Network Security
Firewalls
Firewalls are used to prevent unwanted traffic from entering
your network, this adds security and keeps threats from trafficking into your
network, there are many firewall configurations that can be used for different
types of protection. Firewalls can be used to stop employees from sending out
data through the network, e.g. blocking emails, it can prevent schools or
colleges networks from accessing social media websites and most importantly,
detect and protect your systems and networks from viruses from malicious
websites
Diskless Networks
Diskless networks consist of workstations which have no disk
drives on their computer systems. This means that there is no hard drive, CD
Rom slots or even USB ports, booting the operating system by the server and any
saved work on the system will save back to the server. This makes stealing data
on a computer system impossible and the only way is if it was a direct attack
on the server or network, this avoids rogue employees or thieves from being
able to steal data and transfer it onto a CD Rom/storage device
Audit Logs
Audit logs are used to keep track of the company's activity
among databases and files throughout the network and systems, you can see who
modified something, why they did it and when and what time they did it at, if
there was to ever be a data breach with a particular piece of information, then
they can always track back to see who was last to modify that data. The
administrators of the networks can monitor these activity's and set up alarms if
certain databases and documents were opened in case of suspicious
activity.