System administration the role of the network or

Info icon This preview shows pages 6–8. Sign up to view the full content.

View Full Document Right Arrow Icon
may ultimately be held liable.” System Administration The role of the network or system administrator is very important for internal network security. That position is usually responsible for the corporate servers and user accounts. The system admin must ensure that there is proper system administration with correct privileges and permissions. He/she must check that users do not have excessive rights and only those security privileges that the employee needs to perform their job. The system admin is the person who might make use of the various tools to ensure security of the network. This job of administration should be treated as extremely important and not just a second duty of some other person. Vulnerability Scanning In a PC Magazine article, Roberts-Witt (1999, August) offers a good explanation of the capabilities of vulnerability scanning. “You can't fix what you don't know is there. Vulnerability scanners do exactly what their name implies: They poke around your network for holes that could lead to security breaches. On the server side, they look for such potential problems as expired user accounts and shaky passwords; on your firewalls, they check for misconfigurations or network services that leave you wide open for attack.” Shipley (1999, October) explains in Network Computing magazine that vulnerability scanning applications “take a proactive approach to network security, aiming to provide efficient, thorough, automated identification of security holes at both the host and network levels.” One of the vulnerability scanning products in use in the IT industry is the Kane Security Analyst. The product description explains the software capabilities. “Kane Security Analyst is a network security assessment tool that provides a fast, thorough analysis of network security for Windows NT and Novell NetWare. The KSA compares your
Image of page 6

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
network security configuration with industry best practices or your own organizational security policy. In minutes, you can discover your network’s areas of vulnerability and take corrective action.” There are other products that also scan infrastructure hardware such as routers and firewalls and Internet servers as well as other operating systems. Some of the products include: Webtrends Security Analyzer, Network Associates CyberCop, and Internet Security Systems Internet Scanner. Intruder Detection Intruder, or intrusion, detection is one of the most important parts of a proactive measure against internal security threats. Radcliff (1998, April) noted that "The only way to protect against this is through ….. monitoring traffic." The SANS Institute offers some direct advice. “Intrusion detection capabilities can help a company secure its information. The tool could be used to detect an intruder, identify and stop the intruder, support investigations to find out how the intruder got in, and stop the exploit from use by future intruders. The correction should be applied across the enterprise to all similar platforms. Intrusion detection products can become a very powerful tool in the information security practitioner’s tool kit.”
Image of page 7
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern