The Changing Role Of The Network Administrator

Read Complete Research Material



[The Changing Role of the Network Administrator]

by

Acknowledgement

I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.

DECLARATION

I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.

Signed __________________ Date _________________

Abstract

This paper examines "accidental" determinants (i.e., altering role of network administrators) and "deliberate" determinants (i.e. violations) in CIS. According to conceive conference macroergonomic work evolved by Smith and Carayon, the conceive work can be conceptualized as having five elements: one by one, task, gear and technologies, natural natural environment and organization. interaction of these constituents can be considered of location that assists change role of network administrator and violations. These mistakes can deduct deduction of security vulnerabilities and seldom breaks up, if vulnerability is exploited. Design work we have utilised conference as the direct differentiate undoubted class of constituents that can assist change role of network administrators and violations. Issue of human mistake and violation of computer security and data was discovered through the sequence of 16 meetings with network administrators and security specialists. Interviews were strip noted, transcribed and investigated by cipher of exact pieces in the structure of nodes. Result is an amplified structure that classifies kinds of human mistakes and recognises human and organizational components that assist to computer security and information. Network administrators are inclined to glimpse mistakes conceived by end users as more intentional and unintentional, while mistakes conceived by network administrators as more unintentional than intentional. Organizational components, for example connection, security heritage, government and organizational structure were most often cited components associated to computer security and information.

Table of Contents

ABSTRACT1

CHAPTER I: INTRODUCTION4

Introduction4

Aims6

Objectives6

CHAPTER II: LITERATURE REVIEW8

Conceptual framework8

Analysis of system administrator practices12

Collaboration and coordination12

Testing and planning17

Situation Awareness21

Multitasking, interruptions, deviations23

WAS administrative console27

WAS autonomic capabilities29

Strategies for resource acquisition and exchange34

Resource Types36

CHAPTER III: METHODOLOGY38

Shows38

Data Collection39

Data analysis39

CHAPTER IV: RESULTS43

Errors contributing to vulnerabilities and security breaches43

Work system elements that contribute to errors46

Individual elements48

Task and environmental elements49

Technology elements51

Organizational elements52

CHAPTER V: DISCUSSION55

CHAPTER VI: CONCLUSION64

References66

Notes70

Appendix A. Interview guide82

The Changing Role of Network Administrators

Chapter I: Introduction

Introduction

 National Research Council Computer Science and Telecommunications (2002) has differentiated between unintentional and premeditated determinants of poor equipment and facts and numbers security (CIS): "accidental determinants are natural (eg, an increase of the beam that decimates the source of feeding the network that determinants part of network to fail) or, for demonstration humans, but unintentional (accidental programming error that determinants the computer to shatter into in certain attenuating constituents, or unintentional chopping of the communications rotated cord all through excavation .) Accidental determinants number prominently in many facets of reliability to for demonstration of security, for demonstration security or reliability. intentional determinants are conclusion of attentive human choice. "(National Research Council Computer Science and Telecommunications, 2002, pp 3-4). In publications of CIS, on cause determinants cited to ...
Related Ads