Verified Document

Information Technology -- Network Administrators Thesis

This tremendous range of business enterprises that rely heavily on their it systems also presents many additional opportunities for anybody aspiring toward a career in it network administration. Many times, the wide range of organizations that now employ it professionals such as network administrators means that it is possible to combine several different types of interests within the choice to work in it network administration. For example, the law enforcement community has incorporated all sorts of it applications into the field. Criminal investigators now routinely use sophisticated computer systems and custom-designed applications to track criminals, map geographical areas in relation to crime patterns, and to compare sensitive records with other law enforcement agencies across the country as well as internationally (Burnett, 2007). Some of the most advanced it systems used by modern law enforcement agencies includes sophisticated software applications for cracking encryption codes used to unlock the communications devices confiscated from drug traffickers and other types of criminals; others now allow police officers on routine patrol to scan license plates from their patrol vehicles and to automatically enter those license plates into national stolen car and warrant databases to identify stolen vehicles and wanted criminals (Clark, 2006).

Larger organizations may employ an entire staff of network administrators, systems analysts, it security specialists, installers, and technicians assigned to handle different types of tasks that typically arise within large companies using large and complex it systems. The diagram below is an example of a typical it system configuration of a medium-sized professional business using in-house servers and routers to connect different levels of users and multiple remote locations.

http://www.iij.ad.jp/en/service/solution/images/fig-network-02.gif

As is the case in other fields, the salary, typical working responsibilities, and benefits of a job as a network administrator can vary considerably based on the type and size of the organization. Today, network security has become a major focus of many organizations; every year, there are hundreds of millions documented network intrusions and data security breaches in business it networks (Baker, Hylender,...

Therefore, network administrators who are experienced in this particular area are in very high demand and command higher salaries than those who do not remain well-versed in the continually evolving it network threat environment.
Generally, newly graduated it professionals and network administrators receive salaries and benefits that are comparable to entry level positions in other skilled professions. Larger organizations may provide much greater opportunity for advancement to senior administrator and supervisory administrator positions that require extensive people managing skills in addition to technical expertise. Because some people prefer to work primarily with technical issues and others prefer to split their duties between technical responsibilities and administrative and supervisory responsibilities, those types of preferences also play an important role in the specific type of it network administration position one should seek.

Summary of Presentation Strategy

My presentation strategy will be to introduce the topic with a basic description of what it network administrators do. Then I hope to provide information to enable students to determine whether or not their interests coincide with a career in the field. Finally, I hope to present an honest outline of the types of opportunities that might be available and to describe the relevant differences to help interested students decide what aspects of the field might suit their individual interests.

References

Baker, W., Hylender, C., and Valentine, J. (2008). Verizon Business Data Breach Investigation Report. Retrieved October 17, 2009, from: http://www.verizonbusiness.com/resources/security/databreachreport.pdf

Burnett, E. "Crime Analysis Reporting and Mapping for Small Agencies: A Low-

Cost and Simplified Approach." FBI Law Enforcement Bulletin; Vol. 76 No. 10

(2007): 15-22.

Clark, M. "Cell Phone Technology and Physical Surveillance." FBI Law Enforcement

Bulletin; Vol. 75 No. 5. (2006): 25-32.

Kizza, J. (2005). Computer Network Security. New York: Springer.

Personick, S., and Patterson, C. (2003). Critical Information Infrastructure Protection.

Washington, DC: National Academies Press.

Sources used in this document:
References

Baker, W., Hylender, C., and Valentine, J. (2008). Verizon Business Data Breach Investigation Report. Retrieved October 17, 2009, from: http://www.verizonbusiness.com/resources/security/databreachreport.pdf

Burnett, E. "Crime Analysis Reporting and Mapping for Small Agencies: A Low-

Cost and Simplified Approach." FBI Law Enforcement Bulletin; Vol. 76 No. 10

(2007): 15-22.
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Technology Change Management in Home Health
Words: 1391 Length: 5 Document Type: Essay

Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized

Information Technology a Home Network
Words: 1182 Length: 4 Document Type: Essay

Processing examples are conversion of encoded or typed words to printable format or running of computer programs such as the Statistical Package for Social Sciences (SPSS). Lastly, controlling ensures that all other four operations of the computer are efficiently working together, while at the same time, ensuring also that each operation does not interfere with the other operations. Examples of control measures in the computer are warnings or prompts

Information Technology Acts What Were the Advances
Words: 660 Length: 2 Document Type: Essay

Information Technology Acts What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? One of the common challenges that most regulations will face is keeping up with the changes in the technology. As the law, is designed to provide everyone with some kind of protection against potential abuse. However, improvements in technology have transformed the way that everyone is living their daily lives.

Information Technology and Its Uses
Words: 5994 Length: 22 Document Type: Thesis

Nanotechnology attempted to show the potential of this new technology and included the wide range of fields that are connected to the concept of the nanometer scale. These include machining, imaging, metrology or measurement, micromachines, instrumentation and machine tools, scanning probe microscopy, fabrication of components, nanoelectronics, molecular engineering, among others. (Journal Review: Nanotechnology) Another important step in the development of this technology in both a practical and theoretical sense was

Information Technology Is a Constantly
Words: 653 Length: 2 Document Type: Essay

In the nursing field, there is becoming a concept such as the digital divide among nurses. Even though many nurses are familiar with the Internet and access it on a daily basis, there are some nurses who are familiar with other emerging technologies as it pertains to nursing and there are some nurses who feel that navigating the Internet is the only technology they need to know (Lupianez-Villanueva et

Information Technology IT Is a Broad-Based Term
Words: 1674 Length: 4 Document Type: Essay

Information Technology (IT) is a broad-based term that includes a combination of the acquisition, processing, storage and dissemination of information in a computing or telecommunications platform. In terms of a scientific discipline, it is relatively new, appearing in a 1958 article in the Harvard Business Review in which the authors said, "this new technology does not yet have a single established name. We shall call it information technology (IT)" (Dunn,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now