logo

Literature Review on Network Management Security

   

Added on  2023-04-21

12 Pages3743 Words245 Views
Running head: NETWORK MANAGEMENT SECURITY
LITERATURE REVIEW ON NETWORK MANAGEMENT
SECURITY
Name of the Student
Name of the University
Author Note

1NETWORK MANAGEMENT SECURITY
Introduction
The main purpose of this paper is to prepare a literature review on network management
security. Network management is referred to the concept of organizing the computer networks. While
organization the system within network there are a variety of hardware and software products
available that helps in providing proper administrator management for a network. With the help of
security the user can protect the network system from unauthorized access. In this paper the main
focus is on network management security and the ways it can be implemented. In order to protect the
network from risks it becomes essential to develop network security. In order to create a network
security access control can be implemented within the network. This will provide proper security
towards the network. Apart from these other types of network management security control includes
application security, data loss prevention, implementing firewalls, implementing email security,
behavioral analytics and intrusion prevention system. With proper network management system the IT
managers will be able to manage their systems properly. It is important to understand the need for
network management security. The main aim of having proper network management is to manage the
software within the system and to provide proper security towards the network.
Literature review
Network management was developed with telephone analogy because of the reliability
offered by the telephone network. With time the technology has evolved a lot and the telephone
network is modified to a public switched telephone network. The main aim of having network
management is managing the software and hardware components properly. Organizing the managers,
agents, clients and servers for proper management of the network. In addition to this it becomes
important to implement proper security measures for managing the network. There are several
protocols available for managing the network this includes Simple Network Management protocol.
However managing network involves proper security measures to protect the network proper getting
hacked. In order to manage the security it is important to have proper integrity mechanisms that will
provide e clear view about the network. With a strong password and defining access control the access

2NETWORK MANAGEMENT SECURITY
ratio can be made limited. Implementing encryption within the network will help to maintain
confidentially and will limit the users. As after the network gets encrypted only the authorized person
will be able to access the network. This will improve privacy and will be beneficial for the network.
Encryption requires a private and public key that will be used at the type of encryption and
decryption. At the time of encryption public key is used, whereas in the time of decryption the user
needs to have a proper private key for decrypting the messages shared over the network. A digital
signature is used for maintaining the documents electronically. One document provided with a digital
signature needs to be encrypted in that way itself. The paper will also describe the recent changes
made within the network security management concept in order to provide a better future for people
involved in this stage.
Network management becomes a complex system with the increase in the size of the network.
Thus it becomes important to have proper control and monitoring over the network system. The
control includes autonomous systems and proper computer network. According to the author
Garofalakis et al. (2016), network management is included in the deployment process. It ensures
proper integration of the network and also helps device monitoring, configuration, evaluation, poll
and control over the network. The reason for implementing proper network management is to address
the requirements of the network that includes the availability of the proper network resources,
development based on real time, providing quality of service within a fixed cost. With the help of
proper performance the user has the capability of increasing the operational performance of the
network. However the networks are heterogeneous in nature and each device maintained within the
network can be used as a form of exchanging data and for communication purpose.
According to the author Chen et al. (2013), there are all total five areas which are described
by network management. This all areas are defined under the ISO network management model. The
five areas include performance management, configuration management, and security management,
accounting management and fault management. Performance management includes determining the
different components of the network that helps in determining the performance of a network. The
objective is to measure, analyze, report and control the utilization of the network. In order to manage

3NETWORK MANAGEMENT SECURITY
the performance of the network RFC2570 Internet-Standard Network Management Framework was
introduced. Whereas the function of the fault manager is to detect the fault within a network and
address these faults by providing a proper solution. Configuration management aim is to allow the
network managers to track the activity performed by each device. This includes tracking down the
activities taking place within the hardware and software. The other area of network management is
accounting management that includes usage charging, allocation of resources, privileges and usage
quotas. The security management area is the last part of network management model and hence
requires an access control over the resources used in the network as per the security policy.
There are several protocols available in order to protect the information flow within the network
management. The network management standard includes a CMIP protocol that is known as the
Common management information protocol. The protocol followed by the network management
includes OSI based management protocol whereas the management of object oriented is much more
complex to handle and needs a large memory space compared to others (Han and Lei 2012). CMIP
has become the telecommunication management network in order to provide for telecom service
providers. Apart from these the other network management standard used is Simple Network
Management protocol.
A set of interconnected devices or computers are said to form a network. While working with a
network it becomes very important to have proper security measures that will protect the network
from risks. Thus security ensures proper protection towards the data stored and shared over the
network. Basically the security provided towards the network are divided into two parts Physical
security and information security. Physical security ensures security towards some component from
physical actions which possess the capability of damaging the organization. The physical security has
the capability to destroy the file stored within the network and also can lead to terrorist attacks.
Physical security is further divided into providing proper security towards the hardware and software
components and providing security towards employees.
In order to maintain proper protection from information system it becomes important to maintain
the integrity, availability and confidentiality towards the data shared over the networks. This ensures

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cryptography and Security Protocols for Data Protection - Desklib
|6
|1420
|320

Network Security: Concepts and Techniques
|11
|718
|27

Introduction to Information Assurance and Information Security Assignment 2022
|11
|1301
|11

Enhancing Network Security for NextGard: Best Practices and Recommendations
|11
|2582
|64

Managing Security
|7
|1269
|413

Network Security: Report on OSI Security Architecture and Cryptographic Algorithms
|16
|2776
|371