Preparation: Network Security Basics

Preparation involves eliminating unnecessary sources of risk before they can be attacked. You should take the following steps:

• Invest time in planning and policies. If you want to be really diligent about security, for each of the strategies we describe in this chapter, outline how you plan to implement each one.

• Structure your network to restrict unauthorized access. Do you really need to allow users to use their own modems to connect to the Internet? Do you want to permit access from the Internet directly into your network, indirectly via a virtual private network (VPN), Remote Desktop, or not at all? Eliminating points of access reduces risk but also convenience. You have to decide where to strike ...

Get Windows 8 In Depth now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.