• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Bcis Csm Chapter Three
 

Bcis Csm Chapter Three

on

  • 541 views

 

Statistics

Views

Total Views
541
Views on SlideShare
541
Embed Views
0

Actions

Likes
0
Downloads
8
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Bcis Csm Chapter Three Bcis Csm Chapter Three Presentation Transcript

    • BCIS Degree Course Communication Systems Management Session Three Network Security U Nyein Oo Senior Lecturer
    • Topics to be presented
      • Part One
      • Importance of Security
      • Preventing Disruption
      • Correcting Disruption
        • Disaster Recovery Plan
    • Network Security
      • Protection of networks and their services from unauthorized modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and there are no harmful side-effects.
      • Network security includes providing for data integrity.
    • Computer Virus
      • a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself.”
      • “ a virus can spread throughout a computer system or network using the authorizations of every user using it to infect their programs”.
    • Different types of Computer Virus
      • Macro virus
      • Worm
      • Trojan horse
      • Hybrids
      • Malware
      • Spam
      • Spyware
    • Preventive Action to Virus
      • Don't use file and print sharing unless you must
      • If you do use file sharing, use good passwords
      • Don't allow Windows to open .VBS(vb script)
      • or .WSF(Windows Script) files
      • Beware software of unknown origin
      • Forged E-mail Addresses
      • Use Anti-virus Software
      • To get More Help
      • To Find Security Patches
    • Anti-Virus Software
      • Nortan Antivirus ( www.symantec.com )
      • Mcafee Antivirus ( www.macfee.com )
      • Bitdeffender ( www.bitdeffender.com )
      • F-Secure ( www.f-secrure.com )
      • PC-cillin ( www.trendmicro.com )
      • E-safe…etc
    •  
    • criteria of anti-virus software.
      • Ease of Use
      • Effective at Identifying Viruses and Worms
      • Effective at Cleaning or Isolating Infected Files
      • Activity Reporting
      • Feature Set (Scanning Capabilities)
      • Ease of Installation and Setup
      • Help Documentation
    • DRP
      • A disaster recovery plan (DRP) - sometimes referred to as a business continuity plan (BCP) or business process contingency plan (BPCP) - describes how an organization is to deal with potential disasters.
      • Disaster recovery is becoming an increasingly important aspect of enterprise computing. As devices, systems, and networks become ever more complex, there are simply more things that can go wrong
    • DRP Planning
      • Program Description
      • Planning Scope and Plan Objectives
      • Project Organization and Staffing
      • Project Control
      • Schedule of Deliverables
      • Resource Requirements
    • Program Description
        • Pre-Planning Activities (Project Initiation)
        • Vulnerability Assessment and General Definition
        • Requirements
        • Business Impact Analysis
        • Detailed Definition of Requirements
        • Plan Development
        • Testing Program
        • Maintenance Program
        • Initial Plan Testing and Plan Implementation
    • Sample DRP
    •  
    • Common Network Security Threats
      • Malicious Threats
      • Unintentional Threats
      • Physical Threats
    • Malicious Threats
      • Software
      • Spoofing
      • Scanning
      • Eavesdropping(spying)
      • Spamming
      • Tunneling
    • Unintentional Threats
      • Maltfunction
      • Human Errors
    • Physical Threats
      • Fire
      • Water
      • Earthquake
      • Power Loss
      • Civil Disorder
      • Battle Damage