Network security starts with physical security. Network components such as servers, hubs, and routers should be located in a secure equipment room. Part of physical security is protecting your cable plant from damage and electronic eavesdropping.
Welcome to Bucaro TecHelp!

Bucaro TecHelp
Maintain Your Computer and Use it More Effectively
to Design a Web Site and Make Money on the Web

About Bucaro TecHelp About BTH User Agreement User Agreement Privacy Policy Privacy Site Map Site Map Contact Bucaro TecHelp Contact RSS News Feeds News Feeds

Each year 1.5 million shelter animals are euthanized (670,000 dogs and 860,000 cats). Source: ASPCA. The solution is not to shelter unwanted pets, but to SHUT DOWN THE PET MILLS. Anyone who wants a pet will just have to adapt a great pet from a shelter.

Holiday Gift Guide
Holiday Gift Guide

Network Security

Network security starts with physical security. Network components such as servers, hubs, and routers should be located in a secure equipment room. Part of physical security is protecting your cable plant from damage and electronic eavesdropping. Cable should be run inside walls or ceilings not laying around on the floor. It is difficult to protect workstations because there are usually many of them spread across a building. The only way to protect this equipment is to limit access to the building and post a security guard or receptionist at all open entrances.

Security Models

There are two basic security models: share-level security and user-level security. Share-level security requires a password to access a network resource. You can assign two separate passwords. One password provides full read/write access and the other provides read-only access.

User-level security permits access based on a specific users security account and the groups to which the user belongs. Some groups may have full access to a resource. Other groups may have read-only access to the same resource. A user may belong to multiple groups.

By logging security events you can create an audit trail. You can then study the logged security events to determine if your system is under attack by an unauthorized source.

Passwords

Security can be increased by using good password procedures. The first component of a password procedure is to require users to create secure passwords. Require passwords to contain a minimum number of characters. The more characters used in a password, the more secure it is. Using numbers along with letters in a password also ads to the security. The user should not have a password that is easy to guess or is a word that can be found in the dictionary. Enforce a company policy that does not permit the sharing of passwords.

Security is increased when passwords are changed frequently. Configure your system so that passwords expire periodically. The user should be warned to change the password before it expires. If the user has not changed the password before the expiration time, they are locked out of the system.

You should configure your system so that an account is locked out after a certain number of failed attempts. This discourages hackers. You should also rename your Administrator account, in Unix, your Root account, to discourage hackers.

RSS Feed RSS Feed


Follow Stephen Bucaro Follow @Stephen Bucaro


Computer Networking Sections

Fire HD
[Site User Agreement] [Privacy Policy] [Site map] [Search This Site] [Contact Form]
Copyright©2001-2017 Bucaro TecHelp 13771 N Fountain Hills Blvd Suite 114-248 Fountain Hills, AZ 85268