StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Environment Management: Managing User Accounts - Research Paper Example

Cite this document
Summary
The main aim of this research is to streamline the concept of the network environment and accounts management. This paper evaluates the aspects of the user accounts management and privilege allocation so that we can have a better idea regarding the overall network and its security management…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Network Environment Management: Managing User Accounts
Read Text Preview

Extract of sample "Network Environment Management: Managing User Accounts"

 Network Environment Management Managing user accounts Table of Contents Overview of Networking 2 Main Challenges 4 Managing network 5 Information security 6 Managing Network Information flow 7 Network Accounts management 8 Steps for effective network and user accounts management 11 Conclusion 12 References 12 Introduction Computers are very dominant tools that facilitate users to store and process large amounts of data rapidly with the help of networking. This research is aimed to present a detailed analysis of the network environment management. This paper provides an overview of the management of the user accounts. In a network resource sharing and allocation are vital tasks. The resources and rights facilitate a particular user to access the main network facilities. If these rights and resources are accessible to wrong person then there is great danger to the network security. The main aim of this research is to streamline the main concept of the network environment and accounts management. This paper will evaluate the different aspects of the user accounts management and privilege allocation, so that we can have a better idea regarding the overall network and its security management. Overview of Networking Computers facilitate the storing and processing of large amounts of data speedily. Basically every organization, regardless of size, makes use of the computers to organize accounting, track inventory, and store documents. As organizations develop, they frequently require numerous people to input and process data at the same time (NASH, Jason, 2000). For this to be advantageous, those people must be intelligent to distribute the data each individual enters. Networking computers turn out to be advantageous in these circumstances. Networks are basically a collection of computers associated by cable or other media so they can distribute information (NASH, Jason, 2000). Networks made sharing data much straightforward and well-organized for workers. When the computers are networked, users are not only more useful because a number of people can enter data at the same time, but they can also weigh up and operating the shared data. As a result, one person can manage accounts that are payable to others, while another can manage accounts that are receivable, and someone else perform the operations on the profits-and-loss statements (NASH, Jason, 2000). When organizations merge particular software with a computer network, they can follow and make use of the information to facilitate formulate the organization run effortlessly. Users have to share resources other than files, in addition to, a common case in point being printers. Printers are used only a little fraction of time; consequently, organizations don’t would like to engross in a printer for each computer. With the help of networking computers can share lots of resources, such as; (NASH, Jason, 2000) Printers Fax devices Electronic messages Files and/or documents Modems Data Messages Managing network environment comprises the establishing the access to servers, workstations, and dedicated machines scattered throughout a (LAN) local-area network. From a user’s standpoint, the network systems proffer a central right of entry point to institutional network machines; from a network administration point of view, they increase the employment and use of obtainable network resources. In these circumstances we have to establish a resource allocation set-up that defines the allocation of the network resources to a particular user account. This method engrosses the useful user resource usage and security management. In another view this type of the access capability accessibility to some individual who wastes or makes erroneous use of the network resources is a critical issue that wants remedy. Effect user accounts management and handling is the only definitive and enhanced solution in this regard. Main Challenges The rising wide-area network working background causes two extraordinary challenges to the usefulness of network accounts management systems. The most important challenge is an outcome of the authenticity of that organizational data; business other local-area network environments are built through the association of institutions and departments, that normally have their own workstations, resources, machines, network management systems, in addition to network usage policies. To facilitate the well-organized management of resources in this type of network environment where it becomes indispensable to allow tasks to be routed all the way through the administrative limits to diverse kinds of network management structures. The next challenge is an outcome of the bigger heterogeneity and size of the network environment: network users of the working resources are able to no longer be sensibly conventional to keep track of obtainable group of network resources, the linked network management systems, in addition the matching compliance syntax and user-commands (NASH, Jason, 2000). Managing network Managing a network involves the systems that on the whole offer a network command as well as library interface to collaborate by the system. These network commands composed of (ADABALA, Sumalatha et al., 2000): 1) Network user commands for administration of diverse user request based jobs 2) Operator network commands for initiating and stopping a variety of daemons 3) Network Administrator commands for modifying features and arrangement of a variety of objects in the network system. In this type of the network management a network user who is familiarly well-known by one system would be able to learn how to utilize another devoid of too much hard work. Alternatively, the network commands have a wealthy set of alternatives, producing full utilization of them, and taking their outcomes appropriately necessitates knowledge of the software as well as site-specific arrangement particulars (ADABALA, Sumalatha et al., 2000). The network management comprises the administration of the on the whole network resources, user information flow management, and overall user accounts handling. The user accounts management permits increasing criteria regarding the effective information flow and resource allocation among different user accounts (ADABALA, Sumalatha et al., 2000). Information security Local area network (LAN) is extensively used technology for the small business within departmental communication. We can connect this Local area network (LAN) to internet for accessing the useful information regarding the organizational business. But this technology has few problems. There is lack of organizational information security. This is really critical concern for any organization. So we need to protect our organizational information with the help of an efficient technology (ADABALA, Sumalatha et al., 2000). Now I will discuss the integrated security main factor that is organizational network information security. In the modern age of the information and technology, there lots of threats have been created for the organizational information. We need a security model that has the capability to administer and make safe our information reserves. Technical network administrative safety /security measures like that security plans, procedures, and techniques are frequently put into practice for the organizational information security measures. Awareness building actions are concerned by the organizations to a significantly smaller extent; on the other hand, at the similar time these are evaluated as being additional effective organizational procedures than technical network administrative ones. Information security comprises organizational concerns, authorized aspects, institutionalization, and applications of best practices in addition to security technologies (ADABALA, Sumalatha et al., 2000). One of the main solutions that we have regarding the effective information security is the virtual private network or VPN, this is newly developed organizational network communication technology. This technology facilitates in the efficient network communication throughout the overall business network (ADABALA, Sumalatha et al., 2000). In our network management this technology incorporation will facilitate in the better management and administration of the use accounts. By this technology we will employ the VPN that will facilitate in the effective organizational working and information security. Here the administrator will define the rights for each client. No un-authenticated user will be able to use the organizational database (ADABALA, Sumalatha et al., 2000). Managing Network Information flow Technique for exchanging information among an organization network and business associate network or third parties network have to be consistent and safe to meet officially permitted and regulatory requirements (SIPONEN, M.T and Oinas-Kukkonen, H., 2007). When network information is swapped, it has to be restrained according to the stage of classification. Here in our network we can build up network security zones those facilitate in the enhanced information management and overall data travel (SIPONEN, M.T and Oinas-Kukkonen, H., 2007). By generating of network security zones, an organization network would be able to have an additional advantage regarding the easily and professionally management of the organization network accounts and information inside every account that travel through different zones as well as make sure every piece of information is correctly organized (SIPONEN, M.T and Oinas-Kukkonen, H., 2007). This setup then allows the network data and information to be combined with third parties and business network connected in the most suitably way. For instance, a network accounts zone can be recognized to exchange information with a high-risk third party so that the supplementary dangers to rest of the network will be reduced as a great deal as possible (SIPONEN, M.T and Oinas-Kukkonen, H., 2007). Network Accounts management In this section I will talk about few tools and techniques available for the effective user accounts and network environment management. The user accounts management involves the rights and resources access that is allocated to facilitate the user to have proper and effective information transfer, view, organization, and management. This also allows the user to make use of the different resources available on the network (SULLIVAN, Aaron, 2001).User accounts management is one of the best ways regarding the effective network security management and implementation. The accounts management allows only authenticated users to use the network and use the available data and resources. This overall network accounts management is a way to implement the network security, valid access and data communication (SULLIVAN, Aaron, 2001). Active Directory is a form of database that enlists the network security, rules, and user information. Active Directory makes use of the similar database for implementation of main MS Windows settings, Active Directory as well permits network administrators to distribute, deploy software, policies, as well as put into practice important updates to an association. AD supplies data and information as well as settings in a fundamental database (SULLIVAN, Aaron, 2001). AD provides the network management facility of a hierarchical arrangement and this arrangement is typically divided into 3 major groups, those are given below (SULLIVAN, Aaron, 2001): Network resources The resources can be printers, or some other hardware Services These services are for the end-users like that web based email servers Objects These objects are the most important functions of the network domain. Now I will talk about the use of the AD for the overall network management and administration. As a network administrator who is in charge for the massive business or organization, he would be able to simply update every end users system by means of fresh or latest files, software, patches, etc minimally by means of changing and updating one network object in a network tree or trees (ARKILLS, Brian, 2002). For the reason that every object fits into a position plan as well as has particular features, a system administrator would be able to simply clear a individual on a position network tree or directly provide right of entry to a number of clients for definite access to system applications otherwise decline right to use to definite clients for others (ARKILLS, Brian, 2002). Active Directory arrangement implementation has three main phases those are Plan, Delegate and Audit. In the first phase we plan out our organization’s departments. Then, make use of this illustration to turn out our managerial components, as well as offer them names that are significant for our organization. In this phase we plan out the implementation of the network security plan, user accounts, and resource distribution details and include the appropriate strategy for the implementation of the better network security implementation (ARKILLS, Brian, 2002). In the Delegate phase we direct an Active Directory area that is really big job, on the other hand, the same individual or the same user accounts should not be accountable for all. Also a lot of rights joined to one user account spell tragedy: For this purpose we carry out the steps of Data administrators, Service administrators, and Audits. No Active Directory execution would be incorporated lacking the reviewing of network objects as well as proceedings. It is a noteworthy partition of the procedure as well as not merely because evaluation of formative the flourishing safety of our network domain (ARKILLS, Brian, 2002).As well, reviewing is the major technique of verifying and steadiness between the two kinds of managers. Auditing is our main ways for formative when safety transforms have happened and who prepared them (ARKILLS, Brian, 2002). Logging and monitoring For the better network based accounts management we have to launch and make a decision for the suitable accounts logging and accounts monitoring strategy that is indispensable to record applicable safety and network accounts activities to allow better and successful network accounts security occurrence investigations, as well as presenting other vital facts for company processing (REBECCA, Herold, 2007). The technique of the accounts logging and monitoring is restricted through regulations, laws, contractual necessities, and helps troubleshooting. Network based audits formed from accounts monitoring and logging are apposite and more significant, not merely for controlling compliance as well as to facilitate the association of many network activities all through every network security layers (REBECCA, Herold, 2007). Steps for effective network and user accounts management Here I have listed few of steps or factors those are very essential and significant for the better network and user accounts management. These steps are (REBECCA, Herold, 2007): Ensure the network accounts management for the network safety /security services Periodically as well as regularly evaluate the network accounts for the better management of the network security We should put into practice the technology like that encryption, authentication, and network link controls Recognize network technical limitations for available associations among acknowledged networks services to hold up the protection of the network accounts, data, information and connection policies Allow actions to bound the right of entry as appropriate to detailed network services plus applications Put into practice node-level network and its accounts security by the suitable use of individuality authentication plus logical right of entry controls Conclusion In this paper I have presented a detailed analysis of the network user information management and accounts handling. I have outlined the areas those require the effective network user security and data accounts management. I have outlined the main considerations those are linked to the network management like that, corporate information and data security. I have also outlined the utilization of a tool regarding the effective network and network based accounts management. This tool was Active Directory. I have presented the main implementation advantages of the Active Directory and its potential phases those are executed for the better user accounts management and handling. References 1. ADABALA, Sumalatha, Nirav H. KAPADIA, and Jose A. B. FORTES. 2000. Performance and interoperability issues in incorporating cluster management systems within a wide-area network-computing environment. In: Conference on High Performance Networking and Computing, Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM). Dallas, Texas, United States : IEEE Computer Society Washington, DC, USA, pp.165-172. 2. ARKILLS, Brian. 2002. Overview of Active Directory. [online]. [Accessed 09 May 2009]. Available from World Wide Web: < HYPERLINK "http://windows.stanford.edu/Public/Security/ADSecurityOverview.htm" http://windows.stanford.edu/Public/Security/ADSecurityOverview.htm > 3. CHRISTINE, Hagn and Markwitz WEMHARD H. 2000. Mobile Teleworking: Some Solutions and Information Security Aspects. In: Siemens AG, Information and Communication Products, Information Security., pp.322-325. 4. LAUDON, Kenneth. C. and Jane. P. LAUDON. 1999. Management Information Systems, Sixth Edition. New Jersey: Prentice Hall. 5. NASH, Jjason. 2000. Networking Essentials, MCSE Study Guide. Foster City, California: IDG Books Worldwide, Inc. 6. NORTON, Peter. 2001. Introduction to Computers. Singapore: McGRAW-HILL. 7. PETERSON, Larry. 1999. Computer Networks: A Systems Approach. San Fransisco: Morgan Kaufmann Publishers Inc. 8. REBECCA, Herold. 2007. Security Inside the Perimeter. [online]. [Accessed 09 May 2009]. Available from World Wide Web: < HYPERLINK "realtimepublishers.com" realtimepublishers.com > 9. SHELLY, Gary B., Thomas J. CCASHMAN, and Misty E. VERMAAT. 2005. Discovering Computers 2005. Boston: Thomson Course Technology. 10. SILBERSCHATZ, GALVIN, and Greg GAGINE. 2002. Operating System Concepts. New York: John Wiley & Sons. 11. SIPONEN, M.T and H. OINAS-KUKKONEN. 2007. A review of information security issues and respective research contributions. The Database for Advances in Information Systems. 38(1), pp.60-81. 12. SULLIVAN, Aaron. 2001. An Audit of Active Directory Security, Part One: An Overview of Active Directory and Security. [online]. [Accessed 09 May 2009]. Available from World Wide Web: < HYPERLINK "www.securityfocus.com/infocus/1292" www.securityfocus.com/infocus/1292 > 13. TENENBOM, Andrew. 1996. Computer Networks. New York: Prentice Hall. 14. W5-data security Policy. 2009. [online]. Available from World Wide Web: < HYPERLINK "http://www.informit.com/content/images/9780789738226/downloads/0789738228_web05.pdf" http://www.informit.com/content/images/9780789738226/downloads/0789738228_web05.pdf > 15. WANG, F Fan. 2008. Mobile WiMAX Systems: Performance and Evolution. In: IEEE Communication. IEEE, pp.41-49. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Environment Management: Managing User Accounts Research Paper, n.d.)
Network Environment Management: Managing User Accounts Research Paper. Retrieved from https://studentshare.org/management/1723512-network-environment-management-managing-user-accounts
(Network Environment Management: Managing User Accounts Research Paper)
Network Environment Management: Managing User Accounts Research Paper. https://studentshare.org/management/1723512-network-environment-management-managing-user-accounts.
“Network Environment Management: Managing User Accounts Research Paper”. https://studentshare.org/management/1723512-network-environment-management-managing-user-accounts.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Environment Management: Managing User Accounts

Network Infrastructure Planning, Terminal Services

Terminal Services Name Institution TERMINAL SERVICES Remote desktop applications previously called terminal services is a component of windows that allows user to access data and applications on a remote computer over a network while using the remote desktop server (RDP).... With these services, only the user interface of some application is presented on the client machine.... Terminal services is a very well in place technology to provide services to remote offices since organizations are finding ways to reduce the cost of ownership by centrally deploying and managing windows based applications and remotely administering window server 2003- based computers....
6 Pages (1500 words) Research Paper

Where The Five Functional Areas Of Network Management (FCAPS) Are Not Adhered To

Due to fault in network, a user is immediately affected and the better services could not be provided to the users.... The nod failures manifest as connectivity failures to the user.... Presently the system of the company x is not good enough to cater the needs of the customers and the company x is also facing some problems because it has not implemented the OSI application functions namely, fault, configuration Accounting performance and security management....
12 Pages (3000 words) Essay

Microsoft Baseline Security Analyzer

All user accounts have So my plans are to find out what error is preventing my firewall form being able to be scanned.... I will also take protective measures in establishing password expirations for my user accounts.... When the weak passwords are not tested or checked, the option for testing (Checking) passwords for Windows accounts as well as SQL accounts are disabled (Fahland and Schultze, 2010).... Overall, I'm not surprised at the results of my security assessment due to the fact that I'm the only user of this computer, and I exercise safe practices while using it, and I only use it on an as needed basis....
7 Pages (1750 words) Essay

Managing a Banks Sources and Uses of Funds

The retail banking products ranging from savings accounts to remote and direct deposits.... The bank's interest rates on savings accounts and other deposit accounts are much higher than other banks.... The essay "managing a Bank's Sources and Uses of Funds" provides an overview of the principal types of deposits offered by TD Bank....
6 Pages (1500 words) Essay

Peer to Peer Networks

The routing mechanisms are difficult to control and may even give complete anonymity to the user of the network (Ripeanu and Foster , 2002).... Even home users will find the availability of high-speed internet connections and more than one computer at home as an advantage when it comes to becoming a part of the P2P environment.... n terms of relations to MIS, users of a network in an organization may certainly be attracted to the advantages of using P2P networks for their personal use, but it must be noted that they would be using company resources for accessing files or gaining points on projects such as SETI@Home....
7 Pages (1750 words) Essay

Active Directory - a Contemporary Network Management Techniques

The network administrator can have right of entry for the majority trees in the forest together with a definite end user's domain.... On the other hand, the end user, at the same time as capable to access his/her personal domain is not capable to access additional trees.... The project “Active Directory - a Contemporary Network management Techniques” discusses a development and implementation of the tool which allows handling assign rights and security parameters....
5 Pages (1250 words) Research Paper

Elliott Solutions Inc Active Directory Exercise

The Active Directory Migration Tool (ADMT) will be used to move the user, group, and computer accounts within the existing domains (both AD and NT) of Elliott and the absorbed competitors into the consolidated Elliott AD domain.... nbsp; This will be implemented in detail to allow for the growth in Elliott's consolidated network traffic requirements.... nbsp; The existing Elliott Solutions Domain Controller (DC) will be designated as the DC for the consolidated network....
10 Pages (2500 words) Case Study

Inclusion of Windows Deployment Services

hellip; More versions of user friendly, machine friendly, and secure software packages are being released by vendors very now and then.... The different versions come with improved features and capabilities that suit the user requirements for competitive advantage.... These include real-time monitoring of the deployment activities, the establishment of operating system deployment dynamic settings, auto-updates deployment of windows at the restart, application deployment of all windows versions, and the management of interfaces for building and managing applications within the release (Hernandez, 2013)....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us