Ensures only authorised
users can access certain
files and resouces
Prevents misuse e.g.
deleting information
or installing data
Prevents
damage to
hardware
Importance of Network Security
Business may fail if the
data is compromised
Privacy e.g.
medical
records
Data can be financially
valuable
Authentication and Validation
Authentication is used to ensure
that the person logging on is who
they claim to be
This is done by the
use of usernames
and passwords
Strong passwords
should include at least 8
characters and a variety
of upper-case,
lower-case, numbers,
symbols
Access control
Used to allow certain users
to access certain files and
data
Physical Security
This is used a first line of defence;
stopping unauthorised people from
entering the building where the network
equipment is
Examples include locks, biometric security
recognition, swipe cards, cameras, alarms,
radio frequency identification (an alarm will
sound if the equipment is taken out of the
building)
Firewalls
A firewall protects a
network connected to a
WAN e.g. the Internet
It can be provided
by hardware or
software
Firewalls can be made to prevent
communications entering the network
but can also prevent programs and
users from accessing the internet
from within the network