Network Security

Protecting computer networks requires the implementation and maintenance of various security measures. Hackers and disenchanted employees are not the only threats to video surveillance systems, devices and data. Poor procedures and processes, ignorance of policy, lack of security awareness, and inappropriate physical access to systems increases risks. Effective and efficient security plans include overlapping measures within the computer network.

Physical Security

The physical types of network security provide protection from fire, unauthorized access, and/or natural disasters. Restrict physical access to systems, routers, firewalls, etc. by combining the use of high quality locks with secondary verification systems, such as biometric scanners. Security guards, video monitoring and alarms are other ways to help keep areas secure. Password-protect and monitor physical access to all systems to ensure that only authorized user’s access data. Invest in fire detection and waterless fire suppression systems to protect data and equipment from damage.

Perimeter Protection

Perimeter protection refers to the devices that separate your network from the rest of the world. Firewalls are the most commonly implemented perimeter security devices. Application and appliance-based firewalls block certain types of data from entering and leaving your network using standard and user-defined filters. Another important part of perimeter security is the implementation of encryption and protocols to protect the wireless network from unauthorized access.


Scanners, sniffers and analysis tools give the trained administrator insight regarding system vulnerabilities. Many hackers use these tools to find weaknesses in network security. Port scanners reveal open ports, which may lead to the discovery of unnecessary or compromising services or applications. Monitoring keeps those responsible for network security informed about the types of data and network events that take place on the network. Baselines are established over time during routine scanning and monitoring. Deviations from the baseline are clues to new and possibly compromising events on the network.


Network Security Hardening Guide