How to Secure your Network ?

By: B. Bashir

Network security is a method of preventing your computer network from the unauthorized user access, email spoofing, Trojan horses, denial of service, hacking, viruses, spyware and intruders etc. There are different securities mechanisms are being employed to protect the network. If a hacker gets control of your computer or network, he can send viruses or steal your company's confidential data. Similarly if any computer in your network is infected with the viruses or spyware, all other computers will also be infected if no proper security system has been implemented. Securing a network is most important job description of the network administrators, security specialists, network engineers and IT managers. You can secure your computer network by the following security methods.

Network Security Tips

Use Virus Protection Software
Don't open unknown email attachments
Use regular backup of your critical data
Make boot disk
Use Firewall program
Authenticate users
Implement Security Policy in your network
Keep an inventory of your software and hardware and make a list of all the devices.
SCAN TCP/UDP services
Don't provide more rights to the system resources than necessary.
Perform the network security testing and find the holes and fix them.
Place your server at very safe place.
Prepare an Assistant Network Administrator and train him/her about all the security related matters so that he/she can control the network in your absence.
Monitor the user's activities on the internet and block all the unwanted websites, web applications which have security risks.

If you have wireless network then the following methods are very helpful in securing your wireless network.

Wireless Network Security

SSID (Service Set Identifier) -
WPA (Wi-Fi Protected Access)
WEP (Wired Equivalent Privacy)
TKIP (Temporal Key Integrity Protocol)
MAC Addressing (Media Access Control)
DHCP (Dynamic Host Configuration Protocol)
Encryption

Security
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 
 • 

» More on Security
 



Share this article :
Click to see more related articles