【正文】
is also used (. a fingerprint or retinal scan). Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the work users. Though effective to prevent unauthorized access, this ponent may fail to check potentially harmful content such as puter worms or Trojans being transmitted over the work. Antivirus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malware. An anomalybased intrusion detection system may also monitor the work and traffic for unexpected (. suspicious) content or behavior and other anomalies to protect resources, . from denial of service attacks or an employee accessing files at strange times. Individual events occurring on the work may be logged for audit purposes and for later high level analysis. 3. Security management Security Management for works is different for all kinds of situations. A small home or an office would only require basic security while large businesses will require high maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming. . Small homes 1. A basic firewall or a unified threat management system. 2. For Windows users, basic Antivirus software. An antispyware program would also be a good idea. There are many other types of antivirus or antispyware programs out there