preview

Network Security Practices Essay

Decent Essays

Today’s corporate infrastructure is not the same as it was 10 years ago. In the past you were able to control the amount of attacks on a network because of the reasonable number, which is not the case today. At any given time an organizations network will be attacked or try to be attacked several hundred times in one day. For larger more well-known organizations this number could grow significantly. To ensure your organization is not one of the ones on the 10’oclock news you have to ensure you have proper security practices in place to secure your network.
Most people in the security field agree that good security policies are necessary to keep intruders out and keep the users along with the information on their network safe. The best way …show more content…

Having this type of accountability will help you in having a better understanding and provide for a good foundation for enforcing security across the organization. This area should also cover the different types of data each person handles on a daily basis. It should clearly outline the different categories that data will fall into whether it be internal, external, general use or confidential. By doing so you now allow the employees to have a better understanding of what data they can manipulate and data that has to stay the same.

2. Remote Access Policies – users are always going to want to access the office network from a remote site. We have to ensure that there are policies in place that allow them to do so but in a safe manner. If they are going to remotely access the network it has to be done in accordance with the security policies of the organization and not on their terms. This should include using a laptop or remote connection software that has been pre-approved by the organizations security team, keeping IP’s in a safe place, making sure that if they are accessing the network from a laptop to ensure that hard drive is encrypted. This will prevent anyone from gaining access the sensitive information if it is ever lost or stolen. Lastly not everyone should be granted remote access to the network; this privilege should only be given to people who have a legitimate need for it.

3. Network Connected Devices – Once a device is connected to the

Get Access