Configuring Firewall Settings
Using your lab results, write a 2- to 3-page analysis that provides an assessment of network management methods found in the labs and the reading. You should identify a minimum of three methods as well as specifying whether the network management method relates to a physical on-premises network component or a cloud/virtual network component. An example would be discovering old Unshielded Twisted Pair (UTP) cabling running above a suspended ceiling on the premises. A reasonable mitigation strategy would be to design and adopt a structured cabling plan that replaces the old cabling with Shielded Twisted Pair (STP) or fiber and runs the cabling through a shielded pipe.
Network Management has several important functions including administration and inventory management of a network, the operations and monitoring of a network, maintenance, repair, and updates, the provisioning of resources, and the security, tracking, and threat resolution of a network. Some of these functions are fairly simple such inventory or maintenance, but others, such as security and threat resolution can be complex. All of the functions are necessary to keep the network secure and functioning properly, but some are more closely related to cybersecurity than others.
Assignment Instructions
Create an analysis assessing a minimum of three network management methods discovered in your lab results and the reading. Feel free to include more methods in your analysis, but three should be the minimum. Be sure to note whether the network management method is specific to a physical on-premises network component or a cloud/virtual network component. Following your network management analysis, provide 2–3 pages of discussion that includes a description of the network management methods, how each of the methods relates to risk for the organization, and how each method mitigates that risk.