Firewall
Encryption
Authentication
MAC address filtering
Limiting access to the network to a set of devices
Ensuring that it is impossible for a casual user to read data held on the network
Stop outside connections to the network
Using passwords to restrict access to different areas of the network