Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

What are different ways of securing a computer network?

user-image
Question added by Mark Delmo Lorenzo , fire protection technician , reda hazard control
Date Posted: 2017/04/01
ifthiquar hussain
by ifthiquar hussain , IT Manager , Moevenpick Resort Al Nawras Jeddah

Apply company IT security policy and educate users accordingly and maintian

Md.Arifur Rahman Arif
by Md.Arifur Rahman Arif , Sr.Officer , Metro Knitting & Dyeing Mills Ltd.

Use Virus Protection SoftwareDon't open unknown email attachmentsUse regular backup of your critical dataMake boot diskUse Firewall programAuthenticate usersImplement Security Policy in your networkKeep an inventory of your software and hardware and make a list of all the devices.SCAN TCP/UDP services

zouhoor AL-hubaishi
by zouhoor AL-hubaishi , Manager , gulf girl centre for fun education

we have many ways to make the network safe

we must first make the security to all layers of network

physical layer security

data link layer security

network layer security

transport layer security

session layer security

application layer security and so on

and we must make security as alyers

security for important data

security for client

security for servers

security for devices like switches ,routers, firewalls, ids, ips, coat goat, proxy and so on....

security for software like office ,application and so on.....

security for operation system.....

so must take security in every stage of our system  and network

 

There are various computer network threats and the measures of securing the network will differ accordingly

  1. Man in the Middle Attacks requires encryption method where private and public keys are used are known only by the sender and the receiver, this avoids attackers from intercepting with data in transit since they cannot decrypt the data and does not know the decryption key
  2. Firewalls help to protect the internal private network form the outside network, they allow or disallow incoming and outgoing messages, by analyzing the sender of the message
  3. Honeypots are also used create a mirror of the actual system and is used to fake hackers into thinking that the system facing them is the actual system yet it is not, when hackers try to gain access, the software installed on the honeypot will intelligently collect information about the hacker and recommend ways of avoiding and take pro-active methods for future use
  4. Use of an encrypted private dedicated link which is separate from the public external network

Akmaluddin Khairzada
by Akmaluddin Khairzada , Office Manager , Geo Chem Middle East Afghanistan

securing a computer network can be done by having a good antiviturs installed in your computer network, periodical backups and to follow baisc security rules.

ELHUSSEIN SALAH LABIB RADWAN ABU HAMMAM
by ELHUSSEIN SALAH LABIB RADWAN ABU HAMMAM , Driver , نقابة السائقين

Update the firewall

Open port lock

Activation of the network shield in avast

Tiego Lekgoanyana
by Tiego Lekgoanyana , IT Support , Newlook Primary School Lobatse

  • avoid direct contact of virus by enabiling firewalls.
  • installation of reliable and up to date anti viruses
  •  

Honorato Gonzales
by Honorato Gonzales , Junior IT Field support specialist , Azadea

THere are many ways to secure your network below are the basic one's

 

- Firewalls

- Updated Anti-virus

- Updated windows system update

- password encryption

- network security policy

ahmed mohamed
by ahmed mohamed , مهندس حاسوب , وزارة المالية والاقتصاد والقوي العاملة - مفوضية الاستثمار

By one of the following methods:-

1-Material and equipment insurance.

2-Install powerful antivirus and periodically update it.

3-Installation and updating of intrusion detection systems.

4-Installation of surveillance cameras.

5-Make a backup policy.

6-Use powerful systems to encrypt information sent.

7-Non-power hardware support.

8-Dissemination of education and security awareness.

 

sohail arshad
by sohail arshad , Lab Attendant , comsats institute of information technalogy attock campus

  1. Firewalls help to protect the internal private network form the outside network, they allow or disallow incoming and outgoing messages, by analyzing the sender of the message

Mostley i should my securing a computer network  using a anti virus software.it is coomon uses for daily basies.

More Questions Like This

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.