Network Security Options are a collection of settings for network adapters and for the TCP/IP stack. These settings are configured in the registry and can be configured on a per-adapter basis or centrally for several adapters.
Central Configuration of Network Security Options
The network security options can be centrally configured using Group Policy. They can also be configured using the command and by using the Windows registry. Windows 2000 and Windows XP support centralized configuration of these settings, while Windows Server 2003 added more settings to those that could be centrally set.
Why Do I Need Network Security options?
Setting up the network security options allows you to reduce the risk of unauthorized access to your network. You can also set up the network security options so that users are not able to change certain settings or cause problems. You can also configure these settings so that they apply only to specific users and groups, or to all users and groups.
Background Information
Networking is the transport mechanism for information between computers. A computer on a network is called a host, while the other computers on the same network are called hosts. Hosts on a network communicate with each other by using TCP/IP. TCP/IP is a set of rules for computers to communicate with each other across a network.
Network security is an important issue today because many business companies rely heavily on their computer systems for critical functions such as accounting and inventory control, e-commerce, human resources and payroll control, order processing, shipping and receiving, telecommunications and customer service. Having an effective means of protecting your company’s IT infrastructure is essential for both your business operations and your company’s overall success.
Keep in mind when implementing network security:
A firewall
A firewall protects networks from unauthorized access from outside their boundaries. It ensures that only authorized personnel can access your internal networks through pre-defined connections. Firewalls inspect all traffic entering or leaving your corporate perimeter in order to protect your internal systems from attacks from hackers looking for vulnerable systems to gain unauthorized access (i.e., break in) or steal data such as credit card numbers or bank account numbers that unscrupulous employees may try to steal (i.e., embezzle).
“Firewall” is actually a misnomer; what it protects against is not the firewall itself, but the computers and networks behind it. A firewall is a form of access control system. It protects computers, not networks. Networks are usually protected by routers that perform packet filtering instead of firewalls, but the intent and result are the same.·
Network segmentation
Network segmentation is the logical separation of different parts of your network. There are two types of network segmentation: physical and logical. Physical network segmentation divides a network into physically separate networks to limit the spread of any potential network damage. Logical network segmentation creates smaller networks within a larger one to limit damage to one section of the overall network.
The value of standards
It is important to recognize the value of standards when implementing security policies, whether they are technical or procedural in nature. Standards are vital in establishing a security policy because they ensure that everyone understands what is required so that they can do what is necessary to secure the network. If you don’t have documented standards, then it’s almost impossible to enforce them consistently.
Network security is an ongoing process involving people, processes, technology, and change management activities designed to keep intruders out of your network and keep your sensitive information safe from unauthorized disclosure or modification.
Security policies
Security policies must be documented for each type of media used on your corporate networks (e-mail, Internet, intranet). Hence, security policies should also be reviewed regularly to ensure that they are consistent with best practices and current technologies.