Basic Networking Resources
In one sense, you already have an army of network monitors in your library. Every time something goes wrong, you probably get a few spontaneous alerts from patrons and colleagues. However, if you want preventive information and in-depth analysis of what’s happening on your network, you need network monitoring software.
Security policies provide the road map for how to protect your network. These guidelines include the acceptable use of technical resources, the security requirements and why a particular policy exists. Without the clear guidelines from a security policy, your library runs the risk of inconsistent implementation of security. The process of creating a security policy provides a unique opportunity to understand the details of your organization’s network.
A vulnerability is a weak spot in your network that might be exploited by a security threat. Risks are the potential consequences and impacts of unaddressed vulnerabilities. In other words, failing to do Windows Updates on your Web server is vulnerability. Some of the risks associated with that vulnerability include loss of data, hours or days of site downtime and the staff time needed to rebuild a server after it’s been compromised.
Managing security means understanding the risks and deciding how much risk is acceptable. Different levels of security are appropriate for different organizations. No network is 100 percent secure, so don’t aim for that level of protection. If you try to stay up-to-date on every new threat and every virus, you’ll soon be a quivering ball of anxiety and stress. Look for the major vulnerabilities that you can address with your existing resources.