SlideShare a Scribd company logo
1 of 27
UNIFIED THREAT MANAGEMENT

NISHA MENON K
ROLL NO: 16
M-TECH
COMMUNICATION ENGINEERING
12/23/2013

1
OUTLINE
 INTRODUCTION
 THREATS

 FEATURES OF UTM
 TYPES OF UTM
 ADVANTAGES

 DISADVANTAGES
 NEXT GENERATION UTM
 CONCLUSION
12/23/2013

2
INTRODUCTION
Unified threat management (UTM) is a comprehensive solution
that has recently emerged in the network security industry.
.
A Unified Threat Management (UTM) can simplify management of
security strategy, with just one device taking the place of
multiple layers of legacy security hardware and software.
Additionally, UTM security solutions can be monitored and
configured from a single, centralized management console.

12/23/2013

3
Why UTM??

12/23/2013

4
Why UTM??
• UTM solutions emerged of the need to stem the increasing number
of
attacks
on
corporate
information
systems
via
hacking/cracking, viruses, worms - mostly an outcome of
blended threats and insider threats.
• Firms have been increasingly falling victim to attacks from cyber
hackers.
• Traditional security solutions which evolved to tackle specific
threats are usually more difficult to deploy, manage and update.
This increases operational complexities and overhead costs.

• Today's organizations demand an integrated approach to network
security and productivity that combines the features of traditional
technologies with the streamlined ease of use of UTM
12/23/2013

5
 UTM typically includes a firewall, antivirus software,

content filtering and a spam filter in a single
integrated package.

Content
filtering

Firewall
Antivirus

12/23/2013

6
THREATS
THREATS/ATTACKS

Spyware

12/23/2013

Application
Attacks

File based threats

Email viruses

7
Spyware/Adware
 Spyware is any software that utilizes a computer’s

Internet access without the host’s knowledge or
explicit permission
 Approximately 90% of computers have some form of

Spyware.
 Aids in gathering information:




12/23/2013

Browsing habits (sites visited, links clicked, etc.)
Data entered into forms (including account
names, passwords, text of Web forms and Web-based
email, etc.)
Key stokes and work habits
8
Application
Attacks

 Unpatched Servers:
 Servers do not get up to date

Buffer Overflow

patches

Malicious Hacker

 Attacker sends malicious code

through a buffer overflow
 Server is infected
 New users who access server get

infected

12/23/2013

9
File Based
Threats

 Example: Internet download
 Viruses and malicious code
File Server

infection:
 Peer to Peer

Corp Network

 Instant Messaging apps
 Shareware sites
 Compromised servers
 Legitimate corporations
 Web based email

 Threats pass through firewalls
 Once inside the network, others

are easily affected

12/23/2013

10
E-mail Viruses
 E-mail has become the primary

Corp Network

means for distributing threats
 Trojans are easy to deliver and
install
 HTML viruses (no user
intervention) with webmail
 E-mails with attachments
containing:
 java scripts and html scripts

12/23/2013

11
FEATURES OF UTM
FIREWALL INSPECTION
INTRUSION PREVENTION
URL FILTERING
ANTI-VIRUS
ANTI-SPAM
VIRTUAL PRIVATE NETWORK

12/23/2013

12
• FIREWALL INSPECTION
• A system designed to prevent unauthorized access to or from a
private network
• Firewalls can be implemented in both hardware and software, or a
combination of both.

12/23/2013

13
• INTRUSION PREVENTION
• Intrusion prevention systems (IPS), also known as intrusion detection
and prevention systems (IDPS)
•

Monitor network and/or system activities for malicious activity

• Identify malicious activity, log information about this activity, attempt to
block/stop it, and report it

12/23/2013

14
• URL FILTERING
URL filtering is strictly a client protection technology of UTM.
It can be used for both providing policy enforcement, such as limiting access
to what sites different users can access based on category and organizational
policy, as well as to act as another layer of security by limiting access to
potentially malicious sites.

12/23/2013

15
• ANTI-SPAM
• Unwanted e-mail messages, usually sent by commercial, malicious, or
fraudulent entities .
• The anti-spam feature examines transmitted e-mail messages to identify
spam.
• When the device detects a message seemed to be spam, it blocks the
e-mail message.

12/23/2013

16
• ANTI VIRUS

The UTM Appliance AntiVirus feature handles the
detection and removal of viruses.

12/23/2013

17
• VPN (VIRTUAL PRIVATE NETWORK)
Used to connect two or more private networks via the
internet

•Provides an encrypted tunnel
between the two private networks
•Usually cheaper than a private
leased line
•Once established and as long as the
encryption remains secure the VPN is
impervious to exploitation

12/23/2013

18
STANDARD - UTM
 Unified Threat Management

 Integration of
• Firewall
• Intrusion Prevention for blocking network
threats
• Anti-Virus for blocking file based threats
• Anti-Spyware for blocking Spyware
 Faster updates to the dynamic changing

threat environment and elimination of False
Positives
12/23/2013

19
Integrated Threat Protection in Action

Error message:
“Drops” copy of itself
on system and
attempts to propagate

“Innocent” Video Link:
Redirects to malicious Website

“Out of date” Flash player error:
“Download” malware file

Solution:
Integrated Web Filtering
Blocks access to malicious Website
Network Antivirus
Blocks download of virus
Intrusion Protection
Blocks the spread of the worm
12/23/2013

20
TYPES OF UTM

UTM
Hardware
based

12/23/2013

Software
based

21
ADVANTAGES
• REDUCED COMPLEXITY: Single security solution.
• SIMPLICITY : Avoidance of multiple software installation and
maintenance
• EASY MANAGEMENT
• LOW OPERATOR INTERACTION

• EASY TO TROUBLESHOOT

12/23/2013

22
DISADVANTAGES
o Single point of failure for network traffic
o Single point of compromise if the UTM has vulnerabilities
o Potential impact on latency and bandwidth when the UTM cannot keep
up with the traffic

12/23/2013

23
NEXT GENERATION - UTM
Identity-based UTM: provide discrete identity information
of each user in the network along with network log data.

They allow creation of identity-based network access policies for
individual users, delivering complete visibility and control on the
network activities.
Voice Over IP security
Instant Messaging
Worm protection
Expanded security
security to every corner of an organization’s network, from the core to
the perimeter and every point in between.

12/23/2013

24
CONCLUSION
• UTM is answer to new challenges in the “wild” Internet
• UTM is integrated solution with easy management
• UTM offers complete support for all users, whether they are at an
enterprise site or in between network zones-ensuring maximum
protection

12/23/2013

25
REFERENCE
[1] Ranjit Shrirang Nimbalkar , Dr. B. B. Meshram “Survey on Integrated
Management” International Journal of Engineering Research &
Technology (IJERT), Vol. 2, Issue 6, June - 2013
[2] U.R.Naik and P.R.Chandra, “Designing Highperformance
Networking Applications,” Intel Press, 2004.

12/23/2013

26
12/23/2013

27

More Related Content

What's hot

Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerabilityA. Shamel
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control ManagementNada G.Youssef
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation finalRizwan S
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsAnthony Daniel
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability AssesmentDedi Dwianto
 

What's hot (20)

Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control Management
 
Firewall
FirewallFirewall
Firewall
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Network security
Network securityNetwork security
Network security
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 

Viewers also liked

Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat ManagementMilan Petrásek
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)military
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesElsa Cariello
 
Unified Threat Management Solutions
Unified Threat Management SolutionsUnified Threat Management Solutions
Unified Threat Management SolutionsKelvin Charles
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 
Sophos Certified Engineer
Sophos Certified EngineerSophos Certified Engineer
Sophos Certified EngineerFranklin Nsude
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Securityneoma329
 
Alphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 

Viewers also liked (16)

Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 
UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for Dummies
 
Unified Threat Management Solutions
Unified Threat Management SolutionsUnified Threat Management Solutions
Unified Threat Management Solutions
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Sophos Certified Engineer
Sophos Certified EngineerSophos Certified Engineer
Sophos Certified Engineer
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Alphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTM
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Firewall
Firewall Firewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to unified threat management by Nisha Menon K

Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionKerry Desberg
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptxlochanrajdahal
 
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalA guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalRishabh Dangwal
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityEditor IJMTER
 
How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...Cyber Security Infotech Pvt. Ltd.
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...ijcncs
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Lana Sorrels
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...SyvilMaeTapinit
 
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...VOROR
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 

Similar to unified threat management by Nisha Menon K (20)

Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...
Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...
Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...
 
Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...
Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...
Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...
 
Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM Protection
 
Network security
Network securityNetwork security
Network security
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalA guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
 
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 

More from Nisha Menon K

High capacity optical
High capacity opticalHigh capacity optical
High capacity opticalNisha Menon K
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon kNisha Menon K
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kNisha Menon K
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless TechnologyNisha Menon K
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Nisha Menon K
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KNisha Menon K
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNisha Menon K
 

More from Nisha Menon K (10)

High capacity optical
High capacity opticalHigh capacity optical
High capacity optical
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon k
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon k
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless Technology
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
 
Turbo equalization
Turbo equalizationTurbo equalization
Turbo equalization
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon K
 
Femtocells
FemtocellsFemtocells
Femtocells
 
Skinput
SkinputSkinput
Skinput
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

unified threat management by Nisha Menon K

  • 1. UNIFIED THREAT MANAGEMENT NISHA MENON K ROLL NO: 16 M-TECH COMMUNICATION ENGINEERING 12/23/2013 1
  • 2. OUTLINE  INTRODUCTION  THREATS  FEATURES OF UTM  TYPES OF UTM  ADVANTAGES  DISADVANTAGES  NEXT GENERATION UTM  CONCLUSION 12/23/2013 2
  • 3. INTRODUCTION Unified threat management (UTM) is a comprehensive solution that has recently emerged in the network security industry. . A Unified Threat Management (UTM) can simplify management of security strategy, with just one device taking the place of multiple layers of legacy security hardware and software. Additionally, UTM security solutions can be monitored and configured from a single, centralized management console. 12/23/2013 3
  • 5. Why UTM?? • UTM solutions emerged of the need to stem the increasing number of attacks on corporate information systems via hacking/cracking, viruses, worms - mostly an outcome of blended threats and insider threats. • Firms have been increasingly falling victim to attacks from cyber hackers. • Traditional security solutions which evolved to tackle specific threats are usually more difficult to deploy, manage and update. This increases operational complexities and overhead costs. • Today's organizations demand an integrated approach to network security and productivity that combines the features of traditional technologies with the streamlined ease of use of UTM 12/23/2013 5
  • 6.  UTM typically includes a firewall, antivirus software, content filtering and a spam filter in a single integrated package. Content filtering Firewall Antivirus 12/23/2013 6
  • 8. Spyware/Adware  Spyware is any software that utilizes a computer’s Internet access without the host’s knowledge or explicit permission  Approximately 90% of computers have some form of Spyware.  Aids in gathering information:    12/23/2013 Browsing habits (sites visited, links clicked, etc.) Data entered into forms (including account names, passwords, text of Web forms and Web-based email, etc.) Key stokes and work habits 8
  • 9. Application Attacks  Unpatched Servers:  Servers do not get up to date Buffer Overflow patches Malicious Hacker  Attacker sends malicious code through a buffer overflow  Server is infected  New users who access server get infected 12/23/2013 9
  • 10. File Based Threats  Example: Internet download  Viruses and malicious code File Server infection:  Peer to Peer Corp Network  Instant Messaging apps  Shareware sites  Compromised servers  Legitimate corporations  Web based email  Threats pass through firewalls  Once inside the network, others are easily affected 12/23/2013 10
  • 11. E-mail Viruses  E-mail has become the primary Corp Network means for distributing threats  Trojans are easy to deliver and install  HTML viruses (no user intervention) with webmail  E-mails with attachments containing:  java scripts and html scripts 12/23/2013 11
  • 12. FEATURES OF UTM FIREWALL INSPECTION INTRUSION PREVENTION URL FILTERING ANTI-VIRUS ANTI-SPAM VIRTUAL PRIVATE NETWORK 12/23/2013 12
  • 13. • FIREWALL INSPECTION • A system designed to prevent unauthorized access to or from a private network • Firewalls can be implemented in both hardware and software, or a combination of both. 12/23/2013 13
  • 14. • INTRUSION PREVENTION • Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS) • Monitor network and/or system activities for malicious activity • Identify malicious activity, log information about this activity, attempt to block/stop it, and report it 12/23/2013 14
  • 15. • URL FILTERING URL filtering is strictly a client protection technology of UTM. It can be used for both providing policy enforcement, such as limiting access to what sites different users can access based on category and organizational policy, as well as to act as another layer of security by limiting access to potentially malicious sites. 12/23/2013 15
  • 16. • ANTI-SPAM • Unwanted e-mail messages, usually sent by commercial, malicious, or fraudulent entities . • The anti-spam feature examines transmitted e-mail messages to identify spam. • When the device detects a message seemed to be spam, it blocks the e-mail message. 12/23/2013 16
  • 17. • ANTI VIRUS The UTM Appliance AntiVirus feature handles the detection and removal of viruses. 12/23/2013 17
  • 18. • VPN (VIRTUAL PRIVATE NETWORK) Used to connect two or more private networks via the internet •Provides an encrypted tunnel between the two private networks •Usually cheaper than a private leased line •Once established and as long as the encryption remains secure the VPN is impervious to exploitation 12/23/2013 18
  • 19. STANDARD - UTM  Unified Threat Management  Integration of • Firewall • Intrusion Prevention for blocking network threats • Anti-Virus for blocking file based threats • Anti-Spyware for blocking Spyware  Faster updates to the dynamic changing threat environment and elimination of False Positives 12/23/2013 19
  • 20. Integrated Threat Protection in Action Error message: “Drops” copy of itself on system and attempts to propagate “Innocent” Video Link: Redirects to malicious Website “Out of date” Flash player error: “Download” malware file Solution: Integrated Web Filtering Blocks access to malicious Website Network Antivirus Blocks download of virus Intrusion Protection Blocks the spread of the worm 12/23/2013 20
  • 22. ADVANTAGES • REDUCED COMPLEXITY: Single security solution. • SIMPLICITY : Avoidance of multiple software installation and maintenance • EASY MANAGEMENT • LOW OPERATOR INTERACTION • EASY TO TROUBLESHOOT 12/23/2013 22
  • 23. DISADVANTAGES o Single point of failure for network traffic o Single point of compromise if the UTM has vulnerabilities o Potential impact on latency and bandwidth when the UTM cannot keep up with the traffic 12/23/2013 23
  • 24. NEXT GENERATION - UTM Identity-based UTM: provide discrete identity information of each user in the network along with network log data. They allow creation of identity-based network access policies for individual users, delivering complete visibility and control on the network activities. Voice Over IP security Instant Messaging Worm protection Expanded security security to every corner of an organization’s network, from the core to the perimeter and every point in between. 12/23/2013 24
  • 25. CONCLUSION • UTM is answer to new challenges in the “wild” Internet • UTM is integrated solution with easy management • UTM offers complete support for all users, whether they are at an enterprise site or in between network zones-ensuring maximum protection 12/23/2013 25
  • 26. REFERENCE [1] Ranjit Shrirang Nimbalkar , Dr. B. B. Meshram “Survey on Integrated Management” International Journal of Engineering Research & Technology (IJERT), Vol. 2, Issue 6, June - 2013 [2] U.R.Naik and P.R.Chandra, “Designing Highperformance Networking Applications,” Intel Press, 2004. 12/23/2013 26