- Criminals may target your organisation's information systems, resulting in serious financial loss and damage to your business operations and reputation.
- Verify that the primary safeguards of your network and those of your individual systems are in place. See Managing Network Access Controls and Managing User Access.
- Identify the access points of your network layout, and verify that the current safeguards are operational.
- Consider the following network protection facilities, some of which offer multiple features:-
- Intrusion detection software which records attempted and successful access to your systems.
- Pattern (usage) analysis, which identifies changes in on-line activity that may indicate a criminal attack.
- Access control lists and facilities, which record certain activities for specific files, such as: read, write, execute, and delete.
- System based accounting records.
- Network usage analysis, which identifies application access and reports on user authorisation levels.
- Network packet sniffing software to detect attack origins.
- URL blockers, (e.g. your firewall) which prevent connection to specific, untrustworthy web sites and / or other computers.
- Word pattern usage analysis which can help e-mail system administrators track down breaches in e-mail policies.