Page 101 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 101

Unit 7: Network Security




          4.   When using a wireless connection, use a robust password.                         Notes
          5.   Exercise physical security precautions to employees.
          6.   Prepare a network analyzer or network monitor and use it when needed.
          7.   Implement physical security management like closed  circuit television for entry areas
               and restricted zones.
          8.   Security fencing to mark the company’s perimeter.
          9.   Fire extinguishers for fire-sensitive areas like server rooms and security rooms.

          10.  Security guards can help to maximize security.

          School

          1.   An adjustable firewall and proxy to allow authorized users access from the outside and
               inside.
          2.   Strong Antivirus software and Internet Security Software packages.

          3.   Wireless connections that lead to firewalls.
          4.   Children’s Internet Protection Act compliance.
          5.   Supervision of network to guarantee updates and changes based on popular site usage.
          6.   Constant supervision by teachers, librarians, and administrators to guarantee protection
               against attacks by both internet and sneakernet sources.

          Large Government

          1.   A strong firewall and proxy to keep unwanted people out.
          2.   Strong Antivirus software and Internet Security Software suites.
          3.   Strong encryption, usually with a 256 bit key.

          4.   Whitelist authorized wireless connection, block all else.
          5.   All network hardware is in secure zones.
          6.   All host should be on a private network that is invisible from the outside.
          7.   Put all servers in a DMZ, or a firewall from the outside and from the inside.

          8.   Security fencing to mark perimeter and set wireless range to this.

          Self Assessment

          Fill in the blanks:
          7.   ................. is more like providing means to protect a single PC against outside intrusion.
          8.   A computer host whose security is compromised is likely to infect other hosts connected
               to a potentially ................. network.
          9.   Communication between two hosts using the network could be encrypted to maintain
               ................. .








                                           LOVELY PROFESSIONAL UNIVERSITY                                   95
   96   97   98   99   100   101   102   103   104   105   106