Network Manageability Security

Network Manageability Security

Salvador Mandujano (Intel Corporation, USA)
DOI: 10.4018/978-1-60960-777-7.ch009
OnDemand PDF Download:
No Current Special Offers


As the number of devices connected to computer networks increases, so does the need for algorithms, protocols, and tools to manage these devices and their communications infrastructure. Manageability solutions allow Information Technology administrators to keep control over such resources in order to identify, configure, and repair network devices remotely in a way that reduces desk visits and maximizes service availability for customers. This chapter studies the security and privacy aspects of different manageability technologies. It describes the protection mechanisms built into standard protocols and highlights some of the basic risks they face when deployed in an enterprise environment. Solutions for desktop, laptop, server, and cell phone platforms are discussed and compared in the context of common threats to managed devices, as well as the control consoles that monitor them. Secure enablement and configuration guidelines are provided for implementers and designers to develop effective threat models when integrating manageability software and hardware inside a computer network. The analysis presented in this chapter will help the reader understand how network manageability solutions work and what their strengths and weaknesses are from the security standpoint.
Chapter Preview

Basic Manageability Functions

Manageability technologies support a number of fundamental functions that allow administrators to anticipate potential problems and maintain devices operating as expected. From the analysis of different solutions (Campbell, 2007; Sheldon, 2001; Kumar, 2009; Blair, 2007; Berlin, 2009), we can identify some common capabilities offered by them:

Complete Chapter List

Search this Book: