Verified Document

Managed Device And An Agent. How Can Term Paper

¶ … managed device and an agent. How can this concept apply to securing a computing environment? Simple Network Management Protocol, otherwise known as 'SNMP' is a form of network protocol that was developed to manage the servers, workstations, routers, switches and hubs known as nodes on an IP network. Managed devices are kinds of network nodes contain an SNMP agent and that resides on a managed network. A managed device collects and stores management information. An agent is a network management software module that resides within a managed device. An agent has local knowledge of management information and translates that information into a form compatible with SNMP. Applications within this system can "monitor and control managed devices." (SNMP: Simple Network Management Protocol, Network Dictionary, 2003)

In other words, the agent and management system can be used as screening devices by adding additional protocols that the user must know. For instance, the most current version of SNMP Version...

It also introduced what is known as a View-based Access Control Model (VACM) for access control, thus supporting the concurrent use of different security, access control, and message processing models. In contrast to the two earlier versions, the third version "also introduces the ability to dynamically configure the SNMP agent using SNMP SET commands against the MIB objects that represent the agent's configuration. This dynamic configuration support enables addition, deletion, and modification of configuration entries either locally or remotely. (SNMP: Simple Network Management Protocol, Network Dictionary, 2003)
How can remote monitoring used in conjunction with other security mechanisms to provide a well secure network environment?

Remote Monitoring ensures that a network operator can monitor or alarm application configurations for large network enterprises,…

Sources used in this document:
Works Cited

Newman, Robert C. (2003). Enterprise Security. Upper Saddle River, New Jersey: Prentice Hall.

RTM. (2004) Retrieved on June 17, 2004 at http://www.protect-me.com/rtm/

SNMP: Simple Network Management Protocol." (2003). Network Dictionary. Retrieved on June 17, 2004 at http://www.javvin.com/protocolSNMP.html

SNMPv3." (2003). Network Dictionary. Retrieved on June 17, 2004 at http://www.javvin.com/protocolSNMPv3.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Mobile Device Management Change Initiative Plan
Words: 1310 Length: 4 Document Type: Research Paper

Mobile Device Management Change Initiative Plan With the growing volume of content, number of applications and information accessed via various devices, Mobile Device Management (MDM) initiative is vital in the management of the mobile enterprise. MDM is more than the ordinary management of devices because it includes system-centered functionality to manage and secure applications and data. MDM is a crucial element of the device life circle, encompassing the device software, hardware,

Input/Output Devices Will You Be Using in
Words: 2506 Length: 9 Document Type: Essay

input/output devices will you be using in the next one to three years as "computing" devices? Which features/components/form factors will be prominent? Why? Which features/components/form factors will be important to you? Why? Which applications will you be using on these devices? How may these devices change your life in terms of benefits and risks? (Two pages) A survey of experts identified five major themes that will carry forward through the next

Tablet Devices Replace the Latop
Words: 16026 Length: 55 Document Type: Dissertation

It initially failed to attract the desired audience, but it is believed that the recent innovations of the re-launched tablet PC would ensure its success (Search Mobile Computing, 2010). While Apple stated that they were the first creators of tablet computers, Microsoft comes to argue the same. Thorn Holwerda (2010) however states that neither of the two it monoliths were the creator of tablet PC. "Well, no. They're both wrong.

Principal-Agent Model in Economics and Political Science
Words: 12148 Length: 45 Document Type: Dissertation

Principal-Agent Model in Economics and Political Science The international political perspectives of free trade A Global Analysis International Trade Impact on Tunisia The Export of agricultural products International trade and development of Tunisia Balance in the Trade Regime Imports and exports of Tunisia Exports Imports Coping With External and Internal Pressures The Common External Tariff (CET) Safeguard Measures Anti-Dumping Duties (ADDs) and Countervailing Duties (CVDs) Rules of origin The New Commercial Policy Instrument Sector Based Aspects GATT/WTO's Main Principles Non-discriminatory trade Multilateral negotiation and free trade The Trading Policies

Mobile Security
Words: 1535 Length: 6 Document Type: Research Paper

Mobile Device Security Analysis of Routing Optimization Security for Mobile IPv6 Networks Defining and Implementing Mobility Security Architectures Approaches to defining, implementing and auditing security for mobility devices have become diverse in approach, spanning from protocol definition and development including IPv6 through the creation of secure mobile grid systems. The wide variation in approaches to defining security for mobility devices has also shown the critical need for algorithms and constraint-based technologies that can

Abu Sayyaf Group Asg Has Re-Emerged Among
Words: 2057 Length: 6 Document Type: Essay

Abu Sayyaf Group (ASG) has re-emerged among the list of most critical terrorist organizations fighting the federal government of the Republic of the Philippines (GRP), America, and it is allies within Southeast Asia. Established in 1991 by Abdurrajak Janjalani, a veteran in the Afghan Mujiheddin as well as associate of Osama bin Laden, the gang rapidly rose to popularity as being a deadly terrorist group dedicated to the institution of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now