Network Security Management for Large Government, School, Businesses and Homes

Network Security Management

In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.

Security Management for networks is different for all kinds of situations. A small home or an office would only require basic security while large businesses will require high maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming.

Small homes

1. A basic firewall or a unified threat management system.
2. For Windows users, basic Anti-virus software. An anti-spyware program would also be a good idea. There are many other types of anti-virus or anti-spyware programs out there to be considered.
3. When using a wireless connection, use a robust password. Also try to use the strongest security supported by your wireless devices, such as WPA2 with AES encryption.
4. If using Wireless: Change the default SSID network name, also disable SSID Broadcast; as this function is unnecessary for home use. However, many security experts co-sider this to be relatively useless.
5. Enable MAC Address filtering to keep track of all home network MAC devices connecting to your router.
6. Assign STATIC IP addresses to network devices.
7. Disable ICMP ping on router.
8. Review router or firewall logs to help identify abnormal network connections or traffic to the Internet.
9. Use passwords for all accounts.
10. Have multiple accounts per family member, using non-administrative accounts for day-to-day activities. Disable the guest account (Control Panel> Administrative Tools> Computer Management> Users).
11. Raise awareness about information security to children.

Medium Businesses

1. A fairly strong firewall or Unified Threat Management System
2. Strong Anti-virus software and Internet Security Software.
3. For authentication, use strong passwords and change it on a bi-weekly/monthly basis.
4. When using a wireless connection, use a robust password.
5. Raise awareness about physical security to employees.
6. Use an optional network analyzer or network monitor.
7. An enlightened administrator or manager.

Large businesses

1. A strong firewall and proxy to keep unwanted people out.
2. A strong Anti-virus software package and Internet Security Software package.
3. For authentication, use strong passwords and change it on a weekly/bi-weekly basis.
4. When using a wireless connection, use a robust password.
5. Exercise physical security precautions to employees.
6. Prepare a network analyzer or network monitor and use it when needed.
7. Implement physical security management like closed circuit television for entry areas and restricted zones.
8. Security fencing to mark the company's perimeter.
9. Fire extinguishers for fire-sensitive areas like server rooms and security rooms.
10. Security guards can help to maximize security.

Universities

1. An adjustable firewall and proxy to allow authorized users access from the outside and inside.
2. Strong Anti-virus software and Internet Security Software packages.
3. Wireless connections that lead to firewalls.
4. Children's Internet Protection Act compliance.
5. Supervision of network to guarantee updates and changes based on popular site usage.
6. Constant supervision by teachers, librarians, and administrators to guarantee protection against attacks by both internet and sneaker-net sources.

Large government

1. A strong firewall and proxy to keep unwanted people out.
2. Strong Anti-virus software and Internet Security Software suites.
3. Strong encryption.
4. White list authorized wireless connection, block all else.
5. All network hardware is in secure zones.
6. All host should be on a private network that is invisible from the outside.
7. Put web servers in a DMZ, or a firewall from the outside and from the inside.
8. Security fencing to mark perimeter and set wireless range to this.


Related Topic What are all the Types of Networks and their Scales, Scopes and Purposes
List of Server Ports and their Assigned Numbers
Top 10 Web Hosting Companies
How to Setting Up a Internal LAN Local Area Network
Android Application Development SDK Dalvik Virtual Machine

nScraps.com 2011   Privacy Policy  Terms of Service  Feedback