Network Security

Firewalls

Firewalls are used to prevent unwanted traffic from entering your network, this adds security and keeps threats from trafficking into your network, there are many firewall configurations that can be used for different types of protection. Firewalls can be used to stop employees from sending out data through the network, e.g. blocking emails, it can prevent schools or colleges networks from accessing social media websites and most importantly, detect and protect your systems and networks from viruses from malicious websites

Diskless Networks

Diskless networks consist of workstations which have no disk drives on their computer systems. This means that there is no hard drive, CD Rom slots or even USB ports, booting the operating system by the server and any saved work on the system will save back to the server. This makes stealing data on a computer system impossible and the only way is if it was a direct attack on the server or network, this avoids rogue employees or thieves from being able to steal data and transfer it onto a CD Rom/storage device

Audit Logs

Audit logs are used to keep track of the company's activity among databases and files throughout the network and systems, you can see who modified something, why they did it and when and what time they did it at, if there was to ever be a data breach with a particular piece of information, then they can always track back to see who was last to modify that data. The administrators of the networks can monitor these activity's and set up alarms if certain databases and documents were opened in case of suspicious activity. 


Popular Posts