Lecture 7 Network Budgets
Lecture 7 Network Budgets
Technology is a mission-critical investment, enabling staff members to work smarter and more efficiently to
build relationships, track gifts and memberships, communicate with constituents, and practice sound financial
management. By taking the time to assess inventory, define your current needs and map out future goals in a
technology plan, your organization can put technology to work to further your mission.
Hardware
Use three years as a common rule of thumb when budgeting for computer upgrades. It is not necessary to plan
to purchase new computers all at once. It is preferable to budget an annual amount for each workstation and
upgrade a portion of your machines each year. In addition to computers, plan for upgrades to servers and
peripherals.
Your hardware needs will vary depending on the specific applications each staff member uses and how your
systems are networked. Begin your assessment by making a list of your current hardware, including brand,
type, processor speed, memory, drives, modem, etc. When evaluating the need for additional software or staff
members, this inventory will help you quickly prioritize the hardware upgrades.
There are many options for networking the workstations within your organization. Networks can be described
in terms of their size (LAN or WAN), security and access, protocol (for sharing information), and hardware,
which physically links the systems.
INTERNET CONNECTION
Depending on your staff’s needs to access email, update your Web site and research grants online, you can
make a small investment or a substantial one.
Consider your software, too — some hosted solutions tout low monthly leasing fees for applications, but the
subscription pricing does not seem like such a bargain when you factor in the need for a speedy Internet
connection and add up the annual costs. There are also related hardware expenses, such as modems and routers
SOFTWARE
Create a list of all the applications used by each staff member and volunteer — include everything from
contact management, donation processing and ticketing to word processing, virus scanning and Web browsers.
Be sure to note version numbers, too. Your assessment may bring new needs to light, and it may raise
questions about the advantages of investing in one system designed to meet multiple needs. Consider
additional user licenses and new staff members that will be required to achieve future goals related to capital
campaigns, projected membership growth, major fundraisers, increased student enrollment, etc.
DATA CONVERSION
If your organization plans to export data from an old system to new database applications, make sure you allow
for conversion costs. The charges can vary greatly, depending on the format and amount of your data. You
may be able to run the conversion in your own office using a utility designed to import the data to the
appropriate fields, or you may need to enlist the help of specialists to make sure your data effectively transfers
from the old system to the new.
Find out about maintenance programs and support associated for each software package you have or are
considering. For mid-range fund-raising and accounting systems, annual maintenance costs can range from 15
to 30 percent of the list price of the software. This is a substantial amount, yet the benefits you receive can vary
greatly. Ask what type of support is offered (telephone, email, Web, fax, FAQs). Is Helpline availability
coordinated with your organization’s workday? How many of the vendor’s employees are trained and
dedicated to develop and support the system you are considering? Clarify whether upgrades to the software are
included with a maintenance contract or are an additional expense
1
TRAINING
Training will ensure your organization optimizes its use of technology, and increased productivity will be the
rewarding result.
A systems administrator is often best suited to teach staff members the ins and outs of an organization’s
general systems and processes. If there is no budget for a dedicated technician, organizations may wish to
bring in a consultant to establish a technology plan and assist with training.
Task-specific systems such as fund-raising software call for training from someone with an in-depth
knowledge of software and an understanding of the various roles within nonprofit organizations. Consider how
and where your staff would prefer to attend training. If you can afford to leave the office for a few days,
intensive hands-on classes can be the most helpful. In addition, off-site courses provide the opportunity to
share insight with and learn from other organizations with similar needs and challenges.
If you must have a trainer come to your office, check his credentials.
Is the trainer an employee of the vendor or an independent representative?
Does the trainer have general knowledge of multiple systems, or is she an expert on the system in which
you are investing?
Does the instructor have solid training experience?
Because the level of expertise among independent trainers can vary, be sure to check references.
Review options for supplemental training as well. Web-based courses and computer-based training CDs
provide ways for your staff to learn new skills quickly without leaving the office. Remember that staff
development — like hardware and software purchases — is an ongoing investment integral to your
organization’s success.
Basic Skills
The set of basic skills network staff members need to have separated into two broad groups: personal skills
and technical skills.
1. Personal Skills
It is important for network staff to have a wide range of personal skills because a major part of the support
daily activity will involve communicating with their constituency, their own team members, other response
teams, a variety of technical experts, and other individuals who may have various levels of technical
understanding. The reputation of a network can be made or lost by the professional interactions of its team
members.
a. Written Communication
A large part of its communication occurs through the written word. This communication can take many forms,
including
responses in email concerning incidents
documentation of event or incident reports, vulnerabilities, and other technical information
notifications and/or guidelines that are provided to the constituency
2
internal development of network policies and procedures
other external communications to staff, management, or other relevant parties
Network staff members must be able to write clearly and concisely, describe activities accurately, and provide
information that is easy for their readers to understand.
b. Oral Communication
The ability to communicate effectively though spoken communication is also an important skill to ensure that
network staff members can say the right words to the right people. Oral communication often occurs through
telephone exchanges or face-to-face discussions and can involve a variety of individuals, for example
network team members
system and network administrators (or other IT staff)
application owners/developers
members of other response teams
constituents or users (of the systems)
subject matter or technical experts
security officers
management or other administrative staff
human resources staff
law enforcement or legal staff
press/media/public relations staff
vendors
c. Diplomacy
Network staff members often find that the community with whom they interact may have a variety of goals
and needs. This community may have varying levels of knowledge and degrees of excitement; some people
may feel overwhelmed with the gravity of their situation; they may be anxious, frustrated, or angry. Still others
may be aggressive or try to "trick" the network staff member into providing inappropriate information.
Skilled network staff will be able to anticipate potential points of contention, be able to respond appropriately,
maintain good relations, and avoid offending others. They also will understand that they are representing the
network and/or their organization. Diplomacy and tact are essential.
d. Ability to Follow Policies and Procedures
Network staff should understand how and why the policies and procedures came into existence. To ensure a
consistent and reliable response service, network staff must be prepared to accept and follow the rules and
guidelines, even if these are not fully documented and regardless of whether the staff member personally
agrees with them
e. Team Skills
Network staff must be able to work in a team environment as productive and cordial team players. They need
to be aware of their responsibilities, contribute to the goals of the team, and work together to share
information, workload, and experiences. They must be flexible and willing to adapt to change. They also need
team skills for interacting with other parties (for example, members of other incident response teams and other
members of the organization, such as IT staff, site security officers, and network operators).
f. Integrity
The nature of network administration work means that the team members often deal with information that is
sensitive and, occasionally, they might have access to information that is newsworthy. Network staff must be
trustworthy, discrete, and able to handle information in confidence according to the network administration
guidelines, any constituency agreements or regulations, and/or any organizational policies and procedures.
In their efforts to provide technical explanations or response, staff must be careful to provide appropriate and
accurate information while avoiding the dissemination of any confidential information that could detrimentally
affect another organization's reputation, result in the loss of integrity, or affect other activities that involve
other parties.
Thus, it is important that the team members understand the distinction between their "customer service" role in
providing assistance to their constituency and the need to ensure that information is protected and handled
appropriately. Network staff may find themselves in a position where they know about information and could
comment on a topic, but doing so could acknowledge or disclose information that was provided in confidence
or that could affect an ongoing investigation.
Staff must remain aware of their responsibilities and not be caught "off guard" and make unauthorized
disclosures.
3
g. Coping with Stress
Network staff often find themselves in stressful situations. They need to be able to recognize when they are
becoming stressed, be willing to make their fellow team members aware of the situation, and take (or seek help
with) the necessary steps to control and maintain their composure.
In particular, they need the ability to remain calm in tense situations—ranging from an excessive workload to
an aggressive caller to an incident where human life or a critical infrastructure may be at risk. The team's
reputation, and the individual's personal reputation, will be enhanced or will suffer depending on how such
situations are handled.
h. Problem Solving
Without good problem-solving skills, staff members could become overwhelmed with the volumes of work
related to incidents and other tasks that need to be handled. Problem-solving skills also include an ability for
the network staff member to look at issues from multiple perspectives to identify relevant information or data.
This includes, for example,
knowing who else in the team they might contact or approach for additional information, creative
ideas, or added technical insight
recognizing and seeking additional information from other resources (e.g., literature searches, past
incidents that may involve similar activities, similarities in attack techniques or tools, other sources of
information)
verifying information through alternative approaches
synthesizing information to determine relationships or to correlate with other incident data
i. Time Management
Administrators will be confronted with a multitude of tasks ranging from analyzing, coordinating, and
responding to incidents, to performing duties such as prioritizing their workload, attending and/or preparing for
meetings, completing time sheets, collecting statistics, conducting research, giving briefings and presentations,
traveling to conferences, and possibly providing onsite technical support.
Sometimes, even when they are given criteria for prioritizing tasks, staff may find it difficult to appropriately
prioritize and manage the myriad responsibilities that they are assigned in accordance with those criteria. To
stay productive, network staff must be able to balance their effort between completing the tasks assigned to
them, recognizing when to seek help or guidance from their management (when workload is becoming
overwhelming), and avoiding a state where constant re-prioritizing as new tasks arise prevents them from
actually completing their tasks!
2. Technical Skills
The basic technical skills that network staff need have been separated into two categories: technical
foundation skills and incident handling skills.
Technical foundation skills require a basic understanding of the underlying technologies used by the network
and the constituency, as well as an understanding of issues that affect that team or constituency. Such issues
may include
the type of user support activity that is being reported or seen by the community
the way in which network services are being provided (the level and depth of technical assistance
provided to the constituency)
the responses that are appropriate for the team (e.g., what policies and procedures or other regulations
must be considered or followed while undertaking the response)
the level of authority the network has in taking any specific actions when applying technical solutions
to a reported incident.
Incident handling skills require an understanding of the techniques, decision points, and supporting tools
(software or applications) required in the daily performance of network activities.
Technical Skills
The concepts associated with these baseline skills are similar; regardless of the underlying software and
hardware that is used to perform the work (e.g., the principles will be the same). Building upon such a
baseline, then, are the more specialized skills and knowledge needed for any tools and technologies (software,
hardware, policy) in use by the team or constituency.
4
a. Security Principles
Network staff members need to have a general understanding of basic security principles such as
confidentiality
availability
authentication
integrity
access control
privacy
non-repudiation
Knowledge about security principles are necessary for the network staff to understand potential problems that
can arise if appropriate security measures have not been implemented correctly, as well as the potential
impacts to the constituents' systems or systems. Network staff with this understanding will be better prepared
to determine their constituents' needs in securely configuring systems to prevent misuse or compromises and
also be better prepared to provide appropriate technical assistance and guidance when breaches do occur.
b. Security Vulnerabilities/Weaknesses
To understand how any specific attack is manifested in given software or hardware technology, the network
staff need to be able to first understand the fundamental causes of vulnerabilities through which most attacks
are exploited. They need to be able to recognize and categorize the most common types of vulnerabilities and
associated attacks, such as those that might involve
physical security issues
protocol design flaws (e.g., man-in-the-middle attacks, spoofing)
malicious code (e.g., viruses, worms, Trojan horses)
implementation flaws (e.g., buffer overflow, timing windows/race conditions)
configuration weaknesses
user errors or indifference
c. The Internet
It is important that network staff also understand the internet. Without this fundamental background
information, they will struggle or fail to understand other technical issues, such as the lack of security in
underlying protocols and services used on the Internet or to anticipate the threats that might occur in the future.
d. Risks
Network staff members need to have a basic understanding of computer security risk analysis. They should
understand the effects on their constituency of various types of risks (such as potentially widespread Internet
attacks, national security issues as they relate to their team and constituency, physical threats, financial threats,
loss of business, reputation, or customer confidence, and damage or loss of data). Newly hired network staff
may not have this knowledge and will need guidance and mentoring to ensure they understand the risks that
may affect the constituency being served, as well as any risks that might affect the network itself.
e. Network Protocols
Members of the network staff need to have a basic understanding of the common (or core) network protocols
that are used by the team and the constituency they serve. For each protocol, they should have a basic
understanding of the protocol, its specification, and how it is used. In addition, they should understand the
common types of threats or attacks against the protocol, as well as strategies to mitigate or eliminate such
attacks.
For example, at a minimum, staff should be familiar with protocols such as IP, TCP, UDP, ICMP, ARP, and
RARP. They should understand how these protocols work, what they are used for, the differences between
them, some of the common weaknesses, etc. In addition, staff should have a similar understanding of protocols
such as TFTP, FTP, HTTP, HTTPS, SNMP, SMTP, and any other protocols that are used by the network or its
constituency.
The specialist skills include a more in-depth understanding of security concepts and principles in all the above
areas in addition to expert knowledge in the mechanisms and technologies that lead to flaws in these protocols,
the weaknesses that can be exploited (and why), the types of exploitation methods that would likely be used,
and strategies for mitigating or eliminating these potential problems. They would have expert understanding of
5
additional protocols or internet technologies (DNSSEC, IPv6, IPSEC, other telecommunication standards that
might be implemented or interface with their constituent's networks, such as ATM, BGP, broadband, voice
over IP, wireless technology, other routing protocols, or new emerging technologies, etc.) and provide expert
technical guidance to other members of the team or constituency.
j. Programming Skills
Some team members need to have system and network programming experience. The team should ensure that
a range of programming languages is covered on the operating systems that the team and the constituency use.
For example, the team should have experience in
C#
6
.Net
Java
shell (all variations)
other scripting tools
These scripts or programming tools can be used to assist in the analysis and handling of incident information
(e.g., writing different scripts for counting and sorting through various logs, searching databases, looking up
information, extracting information from logs/files, collecting and merging data).
Additionally, staff should understand the concepts of and techniques for secure programming. They need to be
aware of how vulnerabilities can be introduced into code (e.g., through poor programming and design
practices) and how to avoid these in any tools or products that they may develop for the team or their
constituency.
d. Incident Analysis
It has been said by others in the community that network incident handlers are like detectives. When they
analyze an incident report, they are looking to determine answers to questions such as
7
Who is involved?
What has happened?
Where did the attack originate from?
When (what time frame)?
Why did it happen?
How was the system vulnerable or how did the attack occur?
What was the reason for the attack?