SlideShare une entreprise Scribd logo
1  sur  20
Presented by-
Anshika Mishra
Compton Computers Pvt. Ltd.
•
3/26/2014 compton computers pvt. ltd. 2
•Benetton Group is a global fashion brand.
• Benetton family who founded the company in 1965.
• Benetton has a network of over 6,500 stores in 120
countries.
• Benetton Group is one of the best-known fashion
companies in the world.
• 1st store in Belluno and 3yrs after in Paris.
3/26/2014 compton computers pvt. ltd. 3
• Compton Computers Pvt. Ltd. is one of the leading IT
Solution Provider & System integrator in India.
• Compton has been in this industry from the last 17
years and with it comes 17 valuable years of customer
belief.
• An ISO 9001 certified company with Core expertise in
designing IT Solution around Structured Cabling,
Wired & Wireless Networks, Server Solutions, Storage
and Backup Solution, Data Security and Surveillance.
3/26/2014 compton computers pvt. ltd. 4
• Compton has done many turn-key projects, where it
has integrated end-to-end solutions and won many
awards for its work.
• At Compton we concentrate on understanding our
clients requirements, design his solution, integrate
complete solution for him, optimize it and then put a
proactive management approach. Right from
designing, integration, optimizing and managing
Compton follows a methodological approach
complying to all ISO standards.
• CRN xcellence Award- Best Private Cloud Deployment
in SME’s 2013
• CRN Xcellence award- Among India’s Best System
Integrators for the year 2012
• Emerson presents Critical Difference Partner Award.
• CRN Xcellence award- Top solution provider- server
and storage –north 2011
• CRN Xcellence award top solution provider-server and
storage –north 2010
• CRN Xcellence award-top integrated solution provider-
north zone 2009
3/26/2014 compton computers pvt. ltd. 5
•Understand security services required by UCB.
•Be aware of vulnerabilities and threats.
•Realize why network security is necessary.
•What are the elements of a comprehensive security
program.
3/26/2014 compton computers pvt. ltd. 6
Internet Security?
Buffer Overflows
Viruses
3/26/2014 compton computers pvt. ltd. 7
Network security architect has following problems:
1. Data loss/theft
2. Content filtering
3. Malware
4. Intrusion detection
3/26/2014 compton computers pvt. ltd. 8
It is an error condition in information system in which
information is destroyed by failures or neglect in storage
, transmission or processing
Prevention-
• power failure- multi power circuits with battery back
up and a generator.
• software and hardware failure- journaling file system
and RAID storage.
3/26/2014 compton computers pvt. ltd. 9
A device or software application that monitors network or
system activities or policy violation.
Detection Methods:
1. Signature based detection
2. Statistical anomaly based detection
3. Stateful protocol analysis detection
3/26/2014 compton computers pvt. ltd. 10
A system or group of system that enforces an access
control policy between two networks
3/26/2014 compton computers pvt. ltd. 11
3/26/2014 compton computers pvt. ltd. 12
1. Opening unsolicited e-mail attachments without
verifying their source and checking their content first.
2. Failing to install security patches especially for
microsoft office , microsoft internet explorer.
3. Installing screen savers or games from unknown
sources.
4. Not making and testing backups.
5. Using a modem while connected through a LAN
3/26/2014 compton computers pvt. ltd. 13
 Have strong password
Use good anti viral product
Use good cryptography
Have good firewall
Have a back up system
Audit and monitor system and network
Have training and awareness program
Test your security frequently
3/26/2014 compton computers pvt. ltd. 14
CYBEROAM-
• Provides user identity based network security
• It offers:
- network security solution
- Centralized security management
- Centralized visibility
• Global network security appliances provider, with a global
presence spanning more than 125 countries.
• We offer:
-cyberoam CR300ING-XP
-cyberoam CR500ING-XP
3/26/2014 compton computers pvt. ltd. 15
Why is our solution best
It is a UTM (Unified Threat Management)
It can act as a gateway level anti-virus
Intrusion detection and prevention can be done
very effectively by using Cyberoam
Content filtering
Anti SPAM
VPN and other benifits
3/26/2014 compton computers pvt. ltd. 16
3/26/2014 compton computers pvt. ltd. 17
S.
No.
FEATURES CR 300ING-XP CR 500ING-XP
1. Max. no. of available ports 14 24
2. Copper GbE ports 6 8
3. Firewall Throughput(UDP) 12,000 18,000
4. Firewall Throughput(TCP) 9,500 16,000
5. New sessions/seconds 85,000 1,00,000
6. Antivirus throughput 2,600 3,500
7. IPS throughput 2,400 4,500
8. WAF protected throughput 900 850
9. No. of IP sec. tunnel 400 1,000
Assured Satisfaction
Low cost of operation
Best Outcome
Accuracy
Expediency
3/26/2014 compton computers pvt. ltd. 18
• The Internet works only because we implicitly trust
one another
• It is very easy to exploit this trust
• The same holds true for software
• It is important to stay on top of the latest security
advisories to know how to patch any security holes
3/26/2014 compton computers pvt. ltd. 19
3/26/2014 compton computers pvt. ltd. 20

Contenu connexe

En vedette

jump! Future Junkie report Litfest 2016
jump! Future Junkie report Litfest 2016jump! Future Junkie report Litfest 2016
jump! Future Junkie report Litfest 2016jump! innovation
 
Production Log - A2
Production Log - A2Production Log - A2
Production Log - A2Taylor Sabga
 
Energy Sector Competition in the Spotlight
Energy Sector Competition in the SpotlightEnergy Sector Competition in the Spotlight
Energy Sector Competition in the SpotlightBlpLaw1
 
jump! goes to Dismaland rubberneck report
jump! goes to Dismaland rubberneck report jump! goes to Dismaland rubberneck report
jump! goes to Dismaland rubberneck report jump! innovation
 
Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?Mywork.vn
 
Test for gcfsi
Test for gcfsiTest for gcfsi
Test for gcfsicindymcqt
 
Học tiêng anh
Học tiêng anhHọc tiêng anh
Học tiêng anhLethang
 
Làm thế nào để hòa nhập tại nơi làm việc?
Làm thế nào để hòa nhập tại nơi làm việc?Làm thế nào để hòa nhập tại nơi làm việc?
Làm thế nào để hòa nhập tại nơi làm việc?Mywork.vn
 
Harta ban indonesia ( tire solution ).pdf
Harta ban indonesia ( tire solution ).pdfHarta ban indonesia ( tire solution ).pdf
Harta ban indonesia ( tire solution ).pdfchakimuddin
 

En vedette (12)

jump! Future Junkie report Litfest 2016
jump! Future Junkie report Litfest 2016jump! Future Junkie report Litfest 2016
jump! Future Junkie report Litfest 2016
 
Production Log - A2
Production Log - A2Production Log - A2
Production Log - A2
 
Energy Sector Competition in the Spotlight
Energy Sector Competition in the SpotlightEnergy Sector Competition in the Spotlight
Energy Sector Competition in the Spotlight
 
jump! goes to Dismaland rubberneck report
jump! goes to Dismaland rubberneck report jump! goes to Dismaland rubberneck report
jump! goes to Dismaland rubberneck report
 
Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?
 
Test for gcfsi
Test for gcfsiTest for gcfsi
Test for gcfsi
 
Học tiêng anh
Học tiêng anhHọc tiêng anh
Học tiêng anh
 
Gv ie application question l
Gv ie application question lGv ie application question l
Gv ie application question l
 
CUENTO INFANTIL "EL SUEÑO DE MAYKIN"
CUENTO INFANTIL "EL SUEÑO DE MAYKIN" CUENTO INFANTIL "EL SUEÑO DE MAYKIN"
CUENTO INFANTIL "EL SUEÑO DE MAYKIN"
 
OMalley_Profile
OMalley_ProfileOMalley_Profile
OMalley_Profile
 
Làm thế nào để hòa nhập tại nơi làm việc?
Làm thế nào để hòa nhập tại nơi làm việc?Làm thế nào để hòa nhập tại nơi làm việc?
Làm thế nào để hòa nhập tại nơi làm việc?
 
Harta ban indonesia ( tire solution ).pdf
Harta ban indonesia ( tire solution ).pdfHarta ban indonesia ( tire solution ).pdf
Harta ban indonesia ( tire solution ).pdf
 

Similaire à Network security

Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securitymysoria
 
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUsing Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUniversity of the District of Columbia
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleContent Rules, Inc.
 
Panduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 PresentationAmy McMullin
 
20130917 the future of supply chain management - a strategic viewpoint - sa...
20130917   the future of supply chain management - a strategic viewpoint - sa...20130917   the future of supply chain management - a strategic viewpoint - sa...
20130917 the future of supply chain management - a strategic viewpoint - sa...Thorsten Schroeer
 
Powersoft19 Overview - 2013
Powersoft19 Overview - 2013Powersoft19 Overview - 2013
Powersoft19 Overview - 2013Huzaifa Saadat
 
January 2014 Minutes
January 2014 MinutesJanuary 2014 Minutes
January 2014 MinutesCM-UG.com
 
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...Embarcados
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT CloudPeterNiblett
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 

Similaire à Network security (20)

Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+security
 
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUsing Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training Sample
 
Panduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security Solution
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Amc presentation
Amc presentationAmc presentation
Amc presentation
 
20130917 the future of supply chain management - a strategic viewpoint - sa...
20130917   the future of supply chain management - a strategic viewpoint - sa...20130917   the future of supply chain management - a strategic viewpoint - sa...
20130917 the future of supply chain management - a strategic viewpoint - sa...
 
Powersoft19 Overview - 2013
Powersoft19 Overview - 2013Powersoft19 Overview - 2013
Powersoft19 Overview - 2013
 
January 2014 Minutes
January 2014 MinutesJanuary 2014 Minutes
January 2014 Minutes
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirementsClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
 
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...
 
Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT Cloud
 
Juniper idp overview
Juniper idp overviewJuniper idp overview
Juniper idp overview
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 

Dernier

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Dernier (20)

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 

Network security

  • 2. • 3/26/2014 compton computers pvt. ltd. 2 •Benetton Group is a global fashion brand. • Benetton family who founded the company in 1965. • Benetton has a network of over 6,500 stores in 120 countries. • Benetton Group is one of the best-known fashion companies in the world. • 1st store in Belluno and 3yrs after in Paris.
  • 3. 3/26/2014 compton computers pvt. ltd. 3 • Compton Computers Pvt. Ltd. is one of the leading IT Solution Provider & System integrator in India. • Compton has been in this industry from the last 17 years and with it comes 17 valuable years of customer belief. • An ISO 9001 certified company with Core expertise in designing IT Solution around Structured Cabling, Wired & Wireless Networks, Server Solutions, Storage and Backup Solution, Data Security and Surveillance.
  • 4. 3/26/2014 compton computers pvt. ltd. 4 • Compton has done many turn-key projects, where it has integrated end-to-end solutions and won many awards for its work. • At Compton we concentrate on understanding our clients requirements, design his solution, integrate complete solution for him, optimize it and then put a proactive management approach. Right from designing, integration, optimizing and managing Compton follows a methodological approach complying to all ISO standards.
  • 5. • CRN xcellence Award- Best Private Cloud Deployment in SME’s 2013 • CRN Xcellence award- Among India’s Best System Integrators for the year 2012 • Emerson presents Critical Difference Partner Award. • CRN Xcellence award- Top solution provider- server and storage –north 2011 • CRN Xcellence award top solution provider-server and storage –north 2010 • CRN Xcellence award-top integrated solution provider- north zone 2009 3/26/2014 compton computers pvt. ltd. 5
  • 6. •Understand security services required by UCB. •Be aware of vulnerabilities and threats. •Realize why network security is necessary. •What are the elements of a comprehensive security program. 3/26/2014 compton computers pvt. ltd. 6
  • 8. Network security architect has following problems: 1. Data loss/theft 2. Content filtering 3. Malware 4. Intrusion detection 3/26/2014 compton computers pvt. ltd. 8
  • 9. It is an error condition in information system in which information is destroyed by failures or neglect in storage , transmission or processing Prevention- • power failure- multi power circuits with battery back up and a generator. • software and hardware failure- journaling file system and RAID storage. 3/26/2014 compton computers pvt. ltd. 9
  • 10. A device or software application that monitors network or system activities or policy violation. Detection Methods: 1. Signature based detection 2. Statistical anomaly based detection 3. Stateful protocol analysis detection 3/26/2014 compton computers pvt. ltd. 10
  • 11. A system or group of system that enforces an access control policy between two networks 3/26/2014 compton computers pvt. ltd. 11
  • 13. 1. Opening unsolicited e-mail attachments without verifying their source and checking their content first. 2. Failing to install security patches especially for microsoft office , microsoft internet explorer. 3. Installing screen savers or games from unknown sources. 4. Not making and testing backups. 5. Using a modem while connected through a LAN 3/26/2014 compton computers pvt. ltd. 13
  • 14.  Have strong password Use good anti viral product Use good cryptography Have good firewall Have a back up system Audit and monitor system and network Have training and awareness program Test your security frequently 3/26/2014 compton computers pvt. ltd. 14
  • 15. CYBEROAM- • Provides user identity based network security • It offers: - network security solution - Centralized security management - Centralized visibility • Global network security appliances provider, with a global presence spanning more than 125 countries. • We offer: -cyberoam CR300ING-XP -cyberoam CR500ING-XP 3/26/2014 compton computers pvt. ltd. 15
  • 16. Why is our solution best It is a UTM (Unified Threat Management) It can act as a gateway level anti-virus Intrusion detection and prevention can be done very effectively by using Cyberoam Content filtering Anti SPAM VPN and other benifits 3/26/2014 compton computers pvt. ltd. 16
  • 17. 3/26/2014 compton computers pvt. ltd. 17 S. No. FEATURES CR 300ING-XP CR 500ING-XP 1. Max. no. of available ports 14 24 2. Copper GbE ports 6 8 3. Firewall Throughput(UDP) 12,000 18,000 4. Firewall Throughput(TCP) 9,500 16,000 5. New sessions/seconds 85,000 1,00,000 6. Antivirus throughput 2,600 3,500 7. IPS throughput 2,400 4,500 8. WAF protected throughput 900 850 9. No. of IP sec. tunnel 400 1,000
  • 18. Assured Satisfaction Low cost of operation Best Outcome Accuracy Expediency 3/26/2014 compton computers pvt. ltd. 18
  • 19. • The Internet works only because we implicitly trust one another • It is very easy to exploit this trust • The same holds true for software • It is important to stay on top of the latest security advisories to know how to patch any security holes 3/26/2014 compton computers pvt. ltd. 19