|Network & Security
Glossary of Networking Terms
Sometimes it's not easy to work out the jargon when networks
are being discussed. Here's a short glossary on networking terms to assist
Use Public Wireless Networks
If you have a laptop
computer with wireless connectivity built-in or through an inserted
wireless network card, you can now surf the Web in some coffee
shops, airports, hotels, and even fast food restaurants using public
wireless networks, or WiFi. Here are three quick tips for enjoying
the convenience of WiFi and helping to protect your privacy.
your network see dead people?
A staff member in your company passes away. Weeks later, you
discover the dead staff member is still accessing email and
company intranet. It turns out that the staff members wife is simply
using her late husband's laptop to get online, never realizing that
she is signed on to your network under her husband's credentials.
While this scenario would be rare, it does illustrate the difficulty
of ensuring that user accounts are consistently and securely
provisioned and unprovisioned. I should be made a part of the HR
process to inform whoever looks after IT for the company so the
login is not usable.
Similar scenarios are common:
Of 334 respondents to a survey, nearly 65 percent answered yes to
the question "If an employee leaves or is fired, could account
information still exist in your directories when you remove that
person from your systems?"
Another problem is that employees will often share passwords and the
password of the employee who has left is possibly known to others.
Their account should at least be disabled. If you think that
password sharing is going on and you want to be sure, you can then
monitor the use of the user account and password in question.