Network management and security are closely linked, with the level of security needed varying based on the sensitivity of the information on the network. Network managers must formalize policies and identify threats, such as hacking and viruses, to maintain the right level of access and configure the network for security. They are obligated to report electronic or internet crimes and may have to defend the company’s decision if an employee files a lawsuit.
The primary connection between network management and security is that the security an organization needs largely determines exactly how professionals manage the network. Each part of the security system must also be organized well to ensure effective control, with managers identifying threats to the network. When managers detect violations of policy or law affecting the system, it is their responsibility to turn people over to proper law enforcement or take appropriate business action.
The amount of security needed in a network varies from person to person and from company to company. For example, a home network may contain some personal information such as passwords, but it does not contain the same amount of sensitive information as a network of a major government agency. The more sensitive the information on the network or the greater the amount of data, the more closely the operators have to manage the network, implementing more stringent security measures.
Understanding that the need for network management and security varies, network managers need to formalize their network management and security policies. For example, they might write a specific policy explaining the specific software or user authentication process the business will use, or what a person must do to get permission to connect a portable device such as a flash drive. Within the policy, they must be specific about the penalties or consequences of violating the policy, such as suspension, loss of wages, termination of employment, or alerting the police.
Just as police officers need to identify threats such as violence, security and network management officers need to identify threats to the network in order to develop a management policy and maintain the right level of access to the network. Examples of threats to network management and security include hacking, viruses, and denial-of-service attacks. Once the network manager knows the risks, he can configure the network to be more secure against those particular problems. Identifying risks involves analyzing both the hardware and software used by a person or a business.
Network management and security personnel are not law enforcement officers. However, when they have evidence of an electronic or internet crime, they are obligated to report the problem. This is both a matter of society and of social stability. This obligation leads network operators to act as a liaison between their company or customer and law enforcement, if necessary, providing evidence of legal violations and testifying about the network in question. If an employee is fired or fined for violating company policy rather than the law, the network operator may have to defend the company’s decision if the fired or fined employee files a lawsuit.
Protect your devices with Threat Protection by NordVPN