Network Security (English: Network Security) in computer networks is essential to monitor network access and prevent misuse of network resources that are not authorized. The task of network security is controlled by the network administrator.
The concept of Network Security
The security aspect is defined fifth this point:
Confidentiality (Confidentiality) Require that information (data) can only be accessed by those in authority.
Integrity (Integrity) Requires bahwaa information can only be changed by a party who has the authority.
Availability (Availability) Requires that the availability of information available to those who have authority when needed.
Authentication (Authentication) Requires that the sender information can be correctly identified and there is no guarantee that a false identity is not obtained.
Nonrepudiation Requires that both the sender and recipient information can not deny sending and receiving messages.
Attack (Attack) for security can be categorized into four main categories:
Disorders (Interruption) Assets of the system under attack so that it becomes unavailable or can not be used by the authorities. An example is the destruction / modification of the hardware or network channel.
Interception (Interception) People who are not authorized to gain access to assets. Referred to the concerned parties, programs, or other systems. An example is the tapping of data in the network.
Modification (Modification) A person who is not authorized to make changes to the asset. An example is the change in the value of the data file, modify the program so wrong, and modification of the message being transmitted in the network.
Fabrication (Fabrication) An unauthorized party inserts a fake object into the system. An example is to send false messages to others.
There are several principles that need to be avoided in dealing with security issues:
Silence and all will be fine
Hiding and they will not be able to find you
The technology used is complex / Unix, which means secure.
Computer Network Administrator
Computer Network Administrator is the kind of work that is needed at this time, especially in companies / institutions that have implemented computer technology and the Internet to support the work.
The use of computer network systems in small and large scale will require the setting from the level of physical and non-physical. This arrangement involves the control process. There are several definitions of network administration, among others:
Controlling the strategic (assets) (Strategic Controlling (assets))
Controlling complekxity (complekxity controllers)
Improving service (good service)
Balancing various needs (balancing the various needs)
Reducing downtime (reduced downtime)
Controlling costs (cost control)
www.dosenpendidikan.com/ Basically, a network administrator in charge of managing and maintaining all the resources on the network performance of the network system more effective and efficient views from the functions, structure and security of the network itself.
Before the duties and responsibilities of the following are some common things that must be controlled by a network administrator;
Knowledge of basic theory and practice of computer, are very important because they form a computer network administrator familiar with how the computer system itself can be well understood.
Knowledge of computer networking hardware such as; repeaters, hubs, switches, routers, antennas, cables and various other supporting devices, which includes understanding how things work, installation and configuration.
Understanding routing understanding of the theory and the routing configuration must excel at to be able to build a good network it is necessary, especially if the computer or a sub-organization of the company very much.
Knowledge of computer security systems, particularly the network (network security) would be very helpful and provide more value.
In addition to the ability of theory and practice which should excel in other things is to have professional ethics, professional ethics and there is no attitude is not good then all the ability to master the theory and practice do not mean much.
Functions and Duties Network Administrator
There are some functions and administrators, but in general can be expressed from a wedge between the network, hardware, and applications. The task of the network administrator:
Security Management (Security management) work focuses on issues of network security Network administrators are as follows:
A firewall is a system or device that allows network traffic that is considered safe to go through it and prevent network traffic that is considered safe for through and prevent traffic that are considered unsafe.
Username: The user name will be used as information for login Password Control: password control is owned by the user system.
Resource access: network admin can do the restrictions on the use of resources according to the permissions granted.
Similarly Discussion About 10 Basic Concepts of Computer Network Security Hopefully helpful
Minggu, 28 Februari 2016
Diberdayakan oleh Blogger.
Mengenai Saya
you tube channel
!-end>!-my>
Subscribe
Rekomendasi Kami
Popular Posts
-
Inventor of Windows for the first time are two people who are friends since childhood, namely Bill Gates and Paul Allen. Since the invento...
-
Before you get started you need to create a folder that will house your password protected folder, this is just an ordinary folder and can ...
-
Network Security (English: Network Security) in computer networks is essential to monitor network access and prevent misuse of network resou...
-
LINUX BASIC COMMANDS AND THEIR FUNCTIONS · Ls Viewing the contents of a file from the active directory. On lin...
-
Understanding Mikrotik is an operating system includes software that is installed on a computer so that the computer can act as the heart...
-
Monday 11 January 2016 The first day we did prakerin activity in the transportation department of communication and informa...
-
following way makes blog : 1. go to the blogger , diblogger should also possessed a gmail email first. If there is no make gmail bef...
-
*explanation of network infrastucture DISHUB KOMINFO INHU In DISHUB using WLAN network The devices used are: 1. Microtik Rb ...
-
Kali linux is a continuation of BackTrack Linux, an operating system that is used for penetration testing.Kali Linux based on Debian GNU / ...
-
WORK PRACTICE REPORT INDUSTRY IN DEPARTMENT OF TRANSPORTATION OF COMMUNICATION AND INFORMATICS ARRANGED BY : ...
0 komentar:
Posting Komentar