Question

In: Computer Science

Connectivity between different company sites is provided by an outside MSP. Should a Network Administrator nevertheless...

Connectivity between different company sites is provided by an outside MSP. Should a Network Administrator nevertheless be concerned with monitoring traffic statistics across these outside connections? Discuss four reasons and four ways for doing this

Solutions

Expert Solution

Network traffic moniotring is important for all even if he is outside provider or inside provider. by monitoring we keep our data safe and private. it can affect network performance, availability and security. Network traffic monitor uses varous tools and techniques to study your computer network bases traffic.

there are sevral justifiable reasons to monitor overall traffic on the ntework. The information produced by the network traffic monitoring tools could be used in numerous IT operational and security use cases.

The four reasons why need of traffic monitoring and the ways how to do!

1. Internal network visibility : it can be done by network flow monitoring software which supports protocols such as Netflow, IPFix, JFlow, sFlow etc. can provide complete visibilty of internal network traffic. with Motadata It department can generate insightful reports about following types and kinds of traffic

a. Traffic for top application

b. Traffic for top conservation

c. Traffic destinations with hostIP

d. top traffic sources with Ip address

e. application traffic and etc

2. Identification of slow applications: performance plays an important role in user experience. one of the most raised help desk ticket is about application web application , skype etc. being slow or getting crashed there can be many reasons out of which onlyone or two will be revalent at any particular time. identifying the reason is not onlyytimeconsuming but costly as well. The next genration Netflow software cam filter and report the accurate cause. by combining the internal data reports withe xternal resources the system administrator can learn a lot about the system and the faulty network.

3. Detection of spyware and other hacks: when these worms attack your network they form a very unusual data flow in and out with the help of Netflow, these unusual patterns are easy to detect. in case you are not using some data analyzer, these pattern often go unchecked due to the fact that these are designed to fool the human administrator.

4.Detection of outflow of personal information of clients: This pointis for that company who deal with online paym,ent gateways or payement card industry a good payment gateway never lets the personal information of the client to get leaked out from its system. in a particular hack, such infromation may start flowing out which is instantly reported by the Netflow software.


Related Solutions

Discuss different security websites or network and security informational sites that you may already monitor and...
Discuss different security websites or network and security informational sites that you may already monitor and why. Limit the discussion to no more than three sites.
You are a network administrator in a medium-sized company. The owner has heard of using RIP...
You are a network administrator in a medium-sized company. The owner has heard of using RIP and OSPF on the routers and that it will help your network. He isn't very computer savvy, so he wants you to explain it to him and tell him what to use and how you are going to implement it. Write a memo using standard memo format that outlines this for your company's owner using either a Microsoft Word Memo template or another example,...
Scenario: You are a network administrator in a medium-sized company. The owner has heard of using...
Scenario: You are a network administrator in a medium-sized company. The owner has heard of using RIP and OSPF on the routers and that it will help your network. He isn't very computer savvy, so he wants you to explain it to him and tell him what to use and how you are going to implement it. Write a memo using standard memo format that outlines this for your company's owner using either a Microsoft Word Memo template or another...
Discuss different service-based server operating systems, server computers, and server software that a network administrator must...
Discuss different service-based server operating systems, server computers, and server software that a network administrator must choose between. Applied Concepts (AC) - Week/Course Learning Outcomes Using your textbook, LIRN-based research, and the Internet, apply the learning outcomes for the week/course and lecture concepts to one of the following scenarios: As applied to your current professional career As applied to enhancing, improving, or advancing your current professional career As applied to a management, leadership, or any decision-making position As applied to...
Background A delivery company has a service network of 100 customer sites. On any single day,...
Background A delivery company has a service network of 100 customer sites. On any single day, not every site has some demand, i.e., the company only needs to serve a subset of the 100sites. As a result, the vehicle routing would be different from day to day. The company takes a zoning approach in which the 100 sites are partitioned into 4 fixed zones. Each zone is served by one delivery person who can decide the daily vehicle routing within...
You, as a commercial administrator, make a comparative analysis between the different factors that negotiate in...
You, as a commercial administrator, make a comparative analysis between the different factors that negotiate in the United States in comparison with the international negotiation in the sale of a certain product. (You can choose any product to make this analysis.)
As the network administrator for Can-D, you recommended switches as an important component in your solution to protect data assets over the network between Can-D and their partner company, Video-Cam Corporation.
As the network administrator for Can-D, you recommended switches as an important component in your solution to protect data assets over the network between Can-D and their partner company, Video-Cam Corporation. Prepare a Word document, approximately 3-4 pages in length, that describes why or why not spanning tree protocol (STP) would be used. Be sure to describe STP from the perspective of purpose, function, benefits, and configuration.Be sure to reference all sources using APA style.For more information on APA, please...
At what point should a candidate from outside a company be hired to manage the company...
At what point should a candidate from outside a company be hired to manage the company or one of its business units?
Anti-trust policy may be different between a market for network goods and non-network, or traditional, anti-trust...
Anti-trust policy may be different between a market for network goods and non-network, or traditional, anti-trust policy. What tension causes this? A.Network goods are often produced by a monopoly or an oligopoly, but the low level of competition in the market in the market is balanced by the high level of competition for the market. B.Network goods are often produced by a monopoly, but that is less important than the fact that the monopoly gained that position by producing the...
A moving company has a truck filled for deliveries to eight different sites. If the order...
A moving company has a truck filled for deliveries to eight different sites. If the order of the deliveries is randomly? selected, what is the probability that it is the shortest?route? Assuming boys and girls are equally? likely, find the probability of a couple having a baby girl when their sixth child is? born, given that the first five children were all girls.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT