Friday, September 26, 2025
Managing the Invisible: How Network Management and Security Work Together
Why I Chose These Topics
The two technology topics I selected for this assignment are network management and network security, both of which are directly relevant to the Cyber and Data Security Technology program. The connection between network security and the program is straightforward, since security is a foundational concern in all aspects of data protection. By contrast, network management may not at first appear directly connected to cybersecurity; however, it represents a critical foundation for protecting information systems. Understanding how networks are configured, monitored, and maintained is essential for ensuring their security. Recognizing how these topics intersect with the goals of the program was the primary reason for choosing them, although many of the available topics could be linked meaningfully to the discipline.
Research on Network Management
My initial research on network management began with Huawei Technologies’ (2023) Network Management, Operation and Maintenance. I expected that a broad internet search using the phrase “network management” would only provide surface-level definitions rather than a structured understanding of management practices. Starting with a specialized source gave me a more detailed introduction to the principles of network management. The text outlined the functional areas of the OSI network management model: configuration, fault, performance, security, and billing management. This framework reinforced the idea that maintaining secure systems requires not only technical controls but also disciplined organization and continuous oversight.
Research on Network Security
For network security, I turned to the Network Security Knowledge Area within the Cyber Security Body of Knowledge (CyBOK, 2021). This open-access resource provided a comprehensive overview of the core principles of network security, including common threats, defense mechanisms, and risk management strategies. Unlike vendor-specific materials, CyBOK organizes the field in a way that highlights universal concepts rather than product features. This aligns with the program’s emphasis on building foundational knowledge that can be applied across contexts. From this research, it is clear that while network management provides the structure for maintaining systems, network security ensures those systems remain resilient against attacks and unauthorized access.
Key Question Moving Forward
One guiding question that emerged from this research is:
How do network management practices directly influence the effectiveness of network security controls?
This question highlights the interdependence of the two topics. Poorly managed systems, for example, may suffer from misconfigurations that create vulnerabilities, while effective management practices can strengthen security posture by ensuring that patches, updates, and monitoring systems are consistently applied. Exploring this relationship further will deepen understanding of how cybersecurity professionals integrate technical and organizational practices.
Connection to the Program
In addition to these sources, the course text reinforces fundamental networking concepts and shows that management and security are not isolated areas but complementary aspects of ensuring reliable and safe communication systems. The integration of network management and security reflects the broader purpose of the Cyber and Data Security Technology program: to prepare students to safeguard data by combining technical expertise with structured operational practices.
References
Huawei Technologies Co., Ltd. (2023). Network management, operation and maintenance. In Data communications and network technologies (pp. 501–519). Springer. https://doi.org/10.1007/978-981-19-3029-4_16
International Organization for Standardization, & International Electrotechnical Commission. (1989). ISO/IEC 7498-4:1989 — Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 4: Management framework. ISO/IEC. https://cdn.standards.iteh.ai/samples/14258/356879966ac041b7bddc5b090a8467d9/ISO-IEC-7498-4-1989.pdf
The Cyber Security Body of Knowledge (CyBOK). (2021). Network Security Knowledge Area (Version 2.0.0). University of Bristol. https://www.cybok.org/media/downloads/Network_Security_v2.0.0.pdf
Subscribe to:
Post Comments (Atom)
My Blog List
Featured Post
Locking the Gates: Defending Against Ransomware and Phishing
Introduction Information security is essential for both individuals and organizations because modern life depends on connected systems that...
No comments:
Post a Comment