Protective Controls

Network security involves specific protective controls that are added to a network.

Security controls are meant to stop unauthorized users from having unauthorized access to systems, or from compromising those systems. The purpose of security controls is to increase the effectiveness of the security measures employed by an organization and to protect the integrity of the network from intrusion and/or loss. Some types of security controls include physical and/or electronic protection systems; security alerts and alarms ; VPNs like the one at https://www.fortinet.com/products/vpn; authentication mechanisms; data encryption; firewalls; network traffic filters; network intrusion detection systems; and password protection.

Security controls and monitoring

The system administrator may use various methods to protect the confidentiality, integrity, and availability of information and systems, but does not need to monitor and maintain the security systems at all times. The system administrator does not have to monitor for the following:

  • User activity on the computer.
  • Password security or decryption.
  • The use of unauthorized user accounts.
  • Access to system files.

Access to confidential network or user information. The security system is not required for the following: Users who do not need the security system for their work. Users who have no need for monitoring or maintaining the security system. The system administrator is not required to ensure the security of user accounts. Accessing restricted information. Accessing a network drive. The security system is not required for any other reason.

In general, any person can access and use a computer without using a system administrator. This is true whether the person accesses the computer from a home computer, a business computer, or a remote computer. To prevent this kind of access, the security system must be in place. The security system must be available 24 hours a day, seven days a week. The person may request access from a system administrator by using the password that is required by the security system.

Leave a comment

Your email address will not be published. Required fields are marked *