TCP/IP是公认的主要国际标准。这里通常支持一系列网络，例如以太网、FDDI和令牌环，以支持广域网(Oracle, 2016)。在网络安全管理中，管理员的角色是制定规则，以达到最佳的安全性和最小化破坏。使用密码和用户名是最基本的安全措施。此外，使用高级别加密来传递文件和其他数据，使用受控代理等将会很有帮助。此外，记录称为异常的异常安全问题将有助于管理员了解将来改进安全性的方法。审计控制必须定期建立(Sheng & Lee, 1992)。必须从网络设置的intuit阶段记录网络实现、需求和更多的内容。其次，需要对所使用的TCP/IP等网络协议进行文档化。安全实践也必须与安全漏洞一起记录在案。
Some of the key factors affecting performance that are to be monitored are listed here,Primarily it is necessary to use devices in the network based on their capability to provide maximum speed, so device selection must be done at the time of the network organization itself.Secondly, it is necessary to consider the different forms of routing, queuing and more in order to speed up the network use. Transmission failures must not occur, so even if one of the routing nodes fails there must be some form of failsafe protocol to assure the message gets transmitted.Response times have to be considered as critical, and must in most cases be real time.In network establishment and setup it is critical to follow the principles and protocols of network connections as established in the TCP/IP suite. These are the communications protocols or the formal set of rules that dictate how the software and the hardware environment work with one another. Information must be delivered to the intended destination in an intelligible form and having the proper protocol would help all designers of network work alike.
TCP/IP is recognized as a major international standard. A range of networks are usually supported here such as that of the Ethernet, FDDI, and Token Ring, to wide-area networks (Oracle, 2016). In network security administration, it is the role of the administrator to set out the rules that will result in optimal security and minimize breaches. Use of the passwords and usernames are the most basic of security. In addition, the use of high level of encryption for passing files and other data, the use of controlled proxies and more would be helpful. Additionally, logging of abnormal security issues called anomalies would be helpful for the administrator to understand ways of improving security for the future. Audit control must be established regularly (Sheng & Lee, 1992).Network implementation, requirements and more have to be documented from the intuit stage of the network setup. Secondly, the network protocols suits used such as TCP/IP and other protocols have to be documented. Security practices have to be documented also along with security breaches.