ابدأ بالتواصل مع الأشخاص وتبادل معارفك المهنية

أنشئ حسابًا أو سجّل الدخول للانضمام إلى مجتمعك المهني.

متابعة

What are different ways of securing a computer network?

user-image
تم إضافة السؤال من قبل Mark Delmo Lorenzo , fire protection technician , reda hazard control
تاريخ النشر: 2017/04/01
ifthiquar hussain
من قبل ifthiquar hussain , IT Manager , Moevenpick Resort Al Nawras Jeddah

Apply company IT security policy and educate users accordingly and maintian

Md.Arifur Rahman Arif
من قبل Md.Arifur Rahman Arif , Sr.Officer , Metro Knitting & Dyeing Mills Ltd.

Use Virus Protection SoftwareDon't open unknown email attachmentsUse regular backup of your critical dataMake boot diskUse Firewall programAuthenticate usersImplement Security Policy in your networkKeep an inventory of your software and hardware and make a list of all the devices.SCAN TCP/UDP services

zouhoor AL-hubaishi
من قبل zouhoor AL-hubaishi , Manager , gulf girl centre for fun education

we have many ways to make the network safe

we must first make the security to all layers of network

physical layer security

data link layer security

network layer security

transport layer security

session layer security

application layer security and so on

and we must make security as alyers

security for important data

security for client

security for servers

security for devices like switches ,routers, firewalls, ids, ips, coat goat, proxy and so on....

security for software like office ,application and so on.....

security for operation system.....

so must take security in every stage of our system  and network

 

There are various computer network threats and the measures of securing the network will differ accordingly

  1. Man in the Middle Attacks requires encryption method where private and public keys are used are known only by the sender and the receiver, this avoids attackers from intercepting with data in transit since they cannot decrypt the data and does not know the decryption key
  2. Firewalls help to protect the internal private network form the outside network, they allow or disallow incoming and outgoing messages, by analyzing the sender of the message
  3. Honeypots are also used create a mirror of the actual system and is used to fake hackers into thinking that the system facing them is the actual system yet it is not, when hackers try to gain access, the software installed on the honeypot will intelligently collect information about the hacker and recommend ways of avoiding and take pro-active methods for future use
  4. Use of an encrypted private dedicated link which is separate from the public external network

Akmaluddin Khairzada
من قبل Akmaluddin Khairzada , Office Manager , Geo Chem Middle East Afghanistan

securing a computer network can be done by having a good antiviturs installed in your computer network, periodical backups and to follow baisc security rules.

ELHUSSEIN SALAH LABIB RADWAN ABU HAMMAM
من قبل ELHUSSEIN SALAH LABIB RADWAN ABU HAMMAM , Driver , نقابة السائقين

Update the firewall

Open port lock

Activation of the network shield in avast

Tiego Lekgoanyana
من قبل Tiego Lekgoanyana , IT Support , Newlook Primary School Lobatse

  • avoid direct contact of virus by enabiling firewalls.
  • installation of reliable and up to date anti viruses
  •  

Honorato Gonzales
من قبل Honorato Gonzales , Junior IT Field support specialist , Azadea

THere are many ways to secure your network below are the basic one's

 

- Firewalls

- Updated Anti-virus

- Updated windows system update

- password encryption

- network security policy

ahmed mohamed
من قبل ahmed mohamed , مهندس حاسوب , وزارة المالية والاقتصاد والقوي العاملة - مفوضية الاستثمار

By one of the following methods:-

1-Material and equipment insurance.

2-Install powerful antivirus and periodically update it.

3-Installation and updating of intrusion detection systems.

4-Installation of surveillance cameras.

5-Make a backup policy.

6-Use powerful systems to encrypt information sent.

7-Non-power hardware support.

8-Dissemination of education and security awareness.

 

sohail arshad
من قبل sohail arshad , Lab Attendant , comsats institute of information technalogy attock campus

  1. Firewalls help to protect the internal private network form the outside network, they allow or disallow incoming and outgoing messages, by analyzing the sender of the message

Mostley i should my securing a computer network  using a anti virus software.it is coomon uses for daily basies.

المزيد من الأسئلة المماثلة

هل تحتاج لمساعدة في كتابة سيرة ذاتية تحتوي على الكلمات الدلالية التي يبحث عنها أصحاب العمل؟