Methods to ensure the security of networks

Firewalls

See firewall

Anti-virus software

Anti-virus software is utility software that protects computer systems from many different types of malware listed here.

Password and Network user policies

Password and network user policies have some similarities with ICT Code of Conduct. Businesses will requires users to adhere to these policies to ensure the security of the network. A password policy may state users must use a minimum number of characters (uppercase, lowercases, numbers and symbols), that they never share their password with anyone, that the password has to be updated every 6 months, and that 2-factor authentication must be used with third party websites. The policy may list other things, such as users are not allowed to install software from unknown sources, that anti-virus software must be installed and kept up to date, and users should not download files not related to work so the bandwidth is not used up.

Authentication

Authentication verifies a user or system is allowed access to a computer system and/or network. This can take many forms, such as a password (pin number), a username and password (email), bio-metric (finger print, facial recognition, voice recognition) and digital signatures. Authentication often involves encryption during parts of the authentication process, but not all of it. For example typing a pin in is not encrypted (people can watch), but the movement and processing of the pin data would be encrypted.

Encryption

See Encryption