2. • Benetton Group is a global fashion brand.
• Benetton family who founded the company in 1965.
• Benetton has a network of over 6,500 stores in 120
countries.
• Benetton Group is one of the best-known fashion
companies in the world.
• 1st store in Belluno and 3yrs after in Paris.
3/26/2014 compton computers pvt. ltd. 2
3. • over 9,500 employees.
• Benetton has developed a network of small suppliers.
• Benetton is known for sponsorship of a number of
sports and for proactive and original “United Color”
publicity campaign.
3/26/2014 compton computers pvt. ltd. 3
4. 3/26/2014 compton computers pvt. ltd. 4
• Compton Computers Pvt. Ltd. is one of the leading IT Solution Provider & System
integrator in India.
• Compton has been in this industry from the last 17 years and with it comes 17
valuable years of customer belief.
• An ISO 9001 certified company with Core expertise in designing IT Solution around
Structured Cabling, Wired & Wireless Networks, Server Solutions, Storage and
Backup Solution, Data Security and Surveillance.
• Compton has done many turn-key projects, where it has integrated end-to-end
solutions and won many awards for its work.
• At Compton we concentrate on understanding our clients requirements, design his
solution, integrate complete solution for him, optimize it and then put a proactive
management approach. Right from designing, integration, optimizing and managing
Compton follows a methodological approach complying to all ISO standards.
5. • CRN xcellence Award- Best Private Cloud Deployment
in SME’s 2013
• CRN Xcellence award- Among India’s Best System
Integrators for the year 2012
• Emerson presents Critical Difference Partner Award.
• CRN Xcellence award- Top solution provider- server
and storage –north 2011
• CRN Xcellence award top solution provider-server and
storage –north 2010
• CRN Xcellence award-top integrated solution provider-
north zone 2009
3/26/2014 compton computers pvt. ltd. 5
6. •Understand security services.
•Be aware of vulnerabilities and threats.
•Realize why network security is necessary.
•What are the elements of a comprehensive security
program.
3/26/2014 compton computers pvt. ltd. 6
7. Network security architect has following problems:
1. Context Privacy
2. Data Authentication
3. Reliable data storage
3. Data loss/theft
4. Content filtering
5. Malware
6. Intrusion detection
3/26/2014 compton computers pvt. ltd. 7
8. Problems -
• It is cumbersome for users to specify for gain policies.
• once the data is on the server who can access the
hardware.
Solution –
• Faces:
o Data changes according to who is viewieng.
• Future Research:
o Determining what data can be used without being
able to infer data.
o Grabbing only enough data for application purpose
without sacrificing usability.
3/26/2014 compton computers pvt. ltd. 8
9. Problems -
• Any participant with an appropriately
configured device can report falsified data.
• Devices are controlled by users.
• Incentives to mask private information.
Solution –
• Redundancy:
o Task cloning
o Ground truth
3/26/2014 compton computers pvt. ltd. 9
10. Problems -
• Deals with tempered data during transit.
Solution –
• cryptography
o cryptographically enhanced error correcting techniques.
• Encryption:
o Encrypted data that shows if it has been tempered with.
3/26/2014 compton computers pvt. ltd. 10
11. It is an error condition in information system in which
information is destroyed by failures or neglect in storage
, transmission or processing
Prevention-
power failure- multi power circuits with battery back
up and a generator.
software and hardware failure- journaling file system
and RAID storage.
3/26/2014 compton computers pvt. ltd. 11
12. A device or software application that monitors network or
system activities or policy violation.
Detection Methods:
1. Signature based detection
2. Statistical anomaly based detection
3. Stateful protocol analysis detection
3/26/2014 compton computers pvt. ltd. 12
13. 1. Opening unsolicited e-mail attachments without
verifying their source and checking their content first.
2. Failing to install security patches especially for
microsoft office , microsoft internet explorer.
3. Installing screen savers or games from unknown
sources.
4. Not making and testing backups.
5. Using a modem while connected through a LAN
3/26/2014 compton computers pvt. ltd. 13
15. Have strong password
Use good anti viral product
Use good cryptography
Have good firewall
Have a back up system
Audit and monitor system and network
Have training and awareness program
Test your security frequently
3/26/2014 compton computers pvt. ltd. 15
16. A system or group of system that enforces an access
control policy between two networks
3/26/2014 compton computers pvt. ltd. 16
17. CYBEROAM-
• Provides user identity based network security
• It offers:
- network security solution
- Centralized security management
- Centralized visibility
• Global network security appliances provider, with a global
presence spanning more than 125 countries.
• We offer:
-cyberoam 300i
-cyberoam CR500ia
3/26/2014 compton computers pvt. ltd. 17
22. • The Internet works only because we implicitly trust
one another
• It is very easy to exploit this trust
• The same holds true for software
• It is important to stay on top of the latest security
advisories to know how to patch any security holes
3/26/2014 compton computers pvt. ltd. 22