Jeff dray recently made an in-depth investigation and research on the IT industry. Through summarization and analysis, he listed a category list for the IT industry. Here, he defines the seven most insecure network administrators. If you are a network administrator and have realized that there are still deficiencies in your work, see which category of the list you belong? Most network administrators can work with ease and make the work smooth in a highly challenging and technically difficult task. However, sometimes some of them become difficult and will hinder the smooth process. Therefore, I have defined a [blocked ad] list of the latest categories. Here, we will see the seven most insecure network administrators, I also summarized my years of experience in this industry and described the characteristics of these insecure factors. Administrator who is too cautious about security (netopsiasecuritatis) The full significance of the existence of "Mr. Security" is to prevent anything that is not conducive to his network. The contractor is responsible for the operation of the line, and the Cabinet, distribution frame, router, and UPS are all installed by the manufacturer. All he is responsible for is to put a dusty mouse ball in his drawer, this is only to meet the "in case you want to replace it" needs. The way to avoid conflicts is to lock the system so that no one or anything can change the system. Sometimes this means that the user can only log on to and modify his/her password, and the password may fail every time it is used. It is too dangerous for users to run programs and edit files. Therefore, they can only face one logon interface and a common desktop system. This type of Administrator has never encountered a virus attack for seven years, and will not be encountered in the future. He not only disabled USB slots in the BIOS of each workstation, but also set password protection for the bios, and even the Jack was closed with glue, to prevent the leakage of small data through USB storage devices. The email server is not allowed to install any other attachments. If the network line changes, the workstation cannot start. The hardware of the system has been fixed and the flexibility of the device is lost. If someone tries to open the machine's housing, a small explosive device will make the machine unusable (and possibly damage the operator ). Insufficient Administrator (netopsiasubmersio) The technical capabilities of such administrators grow with the company's growth. 10 years ago, when the company only needed to buy a PC to handle some textual work, the person in charge of this work became an informal PC Administrator through their own efforts. Today, the company has grown from five to 80 employees, and the company's internal network has also expanded accordingly. Currently, only 15 or 20 workstations are managed by a low-end server, which serves as the email gateway, file server, and network proxy server. There is no relevant documentation, and everything is in the Administrator's mind. If everything goes well, it is enough to maintain the normal operation of the company's network. The company does not yet have the ability to hire a full-time it supervisor, but he does not have the ability to do so, because he still has a full-time design team. He can only hope to have a full-time it supervisor when the system is expanded in the future, so that she can gain full control of the system. In general, if you do not care about frequent power loss, crashes, and inevitable virus attacks, the system will still work well. Everyone has the same password and has the same permissions for each folder on the network, but this does not seem to cause any problems, because everyone in the company is very good and absolutely trustworthy. Administrator who frequently updates the network (netopsiaabsistus) Whether or not you want them to do this, these network administrators will manage application and system upgrades through remote control. Your workstation is automatically disabled at the end of each day, and you cannot stop him from doing so, because he sets every workstation on the network to the "Network wake-up" mode. If you really want to stop him, you must disconnect the network cable from your workstation. At five o'clock P.M., when you get off work, your computer is still fully functional, but when you go to work the next morning, you will find that your system is completely different, you cannot find any program you used yesterday. Rigid Administrator (netopsiaofficiatis) This type of rigid administrator can often be encountered in the UK's administrative department. If you ask him to make some exceptions, he will answer you: "That is beyond my responsibilities ". Try to bring a USB storage device to the office while she is on duty and see what will happen! If she put the storage device in her lunch bag while she was not paying attention, she even had to deal with her dereliction of duty. If one day she finds that the email sent by a machine is not completely related to work, she will think that this is not a work accident. I use a laptop that is provided by the company when I work outside of the company. Since the company's headquarters is 150 miles away, it is impossible for me to connect to the company's network all the time. Our network administrator, a typical Rigid-working administrator, only allows me to install a few typical enterprise-wide application software on my computer, but these software is useless to me. Installing a navigation software that allows me to find areas outside my location has even become a huge benefit to me. Administrators who do not consider the consequences (netopsiaexperiortus) Administrators who do not consider the consequences always try new patches or upgrade programs. Most wise network administrators perform tests on a small experimental network before applying new solutions to existing systems. However, such administrators operate directly in the existing system, which often makes the user unnecessary to use, which is somewhat similar to the user's response to the administrator who frequently updates the network. The difference is that the administrator who frequently updates the network will try to ensure that his product or upgrade behavior is truly effective and will not have any other impact on the network and the user. Administrator of the video network as private property (netopsiadictatoris) As shown in the name, the network is treated as private property by such administrators. He will be excited for anything that may affect the stable operation of the network. You may think this is a good thing, but the "private property" has done too much. It will keep detailed logs to show that the network performance has reached 100%. However, this is achieved only when almost no network resources are allocated to common applications. The administrator who plays the game at work (netopsiaaliatorium) This is the most rare and possibly the most friendly type of dangerous network administrators. They used to appear frequently in academic circles. Usually there is enough redundant space on the network, and some students will use it for papers or research. However, the primary function of these redundant spaces is to provide a game platform for School IT equipment managers. Most network resources are provided only to those who log on as "Administrators". These users will play online on a regular basis, in the game, they use a variety of imaginative means to make each other disappear from the Internet. Today, because cheap vrouters and vswitches are at your fingertips, these people can play games at home. After a day's work in the data center, nothing made them feel relaxed than a few hours of gaming in the online world.
|