Network Manageability Security

Network Manageability Security

Salvador Mandujano
ISBN13: 9781609607777|ISBN10: 1609607775|EISBN13: 9781609607784
DOI: 10.4018/978-1-60960-777-7.ch009
Cite Chapter Cite Chapter

MLA

Mandujano, Salvador. "Network Manageability Security." Network Security, Administration and Management: Advancing Technology and Practice, edited by Dulal Chandra Kar and Mahbubur Rahman Syed, IGI Global, 2011, pp. 158-181. https://doi.org/10.4018/978-1-60960-777-7.ch009

APA

Mandujano, S. (2011). Network Manageability Security. In D. Kar & M. Syed (Eds.), Network Security, Administration and Management: Advancing Technology and Practice (pp. 158-181). IGI Global. https://doi.org/10.4018/978-1-60960-777-7.ch009

Chicago

Mandujano, Salvador. "Network Manageability Security." In Network Security, Administration and Management: Advancing Technology and Practice, edited by Dulal Chandra Kar and Mahbubur Rahman Syed, 158-181. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-777-7.ch009

Export Reference

Mendeley
Favorite

Abstract

As the number of devices connected to computer networks increases, so does the need for algorithms, protocols, and tools to manage these devices and their communications infrastructure. Manageability solutions allow Information Technology administrators to keep control over such resources in order to identify, configure, and repair network devices remotely in a way that reduces desk visits and maximizes service availability for customers. This chapter studies the security and privacy aspects of different manageability technologies. It describes the protection mechanisms built into standard protocols and highlights some of the basic risks they face when deployed in an enterprise environment. Solutions for desktop, laptop, server, and cell phone platforms are discussed and compared in the context of common threats to managed devices, as well as the control consoles that monitor them. Secure enablement and configuration guidelines are provided for implementers and designers to develop effective threat models when integrating manageability software and hardware inside a computer network. The analysis presented in this chapter will help the reader understand how network manageability solutions work and what their strengths and weaknesses are from the security standpoint.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.