Basic Cybersecurity Considerations
The important thing about security is to understand that security is a chain consisting of many components. Which components to implement in the network depends on both which security threats to address and what is considered the correct and balanced level of security for the network.
Physical security and upholding processes that support the organization’s security policies are perhaps the most important parts of the network security. Also important is the authorization of users, logging, firewalls, hardening of unused ports and the use of secure protocols.
Dependence between different security measures needs to be considered to get the most implemented action. For example, to get the most out of audit logging you are depending on good authorization and the opposite is also true.
Security in a network also depends on the security of its constituent nodes. Remember that the overall security of a network equals the security of the weakest node.