Term Paper Undergraduate 591 words Human Written

Managed Device and an Agent. How Can

Last reviewed: ~3 min read Technology › Computer Viruses
80% visible
Read full paper →
Paper Overview

¶ … managed device and an agent. How can this concept apply to securing a computing environment? Simple Network Management Protocol, otherwise known as 'SNMP' is a form of network protocol that was developed to manage the servers, workstations, routers, switches and hubs known as nodes on an IP network. Managed devices are kinds...

Writing Guide
How to Write a Literature Review with Examples

Writing a literature review is a necessary and important step in academic research. You’ll likely write a lit review for your Master’s Thesis and most definitely for your Doctoral Dissertation. It’s something that lets you show your knowledge of the topic. It’s also a way...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 591 words · 80% shown · Sign up to read all

¶ … managed device and an agent. How can this concept apply to securing a computing environment? Simple Network Management Protocol, otherwise known as 'SNMP' is a form of network protocol that was developed to manage the servers, workstations, routers, switches and hubs known as nodes on an IP network. Managed devices are kinds of network nodes contain an SNMP agent and that resides on a managed network. A managed device collects and stores management information. An agent is a network management software module that resides within a managed device.

An agent has local knowledge of management information and translates that information into a form compatible with SNMP. Applications within this system can "monitor and control managed devices." (SNMP: Simple Network Management Protocol, Network Dictionary, 2003) In other words, the agent and management system can be used as screening devices by adding additional protocols that the user must know. For instance, the most current version of SNMP Version introduced a User-based Security Model (USM) for message security, through the use of more extensive password protection and deployment.

It also introduced what is known as a View-based Access Control Model (VACM) for access control, thus supporting the concurrent use of different security, access control, and message processing models. In contrast to the two earlier versions, the third version "also introduces the ability to dynamically configure the SNMP agent using SNMP SET commands against the MIB objects that represent the agent's configuration. This dynamic configuration support enables addition, deletion, and modification of configuration entries either locally or remotely.

(SNMP: Simple Network Management Protocol, Network Dictionary, 2003) How can remote monitoring used in conjunction with other security mechanisms to provide a well secure network environment? Remote Monitoring ensures that a network operator can monitor or alarm application configurations for large network enterprises, as opposed to more contained network installations and services. The idea of remote monitoring suggests that a network administrator can start or stop services or devices, add new services or devices, manage the run level and adjust the security permissions, auditing and owner, from a remote terminal.

This enables, for instance, if a network operator becomes aware of a potential virus spreading through a system, that from a remote location, the system can be shut down before the infiltration becomes problematic. With the ability to lock, shutdown, reboot as well as to create additional security processes from the location of remote computers, remote monitoring ensures that security and containment, even from a remote location, is possible, thus allowing for larger and more fully integrated systems, when combined with the remote monitoring of the administrator.

Remote monitoring does not mean, of course, that a system can eschew more traditional security devices such as virus protection systems, firewalls, and network passwords. However, it is a valuable, additional protection in spread-out systems to ensure that large.

119 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
5 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Managed Device And An Agent How Can" (2004, June 19) Retrieved April 22, 2026, from
https://www.paperdue.com/essay/managed-device-and-an-agent-how-can-171567

Always verify citation format against your institution's current style guide.

80% of this paper shown 119 words remaining