Protecting the accessibility to important documents and files or directories into a computer network against "hacking" and misuse should always be safeguarded. If there are unauthorized changes to your system, this could be a breach within your networks' security. The best strategy for your home and business require several layering actions to ensure unwanted traffic does not come into your hardware and software. Security network controls that you want to consider access for any confidential information are: Proper identification, malware and spyware detection, firewall protection, and password authorization. These applications and concepts, if utilized properly, can preserve your network, and all that it holds.