Networks
Network Security Measures
Topic Menu
Content Contributors
Learning Objectives
Firewalls
Firewalls are hardware, software or a router that monitors the incoming and outgoing data packets of a network and rejects any unauthorised data packets.
Think of it like an airport security checkpoint in your network. It monitors all the data packets to ensure what is coming in and out is authorised to enter/leave the network.
Firewalls can be adjusted depending on the user's security appetite. Strict firewalls can reinforce tight security, however, can also block a lot of legitimate data packets into the network.
Passwords
Passwords are a combination of characters, often associated with a username, used to unlock certain computer resources.
Google's Tips for Strong Passwords
Here at the ATAR Survival Guide, we encourage users to adopt Google's recommendations of creating a strong password. These tips include:
Make the password unique - make passwords unique to each service. Use a secure password manager to manage password access.
Make passwords long and memorable - you can use phrases uniquely known to you to create long and memorable passwords.
Avoid personal information & common words
Use unique characters such as '!@#$'
You can view the guide here for more tips.
Password Managers
A secure way to store heaps of complex passwords is to use a password manager. A password manager uses secure, encrypted databases to store all of user's passwords, which can be unlocked using one secure key.
Examples of password managers include:
Physical Security Measures
Physical Security Measures refer to actual physical methods of locking/restricting access to the hardware that stores the data.
Physical security measures can include:
Locked Servers - Servers should be stored in cages and locked to prevent unauthorised access
Video Surveillance
Restricted access to server rooms - this can be done through keycards or biometric security
Locking doors after use
Fences and barbed wire around data warehouses
Reducing/removing windows and installing thick walls to reduce the risk of outside penetration into the data warehouse