAUSES Security controls directly address risks to the organization, therefore risk analysis is a starting point for designing controls. Security controls directly address risks to the organization, therefore risk analysis is a starting point for designing controls. 3.2 MAIN SECURITY CATEGORIES 4 RISK ASSESSMENT AND TREATMENT 4.1 ASSESSING SECURITY RISKS Information security policies, standards, procedures and guidelines drive risk management, security and control requirements throughout the organization Information security policies, standards, procedures and guidelines drive risk management, security and control requirements throughout the organization 4.2 TREATING SECURITY RISKS 5 SECURITY POLICY 5.1 INFORMATION SECURITY POLICY 5.1.1 Information security policy document 5.1.2 Review of the information security policy 6 ORGANIZATION OF INFORMATION SECURITY Defines the hierarchical...

Words: 1623 - Pages: 7

Premium Essay

Risk Assessment in Information Technology

...discuss factors used to identify all kinds of risks in company network diagram. It will also assess the risk factors that are inclusive for the Company and give the assumptions related to the security data as well as regulatory issues surrounding risk assessment. In addressing the global implications, the paper will propose network security vulnerabilities and recommend the mitigation measures for the vulnerabilities. Cryptography recommendations based on data driven decision-making will be assessed, and develop risk assessment methodologies. Risk assessment in Information Technology Risk assessment is one of the mitigation methods for the Networks design. The scanners or vulnerability tools are used to identify the risks or vulnerabilities within the network design. The risks can be identified by these tools as they extend beyond software detects to incorporate other easily vulnerabilities including mis-configurations (Rouse, 2010). The shareware assessment tools are accessible online and can be used to supplement commercial scanners. Framework of risk assessment * Step 1 – categorizing information and information systems. Here unique department traits are highlighted and assigned impact levels (high, medium or low) in line with the security FISMA’s security objectives (confidentiality, integrity and availability). * Step 2 – security control families; common, hybrid, and system-specific security controls; tailoring and the identification of control enhancements...

Words: 3240 - Pages: 13

Free Essay

It Mgt

... forgetting your sunscreen may lead to a painful burn, but forgetting key components of a network virus security plan hurts a lot more. Overlooking even one item can weaken your entire network and mean significant losses in revenue and productivity. This paper will discuss the connection between corporate and home-use antivirus software along with the roles of top management/non-IT management, IT professionals, and end-users in maintaining network security. It will also discuss other issues which routinely arise that could affect the network security of our corporation. Antivirus software is a computer program that attempts to identify, neutralize or eliminate malicious software. The term "antivirus" is used because the earliest examples were designed exclusively to combat computer viruses; however most modern antivirus software is now designed to combat a wide range of threats, including worms, phishing attacks, rootkits, and Trojans, often described collectively as malware. Even though this software protects against certain threats, it does not protect against ALL threats. Fortunately, there are signature files and updates created daily that will allow the latest threats to be neutralized. Robert Vamosi states that it is important for corporate clients to protect their networks and therefore pay for the software and the annual signature-file subscriptions to ensure network operations (Vamosi, 2004) and I agree. Additionally, if antivirus were made available free...

Words: 1336 - Pages: 6

Free Essay

Job Ddescription

...operations and executes associated information systems support programs. Performs network management, control, and administration on DoD local, metropolitan, and wide area networks, and Command, Control, Communications, Computer and Intelligence systems, Defense Message Systems (DMS), command and control, and functional area systems. Administers Communications Security (COMSEC) and Information Assurance (IA) programs. Summary of essential job functions Could perform any or all of the following: Perform daily network management, control, and administration of information flow in Network Management (NM), Help Desk (HD), Information Protection Operations (IPO), and Network Administration (NA). Oversee network configuration, faults, performances, and security management through HD, IPO, and NA functions. Review and plan networks, control distribution of Internet Protocol (IP) address space, and enforce Internet use policy. Implement Air Force Computer Emergency Response Team and Automated Systems Security Incident Support Team security fixes, operating system patches, and antivirus software. Develop local restoral and contingency operations plans. Process and review C4 systems requirement documentation, telecommunications service requests, status of acquisition messages, and telecommunications service orders. Perform strategic and budget planning for networks. Categorize, isolate, and resolve network problems. Perform fault isolation by validating, isolating, and correcting faults...

Words: 941 - Pages: 4

Free Essay

Network Management

...Network Management Template Group Project Tech Corp 5/19/2013 * Table of Contents 1. Introduction 2 1.1 Individual Responsibility 2 2. Configuration Management 3 2.1 Inventory Management 3 2.1.1 Management Criteria 3 2.1.2 Design Overview 3 2.1.3 Usage & Rationale behind the Template 4 2.1.4 Value to Management 4 3. Performance Management 5 3.1 Performance Log 5 3.1.1 Management Criteria 5 3.1.2 Design Overview 5 3.1.3 Usage and Rationale Behind the Template 6 4. Fault Management 7 4.1 Device Fault log 7 4.1.1 Management Criteria 7 4.1.2 Design Overview 7 4.1.3 Usage & Rationale behind the Template 8 4.1.4 Value to Management 8 5. Security Management 9 5.1 Software Security 9 5.1.1 Management Criteria 9 5.1.2 Design Overview 9 5.1.3 Usage and Rationale Behind the Template 10 6. Conclusion 11 7. References 12 Introduction N etwork management is a broader subject of managing the whole network consistently. There are some supportive products like software and hardware to enable the users of network to manage the network properly. It covers a wide area of management such as fault, security, performance, configuration and more. These all aspect of network management has to be accomplished successfully to gain the obvious management of network. To gain these management aspects templates need to be take control as a management tool of network. Each criteria of network has to be...

Words: 3847 - Pages: 16

Premium Essay

Cmgt

...Individual Assignment: Security Monitoring Activities CMGT/442 Introduction Information Technology (IT) and E-commerce have been on a constant up-rise, over the past couple of decades. Many organizations have found ways to grow and remain profitable, by creating a good mixture of e-commerce and IT. E-commerce can cover a range of areas, but focus mainly on internet sales and product marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human...

Words: 1199 - Pages: 5