SlideShare uma empresa Scribd logo
1 de 23
Presented by-
Anshika Mishra
Compton Computers Pvt. Ltd.
• Benetton Group is a global fashion brand.
• Benetton family who founded the company in 1965.
• Benetton has a network of over 6,500 stores in 120
countries.
• Benetton Group is one of the best-known fashion
companies in the world.
• 1st store in Belluno and 3yrs after in Paris.
3/26/2014 compton computers pvt. ltd. 2
• over 9,500 employees.
• Benetton has developed a network of small suppliers.
• Benetton is known for sponsorship of a number of
sports and for proactive and original “United Color”
publicity campaign.
3/26/2014 compton computers pvt. ltd. 3
3/26/2014 compton computers pvt. ltd. 4
• Compton Computers Pvt. Ltd. is one of the leading IT Solution Provider & System
integrator in India.
• Compton has been in this industry from the last 17 years and with it comes 17
valuable years of customer belief.
• An ISO 9001 certified company with Core expertise in designing IT Solution around
Structured Cabling, Wired & Wireless Networks, Server Solutions, Storage and
Backup Solution, Data Security and Surveillance.
• Compton has done many turn-key projects, where it has integrated end-to-end
solutions and won many awards for its work.
• At Compton we concentrate on understanding our clients requirements, design his
solution, integrate complete solution for him, optimize it and then put a proactive
management approach. Right from designing, integration, optimizing and managing
Compton follows a methodological approach complying to all ISO standards.
• CRN xcellence Award- Best Private Cloud Deployment
in SME’s 2013
• CRN Xcellence award- Among India’s Best System
Integrators for the year 2012
• Emerson presents Critical Difference Partner Award.
• CRN Xcellence award- Top solution provider- server
and storage –north 2011
• CRN Xcellence award top solution provider-server and
storage –north 2010
• CRN Xcellence award-top integrated solution provider-
north zone 2009
3/26/2014 compton computers pvt. ltd. 5
•Understand security services.
•Be aware of vulnerabilities and threats.
•Realize why network security is necessary.
•What are the elements of a comprehensive security
program.
3/26/2014 compton computers pvt. ltd. 6
Network security architect has following problems:
1. Context Privacy
2. Data Authentication
3. Reliable data storage
3. Data loss/theft
4. Content filtering
5. Malware
6. Intrusion detection
3/26/2014 compton computers pvt. ltd. 7
Problems -
• It is cumbersome for users to specify for gain policies.
• once the data is on the server who can access the
hardware.
Solution –
• Faces:
o Data changes according to who is viewieng.
• Future Research:
o Determining what data can be used without being
able to infer data.
o Grabbing only enough data for application purpose
without sacrificing usability.
3/26/2014 compton computers pvt. ltd. 8
Problems -
• Any participant with an appropriately
configured device can report falsified data.
• Devices are controlled by users.
• Incentives to mask private information.
Solution –
• Redundancy:
o Task cloning
o Ground truth
3/26/2014 compton computers pvt. ltd. 9
Problems -
• Deals with tempered data during transit.
Solution –
• cryptography
o cryptographically enhanced error correcting techniques.
• Encryption:
o Encrypted data that shows if it has been tempered with.
3/26/2014 compton computers pvt. ltd. 10
It is an error condition in information system in which
information is destroyed by failures or neglect in storage
, transmission or processing
Prevention-
 power failure- multi power circuits with battery back
up and a generator.
 software and hardware failure- journaling file system
and RAID storage.
3/26/2014 compton computers pvt. ltd. 11
A device or software application that monitors network or
system activities or policy violation.
Detection Methods:
1. Signature based detection
2. Statistical anomaly based detection
3. Stateful protocol analysis detection
3/26/2014 compton computers pvt. ltd. 12
1. Opening unsolicited e-mail attachments without
verifying their source and checking their content first.
2. Failing to install security patches especially for
microsoft office , microsoft internet explorer.
3. Installing screen savers or games from unknown
sources.
4. Not making and testing backups.
5. Using a modem while connected through a LAN
3/26/2014 compton computers pvt. ltd. 13
Sophistication
of HackerTools
Technical Knowledge
Required
High
Low 1980 1990 2000
3/26/2014 compton computers pvt. ltd. 14
 Have strong password
Use good anti viral product
Use good cryptography
Have good firewall
Have a back up system
Audit and monitor system and network
Have training and awareness program
Test your security frequently
3/26/2014 compton computers pvt. ltd. 15
A system or group of system that enforces an access
control policy between two networks
3/26/2014 compton computers pvt. ltd. 16
CYBEROAM-
• Provides user identity based network security
• It offers:
- network security solution
- Centralized security management
- Centralized visibility
• Global network security appliances provider, with a global
presence spanning more than 125 countries.
• We offer:
-cyberoam 300i
-cyberoam CR500ia
3/26/2014 compton computers pvt. ltd. 17
S.
No.
FEATURES CR300i CR500Ia
1. Copper GbE Ports 6 10
2. H/w bypass segment 1 2
3. Firewall throughput(UDP) 2600 Mbps 5000 Mbps
4. Firewall throughput(TCP) 1800 Mbps 3000 Mbps
5. Antivirus throughput 450 Mbps 750 Mbps
6. Back end servers supported 15 25
7. New sessions/seconds 15,000 25,000
8. Concurrent session 500,000 700,000
9. IPS throughput 850 1000
10. UTM throughput 350 550
3/26/2014 compton computers pvt. ltd. 18
Internet Security?
Buffer Overflows
Viruses
3/26/2014 compton computers pvt. ltd. 19
3/26/2014 compton computers pvt. ltd. 20
Assured Satisfaction
Low cost of operation
Best Outcome
Accuracy
Expediency
3/26/2014 compton computers pvt. ltd. 21
• The Internet works only because we implicitly trust
one another
• It is very easy to exploit this trust
• The same holds true for software
• It is important to stay on top of the latest security
advisories to know how to patch any security holes
3/26/2014 compton computers pvt. ltd. 22
3/26/2014 compton computers pvt. ltd. 23

Mais conteúdo relacionado

Mais procurados

Building secure, privacy aware, quality Wi-Fi coverage via cooperation
Building secure, privacy aware, quality Wi-Fi coverage via cooperationBuilding secure, privacy aware, quality Wi-Fi coverage via cooperation
Building secure, privacy aware, quality Wi-Fi coverage via cooperationKarri Huhtanen
 
Building city and nationwide Wi-Fi coverage via cooperation
Building city and nationwide Wi-Fi coverage via cooperationBuilding city and nationwide Wi-Fi coverage via cooperation
Building city and nationwide Wi-Fi coverage via cooperationKarri Huhtanen
 
Datasheet EnGenius EAP350
Datasheet EnGenius EAP350Datasheet EnGenius EAP350
Datasheet EnGenius EAP350EnGenius Europe
 

Mais procurados (6)

ccna
ccnaccna
ccna
 
Network Security
Network SecurityNetwork Security
Network Security
 
iZone Presentation
iZone PresentationiZone Presentation
iZone Presentation
 
Building secure, privacy aware, quality Wi-Fi coverage via cooperation
Building secure, privacy aware, quality Wi-Fi coverage via cooperationBuilding secure, privacy aware, quality Wi-Fi coverage via cooperation
Building secure, privacy aware, quality Wi-Fi coverage via cooperation
 
Building city and nationwide Wi-Fi coverage via cooperation
Building city and nationwide Wi-Fi coverage via cooperationBuilding city and nationwide Wi-Fi coverage via cooperation
Building city and nationwide Wi-Fi coverage via cooperation
 
Datasheet EnGenius EAP350
Datasheet EnGenius EAP350Datasheet EnGenius EAP350
Datasheet EnGenius EAP350
 

Destaque

Schedule Media Studies
Schedule Media Studies Schedule Media Studies
Schedule Media Studies Taylor Sabga
 
William blake pp
William blake ppWilliam blake pp
William blake pppattonjb
 
Fill This House - How to Help
Fill This House - How to HelpFill This House - How to Help
Fill This House - How to HelpJoe Matejka
 
jump! innovation leaders survey 2015
jump! innovation leaders survey 2015jump! innovation leaders survey 2015
jump! innovation leaders survey 2015jump! innovation
 
Activitati dedicate aniversarii a 10 ani de e twinning
Activitati dedicate aniversarii a 10 ani de e twinningActivitati dedicate aniversarii a 10 ani de e twinning
Activitati dedicate aniversarii a 10 ani de e twinningIuliana Ciubuc
 
shabu shabu restaurant in mumbai - Hai Bao
shabu shabu restaurant  in mumbai - Hai Baoshabu shabu restaurant  in mumbai - Hai Bao
shabu shabu restaurant in mumbai - Hai Baohaibaomumbai
 
Q1) In what ways does your media product use, develop or challenge forms and ...
Q1) In what ways does your media product use, develop or challenge forms and ...Q1) In what ways does your media product use, develop or challenge forms and ...
Q1) In what ways does your media product use, develop or challenge forms and ...Paige Armstrong
 
presentation
presentationpresentation
presentationetolipina
 
Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?Mywork.vn
 
Splunk for AWS (Bagels and Bytes)
Splunk for AWS (Bagels and Bytes)Splunk for AWS (Bagels and Bytes)
Splunk for AWS (Bagels and Bytes)Dominique Dessy
 

Destaque (14)

Schedule Media Studies
Schedule Media Studies Schedule Media Studies
Schedule Media Studies
 
UX un Tu
UX un TuUX un Tu
UX un Tu
 
William blake pp
William blake ppWilliam blake pp
William blake pp
 
Presentation1
Presentation1Presentation1
Presentation1
 
Fill This House - How to Help
Fill This House - How to HelpFill This House - How to Help
Fill This House - How to Help
 
jump! innovation leaders survey 2015
jump! innovation leaders survey 2015jump! innovation leaders survey 2015
jump! innovation leaders survey 2015
 
Activitati dedicate aniversarii a 10 ani de e twinning
Activitati dedicate aniversarii a 10 ani de e twinningActivitati dedicate aniversarii a 10 ani de e twinning
Activitati dedicate aniversarii a 10 ani de e twinning
 
OMalley_Profile
OMalley_ProfileOMalley_Profile
OMalley_Profile
 
Celulares
CelularesCelulares
Celulares
 
shabu shabu restaurant in mumbai - Hai Bao
shabu shabu restaurant  in mumbai - Hai Baoshabu shabu restaurant  in mumbai - Hai Bao
shabu shabu restaurant in mumbai - Hai Bao
 
Q1) In what ways does your media product use, develop or challenge forms and ...
Q1) In what ways does your media product use, develop or challenge forms and ...Q1) In what ways does your media product use, develop or challenge forms and ...
Q1) In what ways does your media product use, develop or challenge forms and ...
 
presentation
presentationpresentation
presentation
 
Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?Tại sao chúng ta phải làm việc?
Tại sao chúng ta phải làm việc?
 
Splunk for AWS (Bagels and Bytes)
Splunk for AWS (Bagels and Bytes)Splunk for AWS (Bagels and Bytes)
Splunk for AWS (Bagels and Bytes)
 

Semelhante a Anshika

Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyesThousandEyes
 
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUsing Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUniversity of the District of Columbia
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleContent Rules, Inc.
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxAngel Garcia
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdfPhiliphaHaldline
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
Discover the Power of ThousandEyes on Your Meraki MX
Discover the Power of ThousandEyes on Your Meraki MXDiscover the Power of ThousandEyes on Your Meraki MX
Discover the Power of ThousandEyes on Your Meraki MXThousandEyes
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtubeDhruv Sharma
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptxssuserf7cd2b
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securitymysoria
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC ProjectERPScan
 
Microsoft Outage Analysis
Microsoft Outage AnalysisMicrosoft Outage Analysis
Microsoft Outage AnalysisThousandEyes
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Eduardo Patrocinio
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?BCS ProSoft
 
Pmw2 k3ni 1-1b
Pmw2 k3ni 1-1bPmw2 k3ni 1-1b
Pmw2 k3ni 1-1bhariclant1
 

Semelhante a Anshika (20)

Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyes
 
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure SafetyUsing Integrated Security Systems to Accommodate Expansion and Ensure Safety
Using Integrated Security Systems to Accommodate Expansion and Ensure Safety
 
Security Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training SampleSecurity Design Considerations Module 3 - Training Sample
Security Design Considerations Module 3 - Training Sample
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
M1-C17-Armando una red.pptx
M1-C17-Armando una red.pptxM1-C17-Armando una red.pptx
M1-C17-Armando una red.pptx
 
17 - Building small network.pdf
17 - Building small network.pdf17 - Building small network.pdf
17 - Building small network.pdf
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
Discover the Power of ThousandEyes on Your Meraki MX
Discover the Power of ThousandEyes on Your Meraki MXDiscover the Power of ThousandEyes on Your Meraki MX
Discover the Power of ThousandEyes on Your Meraki MX
 
Amc presentation
Amc presentationAmc presentation
Amc presentation
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
ITN_Module_17.pptx
ITN_Module_17.pptxITN_Module_17.pptx
ITN_Module_17.pptx
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+security
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
 
Microsoft Outage Analysis
Microsoft Outage AnalysisMicrosoft Outage Analysis
Microsoft Outage Analysis
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
 
Pmw2 k3ni 1-1b
Pmw2 k3ni 1-1bPmw2 k3ni 1-1b
Pmw2 k3ni 1-1b
 

Anshika

  • 2. • Benetton Group is a global fashion brand. • Benetton family who founded the company in 1965. • Benetton has a network of over 6,500 stores in 120 countries. • Benetton Group is one of the best-known fashion companies in the world. • 1st store in Belluno and 3yrs after in Paris. 3/26/2014 compton computers pvt. ltd. 2
  • 3. • over 9,500 employees. • Benetton has developed a network of small suppliers. • Benetton is known for sponsorship of a number of sports and for proactive and original “United Color” publicity campaign. 3/26/2014 compton computers pvt. ltd. 3
  • 4. 3/26/2014 compton computers pvt. ltd. 4 • Compton Computers Pvt. Ltd. is one of the leading IT Solution Provider & System integrator in India. • Compton has been in this industry from the last 17 years and with it comes 17 valuable years of customer belief. • An ISO 9001 certified company with Core expertise in designing IT Solution around Structured Cabling, Wired & Wireless Networks, Server Solutions, Storage and Backup Solution, Data Security and Surveillance. • Compton has done many turn-key projects, where it has integrated end-to-end solutions and won many awards for its work. • At Compton we concentrate on understanding our clients requirements, design his solution, integrate complete solution for him, optimize it and then put a proactive management approach. Right from designing, integration, optimizing and managing Compton follows a methodological approach complying to all ISO standards.
  • 5. • CRN xcellence Award- Best Private Cloud Deployment in SME’s 2013 • CRN Xcellence award- Among India’s Best System Integrators for the year 2012 • Emerson presents Critical Difference Partner Award. • CRN Xcellence award- Top solution provider- server and storage –north 2011 • CRN Xcellence award top solution provider-server and storage –north 2010 • CRN Xcellence award-top integrated solution provider- north zone 2009 3/26/2014 compton computers pvt. ltd. 5
  • 6. •Understand security services. •Be aware of vulnerabilities and threats. •Realize why network security is necessary. •What are the elements of a comprehensive security program. 3/26/2014 compton computers pvt. ltd. 6
  • 7. Network security architect has following problems: 1. Context Privacy 2. Data Authentication 3. Reliable data storage 3. Data loss/theft 4. Content filtering 5. Malware 6. Intrusion detection 3/26/2014 compton computers pvt. ltd. 7
  • 8. Problems - • It is cumbersome for users to specify for gain policies. • once the data is on the server who can access the hardware. Solution – • Faces: o Data changes according to who is viewieng. • Future Research: o Determining what data can be used without being able to infer data. o Grabbing only enough data for application purpose without sacrificing usability. 3/26/2014 compton computers pvt. ltd. 8
  • 9. Problems - • Any participant with an appropriately configured device can report falsified data. • Devices are controlled by users. • Incentives to mask private information. Solution – • Redundancy: o Task cloning o Ground truth 3/26/2014 compton computers pvt. ltd. 9
  • 10. Problems - • Deals with tempered data during transit. Solution – • cryptography o cryptographically enhanced error correcting techniques. • Encryption: o Encrypted data that shows if it has been tempered with. 3/26/2014 compton computers pvt. ltd. 10
  • 11. It is an error condition in information system in which information is destroyed by failures or neglect in storage , transmission or processing Prevention-  power failure- multi power circuits with battery back up and a generator.  software and hardware failure- journaling file system and RAID storage. 3/26/2014 compton computers pvt. ltd. 11
  • 12. A device or software application that monitors network or system activities or policy violation. Detection Methods: 1. Signature based detection 2. Statistical anomaly based detection 3. Stateful protocol analysis detection 3/26/2014 compton computers pvt. ltd. 12
  • 13. 1. Opening unsolicited e-mail attachments without verifying their source and checking their content first. 2. Failing to install security patches especially for microsoft office , microsoft internet explorer. 3. Installing screen savers or games from unknown sources. 4. Not making and testing backups. 5. Using a modem while connected through a LAN 3/26/2014 compton computers pvt. ltd. 13
  • 14. Sophistication of HackerTools Technical Knowledge Required High Low 1980 1990 2000 3/26/2014 compton computers pvt. ltd. 14
  • 15.  Have strong password Use good anti viral product Use good cryptography Have good firewall Have a back up system Audit and monitor system and network Have training and awareness program Test your security frequently 3/26/2014 compton computers pvt. ltd. 15
  • 16. A system or group of system that enforces an access control policy between two networks 3/26/2014 compton computers pvt. ltd. 16
  • 17. CYBEROAM- • Provides user identity based network security • It offers: - network security solution - Centralized security management - Centralized visibility • Global network security appliances provider, with a global presence spanning more than 125 countries. • We offer: -cyberoam 300i -cyberoam CR500ia 3/26/2014 compton computers pvt. ltd. 17
  • 18. S. No. FEATURES CR300i CR500Ia 1. Copper GbE Ports 6 10 2. H/w bypass segment 1 2 3. Firewall throughput(UDP) 2600 Mbps 5000 Mbps 4. Firewall throughput(TCP) 1800 Mbps 3000 Mbps 5. Antivirus throughput 450 Mbps 750 Mbps 6. Back end servers supported 15 25 7. New sessions/seconds 15,000 25,000 8. Concurrent session 500,000 700,000 9. IPS throughput 850 1000 10. UTM throughput 350 550 3/26/2014 compton computers pvt. ltd. 18
  • 21. Assured Satisfaction Low cost of operation Best Outcome Accuracy Expediency 3/26/2014 compton computers pvt. ltd. 21
  • 22. • The Internet works only because we implicitly trust one another • It is very easy to exploit this trust • The same holds true for software • It is important to stay on top of the latest security advisories to know how to patch any security holes 3/26/2014 compton computers pvt. ltd. 22