Home > Information Security, Security > Security System Administrator vs Network Administrator

Security System Administrator vs Network Administrator


I see lot of people interchangeably using these roles in various contexts while talking or in writing. Here in this post I would like to clear out the concept and list down the responsibilities of both the roles.

SYSTEM ADMINISTRATOR

The role of System administrator varies widely from one organization to another. System administrators are usually charged with installing, supporting, and maintaining servers or other computer systems, and planning for and responding to service outages and other problems. Other duties may include scripting or light programming, project management for systems-related projects,

The system administrator is responsible for following things:

  • User administration (setup and maintaining account)
  • Maintaining system
  • Verify that peripherals are working properly
  • Quickly arrange repair for hardware in occasion of hardware failure
  • Monitor system performance
  • Create file systems
  • Install software
  • Create a backup and recovery policy
  • Monitor network communication
  • Update system as soon as new version of OS and application software comes out
  • Implement the policies for the use of the computer system and network
  • System inventory management.
  • Preparation of documents for internal and external system audit.
  • Setup security policies for users. A system Administrator must have a strong grasp of computer security (firewalls and intrusion detection systems)

NETWORK ADMINISTRATOR

  • Manages the data communication needs of the company
  • Manages the physical network infrastructure, including wired and wireless local area network (LAN)
  • Manages infrastructure servers: Active Directory, WINS, DNS, DHCP, Proxy, RAS, and Internet Security and Acceleration (ISA) Server
  • Manages the acquisition of new network hardware as required
  • Participates in network planning, design, development, deployment, and modification
  • Monitors and controls service levels of network suppliers
  • Liaises with the Service Monitoring and Control SMF to establish a list of monitored network activities
  • Ensures that data communication within the company is reliable and of sufficient capacity to meet business needs
  • Provides physical connections to the corporate LAN as required
  • Ensures that data communications packets are routed efficiently
  • Provides regular feedback on network performance, both in general and against specific service levels
  • Provides access to the corporate network via dial-up or virtual private network (VPN) as required
  • Monitors bandwidth use, analyzes traffic patterns and volumes, and determines impact/implications of issues
  • Monitors and controls service levels of network suppliers
  • Ensures detection of alerts from the network infrastructure
  • Provides physical connections to the corporate LAN as required
  • Ensures that data communications packets are routed efficiently
  • Provides regular feedback on network performance, both in general and against specific service levels
  • Monitors bandwidth use, analyzes traffic patterns and volumes, and determines impact/implications of issues
  • Monitors incident details, including the configuration items affected
  • Investigates and diagnoses incidents and problems (including resolution where possible)
  • Detects possible problems and notifies problem management
  • Documents the resolution and recovery of assigned incidents
  • Acts as a restoration team member, if required, during major incidents
  • Carries out actions in order to correct known errors
  • Performs monitoring and analysis of intrusion detection and other security breaches
  • Maintains access list
  • Performs firewall maintenance
  • Ensures security standards are upheld.

 

Advertisements
  1. March 11, 2013 at 4:37 PM

    Hi there, just wanted to say, I liked this article.
    It was helpful. Keep on posting!

    Like

  2. March 20, 2013 at 8:56 AM

    Unquestionably believe that which you said. Your
    favorite reason appeared to be on the net the easiest thing to be aware of.
    I say to you, I definitely get irked while people think about worries
    that they just do not know about. You managed to hit the nail upon the top and also defined
    out the whole thing without having side-effects , people can take a
    signal. Will probably be back to get more. Thanks

    Like

  3. Vivien
    July 23, 2013 at 11:44 PM

    I am curious to find out what blog platform you’re utilizing? I’m having some small security problems with
    my latest blog and I’d like to find something more safe. Do you have any suggestions?

    Like

  4. July 27, 2013 at 9:17 AM

    Hello, this weekend is nice in support of me, because
    this moment i am reading this fantastic informative
    post here at my residence.

    Like

  5. June 3, 2014 at 8:40 AM

    Way cool! Some very valid points! I appreciate you writing this
    post plus the rest of the website is very good.

    Like

  6. June 3, 2014 at 4:35 PM

    Nice weblog right here! Additionally your website
    loads up fast! What host are you the usage of? Can I am getting your
    associate link for your host? I want my site loaded
    up as quickly as yours lol

    Like

  7. June 14, 2014 at 6:52 AM

    I read this paragraph fully regarding the resemblance of hottest and earlier technologies, it’s amazing article.

    Like

  1. August 25, 2014 at 7:27 PM

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: