SlideShare una empresa de Scribd logo
1 de 20
Presented by-
Anshika Mishra
Compton Computers Pvt. Ltd.
•
3/26/2014 compton computers pvt. ltd. 2
•Benetton Group is a global fashion brand.
• Benetton family who founded the company in 1965.
• Benetton has a network of over 6,500 stores in 120
countries.
• Benetton Group is one of the best-known fashion
companies in the world.
• 1st store in Belluno and 3yrs after in Paris.
3/26/2014 compton computers pvt. ltd. 3
• Compton Computers Pvt. Ltd. is one of the leading IT
Solution Provider & System integrator in India.
• Compton has been in this industry from the last 17
years and with it comes 17 valuable years of customer
belief.
• An ISO 9001 certified company with Core expertise in
designing IT Solution around Structured Cabling,
Wired & Wireless Networks, Server Solutions, Storage
and Backup Solution, Data Security and Surveillance.
3/26/2014 compton computers pvt. ltd. 4
• Compton has done many turn-key projects, where it
has integrated end-to-end solutions and won many
awards for its work.
• At Compton we concentrate on understanding our
clients requirements, design his solution, integrate
complete solution for him, optimize it and then put a
proactive management approach. Right from
designing, integration, optimizing and managing
Compton follows a methodological approach
complying to all ISO standards.
• CRN xcellence Award- Best Private Cloud Deployment
in SME’s 2013
• CRN Xcellence award- Among India’s Best System
Integrators for the year 2012
• Emerson presents Critical Difference Partner Award.
• CRN Xcellence award- Top solution provider- server
and storage –north 2011
• CRN Xcellence award top solution provider-server and
storage –north 2010
• CRN Xcellence award-top integrated solution provider-
north zone 2009
3/26/2014 compton computers pvt. ltd. 5
•Understand security services required by UCB.
•Be aware of vulnerabilities and threats.
•Realize why network security is necessary.
•What are the elements of a comprehensive security
program.
3/26/2014 compton computers pvt. ltd. 6
Internet Security?
Buffer Overflows
Viruses
3/26/2014 compton computers pvt. ltd. 7
Network security architect has following problems:
1. Data loss/theft
2. Content filtering
3. Malware
4. Intrusion detection
3/26/2014 compton computers pvt. ltd. 8
It is an error condition in information system in which
information is destroyed by failures or neglect in storage
, transmission or processing
Prevention-
• power failure- multi power circuits with battery back
up and a generator.
• software and hardware failure- journaling file system
and RAID storage.
3/26/2014 compton computers pvt. ltd. 9
A device or software application that monitors network or
system activities or policy violation.
Detection Methods:
1. Signature based detection
2. Statistical anomaly based detection
3. Stateful protocol analysis detection
3/26/2014 compton computers pvt. ltd. 10
A system or group of system that enforces an access
control policy between two networks
3/26/2014 compton computers pvt. ltd. 11
3/26/2014 compton computers pvt. ltd. 12
1. Opening unsolicited e-mail attachments without
verifying their source and checking their content first.
2. Failing to install security patches especially for
microsoft office , microsoft internet explorer.
3. Installing screen savers or games from unknown
sources.
4. Not making and testing backups.
5. Using a modem while connected through a LAN
3/26/2014 compton computers pvt. ltd. 13
 Have strong password
Use good anti viral product
Use good cryptography
Have good firewall
Have a back up system
Audit and monitor system and network
Have training and awareness program
Test your security frequently
3/26/2014 compton computers pvt. ltd. 14
CYBEROAM-
• Provides user identity based network security
• It offers:
- network security solution
- Centralized security management
- Centralized visibility
• Global network security appliances provider, with a global
presence spanning more than 125 countries.
• We offer:
-cyberoam CR300ING-XP
-cyberoam CR500ING-XP
3/26/2014 compton computers pvt. ltd. 15
Why is our solution best
It is a UTM (Unified Threat Management)
It can act as a gateway level anti-virus
Intrusion detection and prevention can be done
very effectively by using Cyberoam
Content filtering
Anti SPAM
VPN and other benifits
3/26/2014 compton computers pvt. ltd. 16
3/26/2014 compton computers pvt. ltd. 17
S.
No.
FEATURES CR 300ING-XP CR 500ING-XP
1. Max. no. of available ports 14 24
2. Copper GbE ports 6 8
3. Firewall Throughput(UDP) 12,000 18,000
4. Firewall Throughput(TCP) 9,500 16,000
5. New sessions/seconds 85,000 1,00,000
6. Antivirus throughput 2,600 3,500
7. IPS throughput 2,400 4,500
8. WAF protected throughput 900 850
9. No. of IP sec. tunnel 400 1,000
Assured Satisfaction
Low cost of operation
Best Outcome
Accuracy
Expediency
3/26/2014 compton computers pvt. ltd. 18
• The Internet works only because we implicitly trust
one another
• It is very easy to exploit this trust
• The same holds true for software
• It is important to stay on top of the latest security
advisories to know how to patch any security holes
3/26/2014 compton computers pvt. ltd. 19
3/26/2014 compton computers pvt. ltd. 20

Más contenido relacionado

Destacado

Test for gcfsi
Test for gcfsiTest for gcfsi
Test for gcfsi
cindymcqt
 

Destacado (12)

jump! Future Junkie report Litfest 2016
jump! Future Junkie report Litfest 2016jump! Future Junkie report Litfest 2016
jump! Future Junkie report Litfest 2016
 
Production Log - A2
Production Log - A2Production Log - A2
Production Log - A2
 
Energy Sector Competition in the Spotlight
Energy Sector Competition in the SpotlightEnergy Sector Competition in the Spotlight
Energy Sector Competition in the Spotlight
 
jump! goes to Dismaland rubberneck report
jump! goes to Dismaland rubberneck report jump! goes to Dismaland rubberneck report
jump! goes to Dismaland rubberneck report
 
Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?
 
Test for gcfsi
Test for gcfsiTest for gcfsi
Test for gcfsi
 
Học tiêng anh
Học tiêng anhHọc tiêng anh
Học tiêng anh
 
Gv ie application question l
Gv ie application question lGv ie application question l
Gv ie application question l
 
CUENTO INFANTIL "EL SUEÑO DE MAYKIN"
CUENTO INFANTIL "EL SUEÑO DE MAYKIN" CUENTO INFANTIL "EL SUEÑO DE MAYKIN"
CUENTO INFANTIL "EL SUEÑO DE MAYKIN"
 
OMalley_Profile
OMalley_ProfileOMalley_Profile
OMalley_Profile
 
Làm thế nào để hòa nhập tại nơi làm việc?
Làm thế nào để hòa nhập tại nơi làm việc?Làm thế nào để hòa nhập tại nơi làm việc?
Làm thế nào để hòa nhập tại nơi làm việc?
 
Harta ban indonesia ( tire solution ).pdf
Harta ban indonesia ( tire solution ).pdfHarta ban indonesia ( tire solution ).pdf
Harta ban indonesia ( tire solution ).pdf
 

Similar a Network security

Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+security
mysoria
 
Powersoft19 Overview - 2013
Powersoft19 Overview - 2013Powersoft19 Overview - 2013
Powersoft19 Overview - 2013
Huzaifa Saadat
 

Similar a Network security (20)

Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+security
 
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUsing Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training Sample
 
Panduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security SolutionPanduit Enteprise Network Infrastructure Security Solution
Panduit Enteprise Network Infrastructure Security Solution
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Amc presentation
Amc presentationAmc presentation
Amc presentation
 
20130917 the future of supply chain management - a strategic viewpoint - sa...
20130917   the future of supply chain management - a strategic viewpoint - sa...20130917   the future of supply chain management - a strategic viewpoint - sa...
20130917 the future of supply chain management - a strategic viewpoint - sa...
 
Powersoft19 Overview - 2013
Powersoft19 Overview - 2013Powersoft19 Overview - 2013
Powersoft19 Overview - 2013
 
January 2014 Minutes
January 2014 MinutesJanuary 2014 Minutes
January 2014 Minutes
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirementsClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
 
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...
Webinar: Microprocessadores 32 bits, suas principais aplicações no mercado br...
 
Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT Cloud
 
Juniper idp overview
Juniper idp overviewJuniper idp overview
Juniper idp overview
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 

Network security

  • 2. • 3/26/2014 compton computers pvt. ltd. 2 •Benetton Group is a global fashion brand. • Benetton family who founded the company in 1965. • Benetton has a network of over 6,500 stores in 120 countries. • Benetton Group is one of the best-known fashion companies in the world. • 1st store in Belluno and 3yrs after in Paris.
  • 3. 3/26/2014 compton computers pvt. ltd. 3 • Compton Computers Pvt. Ltd. is one of the leading IT Solution Provider & System integrator in India. • Compton has been in this industry from the last 17 years and with it comes 17 valuable years of customer belief. • An ISO 9001 certified company with Core expertise in designing IT Solution around Structured Cabling, Wired & Wireless Networks, Server Solutions, Storage and Backup Solution, Data Security and Surveillance.
  • 4. 3/26/2014 compton computers pvt. ltd. 4 • Compton has done many turn-key projects, where it has integrated end-to-end solutions and won many awards for its work. • At Compton we concentrate on understanding our clients requirements, design his solution, integrate complete solution for him, optimize it and then put a proactive management approach. Right from designing, integration, optimizing and managing Compton follows a methodological approach complying to all ISO standards.
  • 5. • CRN xcellence Award- Best Private Cloud Deployment in SME’s 2013 • CRN Xcellence award- Among India’s Best System Integrators for the year 2012 • Emerson presents Critical Difference Partner Award. • CRN Xcellence award- Top solution provider- server and storage –north 2011 • CRN Xcellence award top solution provider-server and storage –north 2010 • CRN Xcellence award-top integrated solution provider- north zone 2009 3/26/2014 compton computers pvt. ltd. 5
  • 6. •Understand security services required by UCB. •Be aware of vulnerabilities and threats. •Realize why network security is necessary. •What are the elements of a comprehensive security program. 3/26/2014 compton computers pvt. ltd. 6
  • 8. Network security architect has following problems: 1. Data loss/theft 2. Content filtering 3. Malware 4. Intrusion detection 3/26/2014 compton computers pvt. ltd. 8
  • 9. It is an error condition in information system in which information is destroyed by failures or neglect in storage , transmission or processing Prevention- • power failure- multi power circuits with battery back up and a generator. • software and hardware failure- journaling file system and RAID storage. 3/26/2014 compton computers pvt. ltd. 9
  • 10. A device or software application that monitors network or system activities or policy violation. Detection Methods: 1. Signature based detection 2. Statistical anomaly based detection 3. Stateful protocol analysis detection 3/26/2014 compton computers pvt. ltd. 10
  • 11. A system or group of system that enforces an access control policy between two networks 3/26/2014 compton computers pvt. ltd. 11
  • 13. 1. Opening unsolicited e-mail attachments without verifying their source and checking their content first. 2. Failing to install security patches especially for microsoft office , microsoft internet explorer. 3. Installing screen savers or games from unknown sources. 4. Not making and testing backups. 5. Using a modem while connected through a LAN 3/26/2014 compton computers pvt. ltd. 13
  • 14.  Have strong password Use good anti viral product Use good cryptography Have good firewall Have a back up system Audit and monitor system and network Have training and awareness program Test your security frequently 3/26/2014 compton computers pvt. ltd. 14
  • 15. CYBEROAM- • Provides user identity based network security • It offers: - network security solution - Centralized security management - Centralized visibility • Global network security appliances provider, with a global presence spanning more than 125 countries. • We offer: -cyberoam CR300ING-XP -cyberoam CR500ING-XP 3/26/2014 compton computers pvt. ltd. 15
  • 16. Why is our solution best It is a UTM (Unified Threat Management) It can act as a gateway level anti-virus Intrusion detection and prevention can be done very effectively by using Cyberoam Content filtering Anti SPAM VPN and other benifits 3/26/2014 compton computers pvt. ltd. 16
  • 17. 3/26/2014 compton computers pvt. ltd. 17 S. No. FEATURES CR 300ING-XP CR 500ING-XP 1. Max. no. of available ports 14 24 2. Copper GbE ports 6 8 3. Firewall Throughput(UDP) 12,000 18,000 4. Firewall Throughput(TCP) 9,500 16,000 5. New sessions/seconds 85,000 1,00,000 6. Antivirus throughput 2,600 3,500 7. IPS throughput 2,400 4,500 8. WAF protected throughput 900 850 9. No. of IP sec. tunnel 400 1,000
  • 18. Assured Satisfaction Low cost of operation Best Outcome Accuracy Expediency 3/26/2014 compton computers pvt. ltd. 18
  • 19. • The Internet works only because we implicitly trust one another • It is very easy to exploit this trust • The same holds true for software • It is important to stay on top of the latest security advisories to know how to patch any security holes 3/26/2014 compton computers pvt. ltd. 19