Prevention security improves the ability to discourage and stop unusual or malicious actions taking place in or around the computer network. As previously discussed prevention, although not as easy or as effective for internal security, is an essential part of security. As the threats that exist take 3 different forms, there are three different categories of prevention which are physical, data and activity prevention.

Physical threat prevention involves discouraging and stopping physical threats to the computer network, threats such as fire, water damage, theft, vandalism and any other physical threats that have a detrimental effect on the computer network. Some of the areas of physical threat prevention are fire extinguishers, computer security cases, door locks, access keys/cards and security guards although these are also useful in physical detection.

Data threat prevention involves discouraging and stopping data threats to the computer network, threats such as data theft, loss, corruption and any other data threats that have a detrimental effect on the data integrity on the computer network. Some of the areas of data threat prevention are data access controls, encryption, data removal and other forms of preventing security breaches involving data.

Activity threat prevention involves discouraging and stopping activity threats to the computer network, threats such as network activity, internet activity and any other activity threats that have a detrimental effect on the security of the computer network. Some of the areas of data threat prevention are IPS, Internet/Email control software, Endpoint Security and other forms of preventing security breaches involving activity.

Physical
Security Doors
Power surge protectors and UPS
USB & Drive Lockers
Biometrics
Security Guards & Personnel
Class C Fire Extinguishers
Server Cabinets, Computer Cases and Locks
Network Attached Storage
ID Swipe Cards
Cable Covers & Sheathing
Data
Passwords
Encryption
File/Folder Permissions
Data Removal
Digital Watermarking
Activity
Security Tokens
Endpoint Security
Services Access
Network Access Control
Email & IM Control Software
Router/Firewall Filtering
Internet Filtering Software
IDS/IPS