Guidelines for Protecting Your
Network
Prevent anyone other than a network
administrator from opening or changing the
system files
Monitor the network for unauthorized access
or change
n
Process of monitoring a network for unauthorized
access to its devices is known as
intrusion
detection