Network management is the process of administering and managing computer networks. Services provided by this discipline include fault analysis, performance management, provisioning of networks and maintaining quality of service.
Network monitoring involves the sum of applications, tools and processes used to provision, operate, maintain, administer, and secure network infrastructure. The overarching role of network monitoring is ensuring network resources are securely available to users efficiently, effectively, and quickly.
Network management helps organizations gain greater visibility into their networks. This involves identifying devices connected to the network, monitoring traffic, usage patterns, identifying and diagnosing issues. This level of insight can help to optimize network performance and prevent disruptions. For example, the network performance management team might want to map network response times 24/7 to avoid impacting the end-user experience. If there is an anomaly, the network performance management team will work closely with the network fault.
Today’s systems are network connected internally and externally. The challenge this poses is ensuring access is appropriate and identifying threats to the infrastructure. One could argue if the network is unavailable or has been compromised everything grinds to a halt. While this is true, if any or all other pillars are unavailable, you have the same sum-total of nothing.
A network is a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to allow data sharing. An example of a network is the Internet, which connects millions of people all over the world. For this reason, all podcasts and pillars give equal weight towards the importance of proper security.
A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking allows homes, telecommunications networks, and business installations to avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless networks provide the biggest challenge for security personnel. Because wireless is more complex, we talk more about the challenges of securing wireless extensively in the book.