Chapter 19
Securing Your Network
IN THIS CHAPTER
Assessing the risk for security
Determining your basic security philosophy
Physically securing your network equipment
Considering user account security
Looking at other network security techniques
Making sure your users are secure
Before you had a network, computer security was easy. You simply locked your door when you left work for the day. You could rest easy, secure in the knowledge that the bad guys would have to break down the door to get to your computer.
The network changes all that. Now, anyone with access to any computer on the network can break into the network and steal your files. Not only do you have to lock your door, but you have to make sure that other people lock their doors, too.
Fortunately, network operating systems have built-in provisions for network security, deterring someone from stealing your files even if he does break down the door. All modern network operating systems have security features that are more than adequate for all but the most paranoid users.
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access
When I say more than adequate, I mean it. Most networks have security features that would make even Maxwell Smart happy. Using all these security features is kind of like Smart insisting that the Chief lower the “Cone of Silence” (which worked so well that Max and the Chief couldn’t hear each other!). Don’t make your system so secure that even the good ...