Week 7 Discussion 1
“Developing Network Management Strategies.” Please respond to the following:
Select and describe one (1) of the five (5) network management processes. Search the Web for tools that support your selected process. How is this product or tool used? Please be sure to cite your sources.
Week 7 Discussion 2
“Network Security.” Please respond to the following:
When designing network management for your customer, what security concerns will you be addressing? Support your response.
Answer preview
When designing a network, it is wise to be aware of the strength of the protection strategies adopted to protect user information. It is because some violations are inevitable as long as a customer engages in information technology systems. Hence the most significant concern should be ensuring minimum damage as possible in the event of an attack. Breaches should be limited and controlled not to affects the most vital elements or resources of the network when they occur (Korte and Vygen, 2018). Lastly, although the cybersecurity options can be adequate to prevent any invasion or attack of systems, the qualifications of the personnel managing should
[661 Words]