In this section I shall discuss two major approaches used to restrict access to networks – passwords and firewalls.