What you don't know about the dangerous practices of network management

Source: Internet
Author: User

What you don't know about the dangerous practices of network management

The network administrator is the administrator who points to the open business Internet service provider of the social public. Jeff Dray A list of categories for the IT industry through a recent in-depth study of the IT industry. Here, he defines seven of the most insecure network administrators. If you are a network administrator and are aware of the deficiencies in your work, what kind of list do you belong to?

Most network administrators are comfortable with their work and can work smoothly in a highly challenging and technically difficult task. Sometimes, however, some of them become entangled and hinder the success of things. So, I've defined a list of the newest categories, where we'll see seven of the least secure network administrators, and summarize the experience I've been looking at in this industry for years, describing the characteristics of these unsafe factors.

Category I: Administrators who are overly cautious about security (Netopsiasecuritatis)

The whole point of "Mr. Security" is to prevent anything that is detrimental to his network from happening. The line is operated by the contractor, the cabinets, wiring racks, routers, UPS are installed by the manufacturer, and all he has to do is put a dusty mouse ball in his drawer, just to meet the need to "replace with it".

His way to avoid conflict is to lock the system tightly so that no one or anything can change the system. Sometimes this means that the only thing a user can do is log in and change his or her password, and the password may fail each time it is used. Running programs and editing files is too risky for users, so they can only face one login interface and a common desktop system.

This type of administrator has never had a virus attack in 7 years and will not be encountered in the future. Not only did he disable the USB slots in the BIOS of each workstation, but the BIOS was also password-protected, and the jacks were sealed to prevent tiny data from being leaked through USB storage devices. The mail server does not allow any other attachments to be installed; If the network line changes, the workstation will not start, the system's hardware device has been fixed, and the device's flexibility has been lost. If someone tries to open the shell of the machine, a small explosive device will make the machine unusable (and may also damage the operator).

Category II: The incompetent administrator (Netopsiasubmersio)

The technical capabilities of such administrators develop as the company grows. 10 years ago, when the company needed to buy only one PC to handle some of the textual work, the people responsible for this work, through their own efforts, halfway decent became an informal PC administrator. Today, the company has grown from 5 employees to 80 employees, and the company's internal network has been expanded accordingly. Now, only 15 or 20 workstations are managed by a low-end server that also acts as an e-mail gateway, file server, and network proxy server. There is no documentation, everything is in the head of an administrator, and if all goes well, that's enough to keep the company network running.

The company does not have the ability to hire a full-time it executive, but he has been overwhelmed by the fact that he has a full-time job with a design team. He can only hope that when the system expands in the future, there will be a full-time IT manager who will give her the power to relinquish the system completely.

Overall, the system works well if you don't care about frequent power off, crashes, and inevitable virus attacks. Everyone has the same password and has the same permissions on every folder in the network, but that doesn't seem to cause any problems because everyone in the company is very good and absolutely trustworthy.

Category III: Administrators who frequently update their networks (Netopsiaabsistus)

Whether you like it or not, this type of network administrator will manage the upgrade of applications and systems through remote control. Automatically shuts down your workstation at the end of the day, and you can't stop him from doing so because he sets every workstation on the network to "wake Up" mode. If you really want to stop him, you must disconnect the network cable from your work station. Your computer is still fully functional at 5 o'clock in the afternoon hours, but when you get to work the next morning, you'll find that your system is completely different, and you can't find any programs you used yesterday.

Class Fourth: The inflexible administrator (Netopsiaofficiatis)

This kind of work is a rigid administrator who can often be met in the British administrative department. If you ask him to do something exceptional, he will answer you: "That's beyond my job responsibilities."

Try to bring a USB storage device to the office while she's on duty and see what happens! If she puts the storage device in her lunch bag when she's not paying attention, she'll even have to deal with her negligence. The day she finds out that an email from a machine is not entirely relevant to the job, she thinks it's a job accident that shouldn't have happened.

I use a laptop from the company when I work in a workplace outside the company. Since the company's headquarters are 150 miles away, I can't always be in the company's network. Our network administrator, a typical, inflexible administrator, only allows me to install a few typical company-wide applications on my computer, but none of these software works for me at all. Installing a navigation software that allows me to find areas outside of my site is even a huge benefit I can enjoy.

Class Fifth: Administrators who do not consider consequences (Netopsiaexperiortus)

This type of administrator who does not consider the consequences is constantly experimenting with new patches or upgrades. Most sensible network administrators do tests on a small trial network before they apply new solutions to existing systems. However, such administrators are directly operating in the existing system, often causing unnecessary boredom to users, which is somewhat similar to the user's response to the administrator of the frequent updating of the network. The difference is that an administrator who frequently updates the network will try to ensure that his product or upgrade behavior is truly effective and does not have any other impact on the network and the user.

Category sixth: Administrator of the network as private property (Netopsiadictatoris)

As the name shows, the network is considered a private property by the class administrator. Anything that could affect the smooth running of the network would excite him. You might think this is a good thing, but "private property" is a bit too much. He will keep a detailed log to show that the network's performance is up to 100%. But this is achieved in the case of almost no network resources being allocated to a common application.

Class Seventh: The administrator who plays games with the work (Netopsiaaliatorium)

This is one of the most scarce types of dangerous network administrators and probably the friendliest category. They used to appear extensively in academia. There are usually enough redundant spaces on the network for some students to use them for paper or research work. But now the main function of these redundant spaces is to provide a gaming platform for the managers of the IT equipment in the school.

Most network resources are available only to those who log on as "Administrators" who regularly play online, in which they are able to use highly imaginative means to make each other disappear from the network. Today, because of the availability of inexpensive small routers and switches, these people can also play at home. After a day at work in the computer room, there is nothing more relaxing than a few hours of gaming in the online world.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.