start page | rating of books | rating of authors | reviews | copyrights

TCP/IP Network Administration

TCP/IP Network AdministrationSearch this book
Previous: 12.8 Words to the Wise Chapter 12
Network Security
Next: 13. Internet Information Resources
 

12.9 Summary

Network access and computer security work at cross-purposes. Attaching a computer to a network increases the security risks for that computer. Evaluate your security needs to determine what must be protected and how vigorously it must be protected. Develop a written site security policy that defines your procedures and documents the security duties and responsibilities of employees at all levels.

Network security is essentially good system security. Good user authentication, effective system monitoring, and well-trained system administrators provide the best security. Tools are available to help with these tasks. SSH, OPIE, Tripwire, COPS, SATAN, TCP Wrapper, encryption, and firewalls are all tools that can help.

Like troubleshooting, network security is an ongoing process. In the final chapter, we discuss another ongoing process - learning. Now we look at ways you can keep abreast of the most current information in network administration.


Previous: 12.8 Words to the Wise TCP/IP Network Administration Next: 13. Internet Information Resources
12.8 Words to the Wise Book Index 13. Internet Information Resources