In: Computer Science
Case Project 4-1: Using System-Monitoring Tools
You recently became the server administrator for a company. As soon as you walked in the door, users were telling you the network is running slowly quite often, but they couldn't tell you when it happened or how much it slowed down. What tests and measurements could you use to try to determine what's going on?
Case Project 4-2: Protecting the Network
You work for a company that hasn't been too concerned about network security and performance, but as more employees are hired, management is beginning to worry that employees are using the Internet for purposes that aren't work related. What types of network monitoring could you do to make sure Internet access is being used correctly in the company?
Case Project 4-3: Auditing Sensitive Data Access
You're the network administrator for a company that has contracts to store sensitive data for other companies, and clients want reassurance that you're protecting their data. The company has groups of employees who will be working with clients, and several contractors need access to the data, too. To make managing data easier, each client has been assigned his or her own disk volume. What types of auditing can you set up to reassure clients their data is protected and to check which files employees and contractors are accessing?
4.1 The following Test & Measurment can be determine when the network is running slow:
Network administrators hane many different ways to find out what happening on networks:
4.2 To successfully defend against the network to defend our network against attacks as system administrators need to consider lots of different things:
Method |
Discription |
SSH | Secure Remote access via terminal emulaor |
RADIUS | Open standard, UDP-based authentication protocol |
TACACS+ | Cisco prosperity, TCP-based authentication protocol |
IEEE 802.1X | Permits or denies a wired or wireless client access to a LAN |
Two-factor authentication | Requires two types of authentication; something you know, something you or something you are |
Single sing-on | Authenticate once and access multiple systems. |
4.3 The auditing can be set up in following types: