
Network Security Measures
Applied IT (Year 12) - Networks
Christian Bien
Firewalls
A firewall is hardware, software or a router that monitors the incoming and outgoing data packets of a network and rejects any unauthorised data packets.​
Think of it like an airport security checkpoint in your network. It monitors all the data packets to ensure what is coming in and out is authorised to enter/leave the network.
Firewalls can be adjusted depending on the user's security appetite. Strict firewalls can reinforce tight security, however, can also block a lot of legitimate data packets into the network.Â
Passwords
Passwords are a combination of characters, often associated with a username, used to unlock certain computer resources.
Google's Tips for Strong Passwords
Here at Elucidate, we encourage users to adopt Google's recommendations of creating a strong password. These tips include:
Make the password unique - make passwords unique to each service. Use a secure password manager to manage password access.
Make passwords long and memorable - you can use phrases uniquely known to you to create long and memorable passwords.
Avoid personal information & common words.
Use unique characters such as '!@#$'.
You can view the guide here for more tips.Â
Password Managers
A secure way to store heaps of complex passwords is to use a password manager. A password manager uses secure, encrypted databases to store all of user's passwords, which can be unlocked using one secure key.Â
Examples of password managers include:
Physical Security Measures
Physical Security Measures refer to actual physical methods of locking/restricting access to the hardware that stores the data.Â
Physical security measures can include:
Locked Servers -Â Servers should be stored in cages and locked to prevent unauthorised access
Video Surveillance
Restricted access to server rooms - this can be done through keycards or biometric security
Locking doors after use
Fences and barbed wire around data warehouses
Reducing/removing windows and installing thick walls to reduce the risk of outside penetration into the data warehouse