Network security and viruses

Network administrators guide to dealing with network security and viruses.

The administrator often acts as the security officer of the network. It is your responsibility to investigate and

resolve unsuccessful login attempts, intruder detection lockouts, compromised passwords, viruses, spam and security policies.

Perform a security audit

  1. Use outside vendors to conduct and audit. This will ensure that there is no favoritism or politics in the results, and provide credibility with senior management. Ensure the vendor or contractor you use covers the items listed below as a minimum. Find out who will be conducting the audit and review resume and references from past audited companies. Ensure goals of the audit are adhered to.
  2. Assess physical security: Video monitoring, data and portable media handling, paper shredding methods and policies, physical layout and location of data center, security of LAN closets, cleaning crew access, key and access controls and logging and challenge the procedures.
  3. Assess network security: Proper segmentation of LAN and WAN, proper passwords, limited use of protocols -- only those necessary are installed, IDS systems within the organization, firewalls, redundancy and failover or clustering of servers, routers and switches, restricted us of dial-up anywhere in your organization – including prohibition of telnet or other unnecessary protocols.
  4. Application security: Encryption, default accounts renamed, deleted, changed passwords, all software and Web/email servers hardened, patched, updated and secured.
  5. Policy and procedures: Acceptable use policies, security incident handling procedures, incident escalations, remote access policy, firewall management policy, disaster recover policy. Security awareness training for all employees is a never-ending process.

This checklist was created by Doug Chick.

You have firewalls and antivirus software. You implement security patches regularly, and

Network administrators task list

Task 1: Design, install and evaluate network

Task 2: Perform and manage regular backups 

Task 3: Provide technical documentation and perform audits 

Task 4: Manage and troubleshoot network

Task 5: Security management and virus prevention  

even have IDS. You may think you're doing all you can to protect your network, but think again. Security dangers you're not even aware can be lurking in every corner of your network. This tip by Dave Piscitello offers 10 foolproof initiatives to boost your network security

Security policies
A well-designed security policy is a powerful tool in your network security arsenal. Using built-in tools found in Windows XP, you can create and enforce your own custom security policy for all of the systems in your network. In this tip Chris Cox shows you how to create and enforce your own custom security policy.

More resources for creating and enforcing security policies:

Network security tools

This was first published in March 2005

Dig deeper on LANs (Local Area Networks)

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close