top of page

Networks

Network Security Measures

Topic Menu
Content Contributors
Christian Bien Portrait_edited.jpg

Christian Bien

Learning Objectives

tutorial.png

one.png
Firewalls
Slide1.jpeg

Firewalls are hardware, software or a router that monitors the incoming and outgoing data packets of a network and rejects any unauthorised data packets.

Think of it like an airport security checkpoint in your network. It monitors all the data packets to ensure what is coming in and out is authorised to enter/leave the network.


Firewalls can be adjusted depending on the user's security appetite. Strict firewalls can reinforce tight security, however, can also block a lot of legitimate data packets into the network. 

two.png
Passwords
Slide2.jpeg

Passwords are a combination of characters, often associated with a username, used to unlock certain computer resources.


Google's Tips for Strong Passwords

Here at the ATAR Survival Guide, we encourage users to adopt Google's recommendations of creating a strong password. These tips include:

  1. Make the password unique - make passwords unique to each service. Use a secure password manager to manage password access.

  2. Make passwords long and memorable - you can use phrases uniquely known to you to create long and memorable passwords.

  3. Avoid personal information & common words

  4. Use unique characters such as '!@#$' 


You can view the guide here for more tips. 


Password Managers

A secure way to store heaps of complex passwords is to use a password manager. A password manager uses secure, encrypted databases to store all of user's passwords, which can be unlocked using one secure key. 


Examples of password managers include:

two.png
Physical Security Measures
Slide2.jpeg

Physical Security Measures refer to actual physical methods of locking/restricting access to the hardware that stores the data. 


Physical security measures can include:

  • Locked Servers - Servers should be stored in cages and locked to prevent unauthorised access

  • Video Surveillance

  • Restricted access to server rooms - this can be done through keycards or biometric security

  • Locking doors after use

  • Fences and barbed wire around data warehouses

  • Reducing/removing windows and installing thick walls to reduce the risk of outside penetration into the data warehouse

two.png
Slide2.jpeg
two.png
Slide2.jpeg
two.png
Slide2.jpeg
two.png
Slide2.jpeg
two.png
Slide2.jpeg
Introduction to Networks
TCP/IP
HTTP/HTTPS
Communication Standards (Ethernet & Wireless)
Network Security Measures
bottom of page