Chapter 19

Securing Your Network

IN THIS CHAPTER

Assessing the risk for security

Determining your basic security philosophy

Physically securing your network equipment

Considering user account security

Looking at other network security techniques

Making sure your users are secure

Before you had a network, computer security was easy. You simply locked your door when you left work for the day. You could rest easy, secure in the knowledge that the bad guys would have to break down the door to get to your computer.

The network changes all that. Now, anyone with access to any computer on the network can break into the network and steal your files. Not only do you have to lock your door, but you have to make sure that other people lock their doors, too.

Fortunately, network operating systems have built-in provisions for network security, deterring someone from stealing your files even if he does break down the door. All modern network operating systems have security features that are more than adequate for all but the most paranoid users.

tip When I say more than adequate, I mean it. Most networks have security features that would make even Maxwell Smart happy. Using all these security features is kind of like Smart insisting that the Chief lower the “Cone of Silence” (which worked so well that Max and the Chief couldn’t hear each other!). Don’t make your system so secure that even the good ...

Get Networking For Dummies, 11th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.