Sunday, October 14, 2012

Lesson 8 - Planning Server and Network Security


It is said that if you know your enemies and know yourself, you will not be imperiled in a hundred battles; if you do not know your enemies but do know yourself, you will win one and lose one; if you do not know your enemies nor yourself, you will be imperiled in every single battle.

Sun Tzu Chinese General and Strategist.

 

Lesson 8 - Planning Server and Network Security  

Security begins with education, knowing the dangers of your enemy and the really bad people that exist in this world to get what you got. The secondary part of security begins with the physical aspect of server security. You must ensure that servers are warehoused in a sheltered locale that unsanctioned individuals are not able to access.   A firewall for instance does more than stop "fire." It is a software program or carefully crafted hardware program that protects computers by permitting applicable network traffic through the system while denying traffic it deems as haphazard.  It is the checkpoint security guard that sifts and regulates the packets of data and their configurations.

When an individual utilizes Active Directory on a company network, it is in control of two perilous security functions: authentication and authorization. Computers use several set of complicated algorithms and bit oriented security protocols to safeguard data that is stored and transferred over a network.

Have a great week.
 
 

No comments:

Post a Comment