When you put a computer on a network, you add an access route to the computer, and you�ll want that route to be secure. User validation and protections on files and other objects are sufficient for standard-level security, but for high-level security you�ll need to make sure the network itself is secure, or in some cases isolate the computer completely. The two risks from network connections are other network users and unauthorized network taps. If everyone on the network needs to access your secure computer, you will probably prefer to include the computer in the network to make it easier for these people to access data on the computer. If the network is entirely contained in a secure building, the risk of unauthorized taps is minimized or eliminated. If the cabling must pass through unsecured areas, use optical fiber links rather than twisted pair to foil attempts to tap the wire and collect transmitted data. If your installation needs access to the Internet, be aware of the security issues involved in providing access to�and from�the Internet community. Chapter 2, �Server Security on the Internet,� in the Windows NT Server Internet Guide contains information on using network topology to provide security.