security

Further Resources

Basic Networking Resources

  • Novices to the network world should check out the educational animated movie at the Warriors of the Net site. The Computer Networking section of WebJunction has many resources dedicated to understanding computer networks in libraries.

Monitoring the Performance of Your Network

In one sense, you already have an army of network monitors in your library. Every time something goes wrong, you probably get a few spontaneous alerts from patrons and colleagues. However, if you want preventive information and in­-depth analysis of what’s happening on your network, you need network monitoring software.

Creating Security Policies

Security policies provide the road map for how to protect your network. These guidelines include the acceptable use of technical resources, the security requirements and why a particular policy exists. Without the clear guidelines from a security policy, your library runs the risk of inconsistent implementation of security. The process of creating a security policy provides a unique opportunity to understand the details of your organization’s network.

Identifying Vulnerabilities and Risks on Your Network

A vulnerability is a weak spot in your network that might be exploited by a security threat. Risks are the potential consequences and impacts of unaddressed vulnerabilities. In other words, failing to do Windows Updates on your Web server is vulnerability. Some of the risks associated with that vulnerability include loss of data, hours or days of site downtime and the staff time needed to rebuild a server after it’s been compromised.

Introduction to Network Security

Managing security means understanding the risks and deciding how much risk is acceptable. Different levels of security are appropriate for different organizations. No network is 100 percent secure, so don’t aim for that level of protection. If you try to stay up­-to­-date on every new threat and every virus, you’ll soon be a quivering ball of anxiety and stress. Look for the major vulnerabilities that you can address with your existing resources.

Creative Commons License

This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License.