SlideShare une entreprise Scribd logo
1  sur  20
Presented by-
Anshika Mishra
Compton Computers Pvt. Ltd.
•
3/26/2014 compton computers pvt. ltd. 2
•Benetton Group is a global fashion brand.
• Benetton family who founded the company in 1965.
• Benetton has a network of over 6,500 stores in 120
countries.
• Benetton Group is one of the best-known fashion
companies in the world.
• 1st store in Belluno and 3yrs after in Paris.
3/26/2014 compton computers pvt. ltd. 3
• Compton Computers Pvt. Ltd. is one of the leading IT
Solution Provider & System integrator in India.
• Compton has been in this industry from the last 17
years and with it comes 17 valuable years of customer
belief.
• An ISO 9001 certified company with Core expertise in
designing IT Solution around Structured Cabling,
Wired & Wireless Networks, Server Solutions, Storage
and Backup Solution, Data Security and Surveillance.
3/26/2014 compton computers pvt. ltd. 4
• Compton has done many turn-key projects, where it
has integrated end-to-end solutions and won many
awards for its work.
• At Compton we concentrate on understanding our
clients requirements, design his solution, integrate
complete solution for him, optimize it and then put a
proactive management approach. Right from
designing, integration, optimizing and managing
Compton follows a methodological approach
complying to all ISO standards.
• CRN xcellence Award- Best Private Cloud Deployment
in SME’s 2013
• CRN Xcellence award- Among India’s Best System
Integrators for the year 2012
• Emerson presents Critical Difference Partner Award.
• CRN Xcellence award- Top solution provider- server
and storage –north 2011
• CRN Xcellence award top solution provider-server and
storage –north 2010
• CRN Xcellence award-top integrated solution provider-
north zone 2009
3/26/2014 compton computers pvt. ltd. 5
•Understand security services required by UCB.
•Be aware of vulnerabilities and threats.
•Realize why network security is necessary.
•What are the elements of a comprehensive security
program.
3/26/2014 compton computers pvt. ltd. 6
Internet Security?
Buffer Overflows
Viruses
3/26/2014 compton computers pvt. ltd. 7
Network security architect has following problems:
1. Data loss/theft
2. Content filtering
3. Malware
4. Intrusion detection
3/26/2014 compton computers pvt. ltd. 8
It is an error condition in information system in which
information is destroyed by failures or neglect in storage
, transmission or processing
Prevention-
• power failure- multi power circuits with battery back
up and a generator.
• software and hardware failure- journaling file system
and RAID storage.
3/26/2014 compton computers pvt. ltd. 9
A device or software application that monitors network or
system activities or policy violation.
Detection Methods:
1. Signature based detection
2. Statistical anomaly based detection
3. Stateful protocol analysis detection
3/26/2014 compton computers pvt. ltd. 10
A system or group of system that enforces an access
control policy between two networks
3/26/2014 compton computers pvt. ltd. 11
3/26/2014 compton computers pvt. ltd. 12
1. Opening unsolicited e-mail attachments without
verifying their source and checking their content first.
2. Failing to install security patches especially for
microsoft office , microsoft internet explorer.
3. Installing screen savers or games from unknown
sources.
4. Not making and testing backups.
5. Using a modem while connected through a LAN
3/26/2014 compton computers pvt. ltd. 13
 Have strong password
Use good anti viral product
Use good cryptography
Have good firewall
Have a back up system
Audit and monitor system and network
Have training and awareness program
Test your security frequently
3/26/2014 compton computers pvt. ltd. 14
CYBEROAM-
• Provides user identity based network security
• It offers:
- network security solution
- Centralized security management
- Centralized visibility
• Global network security appliances provider, with a global
presence spanning more than 125 countries.
• We offer:
-cyberoam CR300ING-XP
-cyberoam CR500ING-XP
3/26/2014 compton computers pvt. ltd. 15
Why is our solution best
It is a UTM (Unified Threat Management)
It can act as a gateway level anti-virus
Intrusion detection and prevention can be done
very effectively by using Cyberoam
Content filtering
Anti SPAM
VPN and other benifits
3/26/2014 compton computers pvt. ltd. 16
3/26/2014 compton computers pvt. ltd. 17
S.
No.
FEATURES CR 300ING-XP CR 500ING-XP
1. Max. no. of available ports 14 24
2. Copper GbE ports 6 8
3. Firewall Throughput(UDP) 12,000 18,000
4. Firewall Throughput(TCP) 9,500 16,000
5. New sessions/seconds 85,000 1,00,000
6. Antivirus throughput 2,600 3,500
7. IPS throughput 2,400 4,500
8. WAF protected throughput 900 850
9. No. of IP sec. tunnel 400 1,000
Assured Satisfaction
Low cost of operation
Best Outcome
Accuracy
Expediency
3/26/2014 compton computers pvt. ltd. 18
• The Internet works only because we implicitly trust
one another
• It is very easy to exploit this trust
• The same holds true for software
• It is important to stay on top of the latest security
advisories to know how to patch any security holes
3/26/2014 compton computers pvt. ltd. 19
3/26/2014 compton computers pvt. ltd. 20

Contenu connexe

En vedette

jump! Future Junkie report Litfest 2016
jump! Future Junkie report Litfest 2016jump! Future Junkie report Litfest 2016
jump! Future Junkie report Litfest 2016jump! innovation
 
Production Log - A2
Production Log - A2Production Log - A2
Production Log - A2Taylor Sabga
 
Energy Sector Competition in the Spotlight
Energy Sector Competition in the SpotlightEnergy Sector Competition in the Spotlight
Energy Sector Competition in the SpotlightBlpLaw1
 
jump! goes to Dismaland rubberneck report
jump! goes to Dismaland rubberneck report jump! goes to Dismaland rubberneck report
jump! goes to Dismaland rubberneck report jump! innovation
 
Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?Mywork.vn
 
Test for gcfsi
Test for gcfsiTest for gcfsi
Test for gcfsicindymcqt
 
Học tiêng anh
Học tiêng anhHọc tiêng anh
Học tiêng anhLethang
 
Làm thế nào để hòa nhập tại nơi làm việc?
Làm thế nào để hòa nhập tại nơi làm việc?Làm thế nào để hòa nhập tại nơi làm việc?
Làm thế nào để hòa nhập tại nơi làm việc?Mywork.vn
 
Harta ban indonesia ( tire solution ).pdf
Harta ban indonesia ( tire solution ).pdfHarta ban indonesia ( tire solution ).pdf
Harta ban indonesia ( tire solution ).pdfchakimuddin
 

En vedette (12)

jump! Future Junkie report Litfest 2016
jump! Future Junkie report Litfest 2016jump! Future Junkie report Litfest 2016
jump! Future Junkie report Litfest 2016
 
Production Log - A2
Production Log - A2Production Log - A2
Production Log - A2
 
Energy Sector Competition in the Spotlight
Energy Sector Competition in the SpotlightEnergy Sector Competition in the Spotlight
Energy Sector Competition in the Spotlight
 
jump! goes to Dismaland rubberneck report
jump! goes to Dismaland rubberneck report jump! goes to Dismaland rubberneck report
jump! goes to Dismaland rubberneck report
 
Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?
 
Test for gcfsi
Test for gcfsiTest for gcfsi
Test for gcfsi
 
Học tiêng anh
Học tiêng anhHọc tiêng anh
Học tiêng anh
 
Gv ie application question l
Gv ie application question lGv ie application question l
Gv ie application question l
 
CUENTO INFANTIL "EL SUEÑO DE MAYKIN"
CUENTO INFANTIL "EL SUEÑO DE MAYKIN" CUENTO INFANTIL "EL SUEÑO DE MAYKIN"
CUENTO INFANTIL "EL SUEÑO DE MAYKIN"
 
OMalley_Profile
OMalley_ProfileOMalley_Profile
OMalley_Profile
 
Làm thế nào để hòa nhập tại nơi làm việc?
Làm thế nào để hòa nhập tại nơi làm việc?Làm thế nào để hòa nhập tại nơi làm việc?
Làm thế nào để hòa nhập tại nơi làm việc?
 
Harta ban indonesia ( tire solution ).pdf
Harta ban indonesia ( tire solution ).pdfHarta ban indonesia ( tire solution ).pdf
Harta ban indonesia ( tire solution ).pdf
 

Similaire à Network security

Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securitymysoria
 
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUsing Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUniversity of the District of Columbia
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleContent Rules, Inc.
 
Panduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 PresentationAmy McMullin
 
20130917 the future of supply chain management - a strategic viewpoint - sa...
20130917   the future of supply chain management - a strategic viewpoint - sa...20130917   the future of supply chain management - a strategic viewpoint - sa...
20130917 the future of supply chain management - a strategic viewpoint - sa...Thorsten Schroeer
 
Powersoft19 Overview - 2013
Powersoft19 Overview - 2013Powersoft19 Overview - 2013
Powersoft19 Overview - 2013Huzaifa Saadat
 
January 2014 Minutes
January 2014 MinutesJanuary 2014 Minutes
January 2014 MinutesCM-UG.com
 
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...Embarcados
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT CloudPeterNiblett
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 

Similaire à Network security (20)

Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+security
 
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUsing Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training Sample
 
Panduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security Solution
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Amc presentation
Amc presentationAmc presentation
Amc presentation
 
20130917 the future of supply chain management - a strategic viewpoint - sa...
20130917   the future of supply chain management - a strategic viewpoint - sa...20130917   the future of supply chain management - a strategic viewpoint - sa...
20130917 the future of supply chain management - a strategic viewpoint - sa...
 
Powersoft19 Overview - 2013
Powersoft19 Overview - 2013Powersoft19 Overview - 2013
Powersoft19 Overview - 2013
 
January 2014 Minutes
January 2014 MinutesJanuary 2014 Minutes
January 2014 Minutes
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirementsClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
 
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...
 
Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT Cloud
 
Juniper idp overview
Juniper idp overviewJuniper idp overview
Juniper idp overview
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 

Dernier

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Dernier (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Network security

  • 2. • 3/26/2014 compton computers pvt. ltd. 2 •Benetton Group is a global fashion brand. • Benetton family who founded the company in 1965. • Benetton has a network of over 6,500 stores in 120 countries. • Benetton Group is one of the best-known fashion companies in the world. • 1st store in Belluno and 3yrs after in Paris.
  • 3. 3/26/2014 compton computers pvt. ltd. 3 • Compton Computers Pvt. Ltd. is one of the leading IT Solution Provider & System integrator in India. • Compton has been in this industry from the last 17 years and with it comes 17 valuable years of customer belief. • An ISO 9001 certified company with Core expertise in designing IT Solution around Structured Cabling, Wired & Wireless Networks, Server Solutions, Storage and Backup Solution, Data Security and Surveillance.
  • 4. 3/26/2014 compton computers pvt. ltd. 4 • Compton has done many turn-key projects, where it has integrated end-to-end solutions and won many awards for its work. • At Compton we concentrate on understanding our clients requirements, design his solution, integrate complete solution for him, optimize it and then put a proactive management approach. Right from designing, integration, optimizing and managing Compton follows a methodological approach complying to all ISO standards.
  • 5. • CRN xcellence Award- Best Private Cloud Deployment in SME’s 2013 • CRN Xcellence award- Among India’s Best System Integrators for the year 2012 • Emerson presents Critical Difference Partner Award. • CRN Xcellence award- Top solution provider- server and storage –north 2011 • CRN Xcellence award top solution provider-server and storage –north 2010 • CRN Xcellence award-top integrated solution provider- north zone 2009 3/26/2014 compton computers pvt. ltd. 5
  • 6. •Understand security services required by UCB. •Be aware of vulnerabilities and threats. •Realize why network security is necessary. •What are the elements of a comprehensive security program. 3/26/2014 compton computers pvt. ltd. 6
  • 8. Network security architect has following problems: 1. Data loss/theft 2. Content filtering 3. Malware 4. Intrusion detection 3/26/2014 compton computers pvt. ltd. 8
  • 9. It is an error condition in information system in which information is destroyed by failures or neglect in storage , transmission or processing Prevention- • power failure- multi power circuits with battery back up and a generator. • software and hardware failure- journaling file system and RAID storage. 3/26/2014 compton computers pvt. ltd. 9
  • 10. A device or software application that monitors network or system activities or policy violation. Detection Methods: 1. Signature based detection 2. Statistical anomaly based detection 3. Stateful protocol analysis detection 3/26/2014 compton computers pvt. ltd. 10
  • 11. A system or group of system that enforces an access control policy between two networks 3/26/2014 compton computers pvt. ltd. 11
  • 13. 1. Opening unsolicited e-mail attachments without verifying their source and checking their content first. 2. Failing to install security patches especially for microsoft office , microsoft internet explorer. 3. Installing screen savers or games from unknown sources. 4. Not making and testing backups. 5. Using a modem while connected through a LAN 3/26/2014 compton computers pvt. ltd. 13
  • 14.  Have strong password Use good anti viral product Use good cryptography Have good firewall Have a back up system Audit and monitor system and network Have training and awareness program Test your security frequently 3/26/2014 compton computers pvt. ltd. 14
  • 15. CYBEROAM- • Provides user identity based network security • It offers: - network security solution - Centralized security management - Centralized visibility • Global network security appliances provider, with a global presence spanning more than 125 countries. • We offer: -cyberoam CR300ING-XP -cyberoam CR500ING-XP 3/26/2014 compton computers pvt. ltd. 15
  • 16. Why is our solution best It is a UTM (Unified Threat Management) It can act as a gateway level anti-virus Intrusion detection and prevention can be done very effectively by using Cyberoam Content filtering Anti SPAM VPN and other benifits 3/26/2014 compton computers pvt. ltd. 16
  • 17. 3/26/2014 compton computers pvt. ltd. 17 S. No. FEATURES CR 300ING-XP CR 500ING-XP 1. Max. no. of available ports 14 24 2. Copper GbE ports 6 8 3. Firewall Throughput(UDP) 12,000 18,000 4. Firewall Throughput(TCP) 9,500 16,000 5. New sessions/seconds 85,000 1,00,000 6. Antivirus throughput 2,600 3,500 7. IPS throughput 2,400 4,500 8. WAF protected throughput 900 850 9. No. of IP sec. tunnel 400 1,000
  • 18. Assured Satisfaction Low cost of operation Best Outcome Accuracy Expediency 3/26/2014 compton computers pvt. ltd. 18
  • 19. • The Internet works only because we implicitly trust one another • It is very easy to exploit this trust • The same holds true for software • It is important to stay on top of the latest security advisories to know how to patch any security holes 3/26/2014 compton computers pvt. ltd. 19