SlideShare a Scribd company logo
The system administrator duties including the monitoring the
systems to ensure the secure, reliable, and authorized access.
Security methods can include:
Application hardware such as firewalls, proxy servers and DMZ
Protection methods such as intrusion detection and prevention
systems
Honeypots and decoy-based intrusion-detection technology
Auditing, network monitoring, and packet analysis software
such as Wireshark, SNMP
Account access control management
Complete a 2-3-page paper with an abstract and
conclusion(plus cover sheet and reference page) that:
1. Give an example of an application hardware, describes the
use for protection with the pros and cons. Outline the type of
risks you would be addressing with this protection.
2. Select an example of an intrusion detection and prevention
system. Give a description outlining the pros and cons. What
risks would this provide protection?
3. Detail the use of auditing and network monitoring and what
should be observed for securing the infrastructure.
4. Discuss account management and access control.
5. What role do security policies provide the organization?
6. What should be included in an incident response plan?

More Related Content

Similar to The system administrator duties including the monitoring the sys.docx

Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution
Schneider Electric India
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
amaranthbeg113
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
amaranthbeg53
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
amaranthbeg73
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability Scanners
PROBOTEK
 
Final deliverable should be a comprehensive report that addresses se
Final deliverable should be a comprehensive report that addresses seFinal deliverable should be a comprehensive report that addresses se
Final deliverable should be a comprehensive report that addresses se
alisondakintxt
 
Final deliverable should be a comprehensive report that addresse
Final deliverable should be a comprehensive report that addresseFinal deliverable should be a comprehensive report that addresse
Final deliverable should be a comprehensive report that addresse
alisondakintxt
 
SIEM POC Assessment.pdf
SIEM POC Assessment.pdfSIEM POC Assessment.pdf
SIEM POC Assessment.pdf
ReZa AdineH
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
Infosectrain3
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
Piyush Jain
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
oswald1horne84988
 
I MSc CS CNS Day 1.pptx
I MSc CS CNS Day 1.pptxI MSc CS CNS Day 1.pptx
I MSc CS CNS Day 1.pptx
Arumugam90
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
NeilStark1
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
NeilStark1
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
NeilStark1
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
David Sweigert
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
IDES Editor
 
internet securityand cyber law Unit3 1
internet securityand  cyber law Unit3 1internet securityand  cyber law Unit3 1
internet securityand cyber law Unit3 1
Royalzig Luxury Furniture
 

Similar to The system administrator duties including the monitoring the sys.docx (20)

Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
 
Analysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability ScannersAnalysis on Common Network Attacks & Vulnerability Scanners
Analysis on Common Network Attacks & Vulnerability Scanners
 
Final deliverable should be a comprehensive report that addresses se
Final deliverable should be a comprehensive report that addresses seFinal deliverable should be a comprehensive report that addresses se
Final deliverable should be a comprehensive report that addresses se
 
Final deliverable should be a comprehensive report that addresse
Final deliverable should be a comprehensive report that addresseFinal deliverable should be a comprehensive report that addresse
Final deliverable should be a comprehensive report that addresse
 
SIEM POC Assessment.pdf
SIEM POC Assessment.pdfSIEM POC Assessment.pdf
SIEM POC Assessment.pdf
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
 
I MSc CS CNS Day 1.pptx
I MSc CS CNS Day 1.pptxI MSc CS CNS Day 1.pptx
I MSc CS CNS Day 1.pptx
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
How to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdfHow to Secure Your Enterprise Network.pdf
How to Secure Your Enterprise Network.pdf
 
How to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docxHow to Secure Your Enterprise Network.docx
How to Secure Your Enterprise Network.docx
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
 
internet securityand cyber law Unit3 1
internet securityand  cyber law Unit3 1internet securityand  cyber law Unit3 1
internet securityand cyber law Unit3 1
 

More from sarah98765

The subject of technology, particularly social media, is controversi.docx
The subject of technology, particularly social media, is controversi.docxThe subject of technology, particularly social media, is controversi.docx
The subject of technology, particularly social media, is controversi.docx
sarah98765
 
The subject Cloud Security and ComplianceEach student needs.docx
The subject Cloud Security and ComplianceEach student needs.docxThe subject Cloud Security and ComplianceEach student needs.docx
The subject Cloud Security and ComplianceEach student needs.docx
sarah98765
 
The subject of divorce has been the topic of multiple research s.docx
The subject of divorce has been the topic of multiple research s.docxThe subject of divorce has been the topic of multiple research s.docx
The subject of divorce has been the topic of multiple research s.docx
sarah98765
 
The subject is companies lawEssay 800-1000 wordsDue da.docx
The subject is companies lawEssay 800-1000 wordsDue da.docxThe subject is companies lawEssay 800-1000 wordsDue da.docx
The subject is companies lawEssay 800-1000 wordsDue da.docx
sarah98765
 
The subject is Legalization of Marijuana in AmericaWhen you .docx
The subject is Legalization of Marijuana in AmericaWhen you .docxThe subject is Legalization of Marijuana in AmericaWhen you .docx
The subject is Legalization of Marijuana in AmericaWhen you .docx
sarah98765
 
the subject is a kitchen remodel1.4 Work Breakdown S.docx
the subject is a kitchen remodel1.4 Work Breakdown S.docxthe subject is a kitchen remodel1.4 Work Breakdown S.docx
the subject is a kitchen remodel1.4 Work Breakdown S.docx
sarah98765
 
THe subject is children living in norfolk va with cancer.Research .docx
THe subject is children living in norfolk va with cancer.Research .docxTHe subject is children living in norfolk va with cancer.Research .docx
THe subject is children living in norfolk va with cancer.Research .docx
sarah98765
 
The subdivision that I chose is Florida Re-Entry Subdivision (aka Re.docx
The subdivision that I chose is Florida Re-Entry Subdivision (aka Re.docxThe subdivision that I chose is Florida Re-Entry Subdivision (aka Re.docx
The subdivision that I chose is Florida Re-Entry Subdivision (aka Re.docx
sarah98765
 
The study of the philosophy of friendship provides us with an  o.docx
The study of the philosophy of friendship provides us with an  o.docxThe study of the philosophy of friendship provides us with an  o.docx
The study of the philosophy of friendship provides us with an  o.docx
sarah98765
 
The Tea Party movement that started in 2010 is considered by some po.docx
The Tea Party movement that started in 2010 is considered by some po.docxThe Tea Party movement that started in 2010 is considered by some po.docx
The Tea Party movement that started in 2010 is considered by some po.docx
sarah98765
 
The TCP, UDP, and IP were designed to provide best-effort service wi.docx
The TCP, UDP, and IP were designed to provide best-effort service wi.docxThe TCP, UDP, and IP were designed to provide best-effort service wi.docx
The TCP, UDP, and IP were designed to provide best-effort service wi.docx
sarah98765
 
The student will•Apply critical thinking through participat.docx
The student will•Apply critical thinking through participat.docxThe student will•Apply critical thinking through participat.docx
The student will•Apply critical thinking through participat.docx
sarah98765
 
The tasks You are assumed to be one of the software consultants .docx
The tasks You are assumed to be one of the software consultants .docxThe tasks You are assumed to be one of the software consultants .docx
The tasks You are assumed to be one of the software consultants .docx
sarah98765
 
The Task Your assignment is to create a seven page multiple so.docx
The Task Your assignment is to create a seven page multiple so.docxThe Task Your assignment is to create a seven page multiple so.docx
The Task Your assignment is to create a seven page multiple so.docx
sarah98765
 
The tasks related to securing the homeland and its critical infr.docx
The tasks related to securing the homeland and its critical infr.docxThe tasks related to securing the homeland and its critical infr.docx
The tasks related to securing the homeland and its critical infr.docx
sarah98765
 
The task is to write up about the Impact of Technology on proj.docx
The task is to write up about the Impact of Technology on proj.docxThe task is to write up about the Impact of Technology on proj.docx
The task is to write up about the Impact of Technology on proj.docx
sarah98765
 
The task is to design and develop a prototype for one of the fea.docx
The task is to design and develop a prototype for one of the fea.docxThe task is to design and develop a prototype for one of the fea.docx
The task is to design and develop a prototype for one of the fea.docx
sarah98765
 
The task is individualThe deliverable has to be a report 2,500-.docx
The task is individualThe deliverable has to be a report 2,500-.docxThe task is individualThe deliverable has to be a report 2,500-.docx
The task is individualThe deliverable has to be a report 2,500-.docx
sarah98765
 
The task is attached here. Thanks a lotRubricsHighly develo.docx
The task is attached here. Thanks a lotRubricsHighly develo.docxThe task is attached here. Thanks a lotRubricsHighly develo.docx
The task is attached here. Thanks a lotRubricsHighly develo.docx
sarah98765
 
The task for this paper is toYou are to select a technology w.docx
The task for this paper is toYou are to select a technology w.docxThe task for this paper is toYou are to select a technology w.docx
The task for this paper is toYou are to select a technology w.docx
sarah98765
 

More from sarah98765 (20)

The subject of technology, particularly social media, is controversi.docx
The subject of technology, particularly social media, is controversi.docxThe subject of technology, particularly social media, is controversi.docx
The subject of technology, particularly social media, is controversi.docx
 
The subject Cloud Security and ComplianceEach student needs.docx
The subject Cloud Security and ComplianceEach student needs.docxThe subject Cloud Security and ComplianceEach student needs.docx
The subject Cloud Security and ComplianceEach student needs.docx
 
The subject of divorce has been the topic of multiple research s.docx
The subject of divorce has been the topic of multiple research s.docxThe subject of divorce has been the topic of multiple research s.docx
The subject of divorce has been the topic of multiple research s.docx
 
The subject is companies lawEssay 800-1000 wordsDue da.docx
The subject is companies lawEssay 800-1000 wordsDue da.docxThe subject is companies lawEssay 800-1000 wordsDue da.docx
The subject is companies lawEssay 800-1000 wordsDue da.docx
 
The subject is Legalization of Marijuana in AmericaWhen you .docx
The subject is Legalization of Marijuana in AmericaWhen you .docxThe subject is Legalization of Marijuana in AmericaWhen you .docx
The subject is Legalization of Marijuana in AmericaWhen you .docx
 
the subject is a kitchen remodel1.4 Work Breakdown S.docx
the subject is a kitchen remodel1.4 Work Breakdown S.docxthe subject is a kitchen remodel1.4 Work Breakdown S.docx
the subject is a kitchen remodel1.4 Work Breakdown S.docx
 
THe subject is children living in norfolk va with cancer.Research .docx
THe subject is children living in norfolk va with cancer.Research .docxTHe subject is children living in norfolk va with cancer.Research .docx
THe subject is children living in norfolk va with cancer.Research .docx
 
The subdivision that I chose is Florida Re-Entry Subdivision (aka Re.docx
The subdivision that I chose is Florida Re-Entry Subdivision (aka Re.docxThe subdivision that I chose is Florida Re-Entry Subdivision (aka Re.docx
The subdivision that I chose is Florida Re-Entry Subdivision (aka Re.docx
 
The study of the philosophy of friendship provides us with an  o.docx
The study of the philosophy of friendship provides us with an  o.docxThe study of the philosophy of friendship provides us with an  o.docx
The study of the philosophy of friendship provides us with an  o.docx
 
The Tea Party movement that started in 2010 is considered by some po.docx
The Tea Party movement that started in 2010 is considered by some po.docxThe Tea Party movement that started in 2010 is considered by some po.docx
The Tea Party movement that started in 2010 is considered by some po.docx
 
The TCP, UDP, and IP were designed to provide best-effort service wi.docx
The TCP, UDP, and IP were designed to provide best-effort service wi.docxThe TCP, UDP, and IP were designed to provide best-effort service wi.docx
The TCP, UDP, and IP were designed to provide best-effort service wi.docx
 
The student will•Apply critical thinking through participat.docx
The student will•Apply critical thinking through participat.docxThe student will•Apply critical thinking through participat.docx
The student will•Apply critical thinking through participat.docx
 
The tasks You are assumed to be one of the software consultants .docx
The tasks You are assumed to be one of the software consultants .docxThe tasks You are assumed to be one of the software consultants .docx
The tasks You are assumed to be one of the software consultants .docx
 
The Task Your assignment is to create a seven page multiple so.docx
The Task Your assignment is to create a seven page multiple so.docxThe Task Your assignment is to create a seven page multiple so.docx
The Task Your assignment is to create a seven page multiple so.docx
 
The tasks related to securing the homeland and its critical infr.docx
The tasks related to securing the homeland and its critical infr.docxThe tasks related to securing the homeland and its critical infr.docx
The tasks related to securing the homeland and its critical infr.docx
 
The task is to write up about the Impact of Technology on proj.docx
The task is to write up about the Impact of Technology on proj.docxThe task is to write up about the Impact of Technology on proj.docx
The task is to write up about the Impact of Technology on proj.docx
 
The task is to design and develop a prototype for one of the fea.docx
The task is to design and develop a prototype for one of the fea.docxThe task is to design and develop a prototype for one of the fea.docx
The task is to design and develop a prototype for one of the fea.docx
 
The task is individualThe deliverable has to be a report 2,500-.docx
The task is individualThe deliverable has to be a report 2,500-.docxThe task is individualThe deliverable has to be a report 2,500-.docx
The task is individualThe deliverable has to be a report 2,500-.docx
 
The task is attached here. Thanks a lotRubricsHighly develo.docx
The task is attached here. Thanks a lotRubricsHighly develo.docxThe task is attached here. Thanks a lotRubricsHighly develo.docx
The task is attached here. Thanks a lotRubricsHighly develo.docx
 
The task for this paper is toYou are to select a technology w.docx
The task for this paper is toYou are to select a technology w.docxThe task for this paper is toYou are to select a technology w.docx
The task for this paper is toYou are to select a technology w.docx
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

The system administrator duties including the monitoring the sys.docx

  • 1. The system administrator duties including the monitoring the systems to ensure the secure, reliable, and authorized access. Security methods can include: Application hardware such as firewalls, proxy servers and DMZ Protection methods such as intrusion detection and prevention systems Honeypots and decoy-based intrusion-detection technology Auditing, network monitoring, and packet analysis software such as Wireshark, SNMP Account access control management Complete a 2-3-page paper with an abstract and conclusion(plus cover sheet and reference page) that: 1. Give an example of an application hardware, describes the use for protection with the pros and cons. Outline the type of risks you would be addressing with this protection. 2. Select an example of an intrusion detection and prevention system. Give a description outlining the pros and cons. What risks would this provide protection? 3. Detail the use of auditing and network monitoring and what should be observed for securing the infrastructure.
  • 2. 4. Discuss account management and access control. 5. What role do security policies provide the organization? 6. What should be included in an incident response plan?