Friday, September 26, 2025

Managing the Invisible: How Network Management and Security Work Together

Why I Chose These Topics The two technology topics I selected for this assignment are network management and network security, both of which are directly relevant to the Cyber and Data Security Technology program. The connection between network security and the program is straightforward, since security is a foundational concern in all aspects of data protection. By contrast, network management may not at first appear directly connected to cybersecurity; however, it represents a critical foundation for protecting information systems. Understanding how networks are configured, monitored, and maintained is essential for ensuring their security. Recognizing how these topics intersect with the goals of the program was the primary reason for choosing them, although many of the available topics could be linked meaningfully to the discipline. Research on Network Management My initial research on network management began with Huawei Technologies’ (2023) Network Management, Operation and Maintenance. I expected that a broad internet search using the phrase “network management” would only provide surface-level definitions rather than a structured understanding of management practices. Starting with a specialized source gave me a more detailed introduction to the principles of network management. The text outlined the functional areas of the OSI network management model: configuration, fault, performance, security, and billing management. This framework reinforced the idea that maintaining secure systems requires not only technical controls but also disciplined organization and continuous oversight. Research on Network Security For network security, I turned to the Network Security Knowledge Area within the Cyber Security Body of Knowledge (CyBOK, 2021). This open-access resource provided a comprehensive overview of the core principles of network security, including common threats, defense mechanisms, and risk management strategies. Unlike vendor-specific materials, CyBOK organizes the field in a way that highlights universal concepts rather than product features. This aligns with the program’s emphasis on building foundational knowledge that can be applied across contexts. From this research, it is clear that while network management provides the structure for maintaining systems, network security ensures those systems remain resilient against attacks and unauthorized access. Key Question Moving Forward One guiding question that emerged from this research is: How do network management practices directly influence the effectiveness of network security controls? This question highlights the interdependence of the two topics. Poorly managed systems, for example, may suffer from misconfigurations that create vulnerabilities, while effective management practices can strengthen security posture by ensuring that patches, updates, and monitoring systems are consistently applied. Exploring this relationship further will deepen understanding of how cybersecurity professionals integrate technical and organizational practices. Connection to the Program In addition to these sources, the course text reinforces fundamental networking concepts and shows that management and security are not isolated areas but complementary aspects of ensuring reliable and safe communication systems. The integration of network management and security reflects the broader purpose of the Cyber and Data Security Technology program: to prepare students to safeguard data by combining technical expertise with structured operational practices. References Huawei Technologies Co., Ltd. (2023). Network management, operation and maintenance. In Data communications and network technologies (pp. 501–519). Springer. https://doi.org/10.1007/978-981-19-3029-4_16 International Organization for Standardization, & International Electrotechnical Commission. (1989). ISO/IEC 7498-4:1989 — Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 4: Management framework. ISO/IEC. https://cdn.standards.iteh.ai/samples/14258/356879966ac041b7bddc5b090a8467d9/ISO-IEC-7498-4-1989.pdf The Cyber Security Body of Knowledge (CyBOK). (2021). Network Security Knowledge Area (Version 2.0.0). University of Bristol. https://www.cybok.org/media/downloads/Network_Security_v2.0.0.pdf

No comments:

Post a Comment

My Blog List

Featured Post

Locking the Gates: Defending Against Ransomware and Phishing

Introduction Information security is essential for both individuals and organizations because modern life depends on connected systems that...