1.4.8

Network Administration

Test yourself

Network Policy

Network administrators must be careful to make sure that all users of the network know how to stay secure.

Illustrative background for What is a network policy?Illustrative background for What is a network policy? ?? "content

What is a network policy?

  • A network policy is a written document written by a company that sets out details about how their network is to be set up and maintained.
Illustrative background for Purpose of a network policyIllustrative background for Purpose of a network policy ?? "content

Purpose of a network policy

  • The purpose of a network policy is to make sure that all users of the network are aware of the 'rules' of the system.
  • It specifies what users need to do to make sure that their account is secure.
Illustrative background for Good network policiesIllustrative background for Good network policies ?? "content

Good network policies

  • A good network policy will include details such as:
    • How secure passwords must be.
    • What software is allowed or banned.
    • How often users should make backups.
    • Who should be contacted in the case of an attack.

Network Forensics

Some users of a network may intentionally or unintentionally break the network policy. The network administrator must look for times when this happens.

Illustrative background for Network forensicsIllustrative background for Network forensics ?? "content

Network forensics

  • Network administrators must capture, store, and analyse network data to discover the source of security attacks and vulnerabilities.
Illustrative background for How is network forensics done?Illustrative background for How is network forensics done? ?? "content

How is network forensics done?

  • Network forensics makes use of a lot of automated software which can alert administrators to suspicious activity on the network.
  • For example, an administrator might be alerted if:
    • A password has been entered incorrectly 5 times.
    • A user has tried to install software themselves.
Illustrative background for ImprovementsIllustrative background for Improvements ?? "content

Improvements

  • After a security attack or vulnerability has been detected, the administrator will analyse what allowed the attack to happen.
  • The administrator can then make the necessary changes to the network to prevent similar attacks in the future.

Jump to other topics

1Computer Systems

1.1Systems Architecture

1.2Memory & Storage

1.3Computer Networks, Connections & Protocols

1.4Network Security

1.5Systems Software

1.6Ethical, Legal, Cultural & Environmental Concern

2Computational Thinking, Algorithms and Programming

Go student ad image

Unlock your full potential with GoStudent tutoring

  • Affordable 1:1 tutoring from the comfort of your home

  • Tutors are matched to your specific learning needs

  • 30+ school subjects covered

Book a free trial lesson