SlideShare a Scribd company logo
1 of 27
UNIFIED THREAT MANAGEMENT

NISHA MENON K
ROLL NO: 16
M-TECH
COMMUNICATION ENGINEERING
12/23/2013

1
OUTLINE
 INTRODUCTION
 THREATS

 FEATURES OF UTM
 TYPES OF UTM
 ADVANTAGES

 DISADVANTAGES
 NEXT GENERATION UTM
 CONCLUSION
12/23/2013

2
INTRODUCTION
Unified threat management (UTM) is a comprehensive solution
that has recently emerged in the network security industry.
.
A Unified Threat Management (UTM) can simplify management of
security strategy, with just one device taking the place of
multiple layers of legacy security hardware and software.
Additionally, UTM security solutions can be monitored and
configured from a single, centralized management console.

12/23/2013

3
Why UTM??

12/23/2013

4
Why UTM??
• UTM solutions emerged of the need to stem the increasing number
of
attacks
on
corporate
information
systems
via
hacking/cracking, viruses, worms - mostly an outcome of
blended threats and insider threats.
• Firms have been increasingly falling victim to attacks from cyber
hackers.
• Traditional security solutions which evolved to tackle specific
threats are usually more difficult to deploy, manage and update.
This increases operational complexities and overhead costs.

• Today's organizations demand an integrated approach to network
security and productivity that combines the features of traditional
technologies with the streamlined ease of use of UTM
12/23/2013

5
 UTM typically includes a firewall, antivirus software,

content filtering and a spam filter in a single
integrated package.

Content
filtering

Firewall
Antivirus

12/23/2013

6
THREATS
THREATS/ATTACKS

Spyware

12/23/2013

Application
Attacks

File based threats

Email viruses

7
Spyware/Adware
 Spyware is any software that utilizes a computer’s

Internet access without the host’s knowledge or
explicit permission
 Approximately 90% of computers have some form of

Spyware.
 Aids in gathering information:




12/23/2013

Browsing habits (sites visited, links clicked, etc.)
Data entered into forms (including account
names, passwords, text of Web forms and Web-based
email, etc.)
Key stokes and work habits
8
Application
Attacks

 Unpatched Servers:
 Servers do not get up to date

Buffer Overflow

patches

Malicious Hacker

 Attacker sends malicious code

through a buffer overflow
 Server is infected
 New users who access server get

infected

12/23/2013

9
File Based
Threats

 Example: Internet download
 Viruses and malicious code
File Server

infection:
 Peer to Peer

Corp Network

 Instant Messaging apps
 Shareware sites
 Compromised servers
 Legitimate corporations
 Web based email

 Threats pass through firewalls
 Once inside the network, others

are easily affected

12/23/2013

10
E-mail Viruses
 E-mail has become the primary

Corp Network

means for distributing threats
 Trojans are easy to deliver and
install
 HTML viruses (no user
intervention) with webmail
 E-mails with attachments
containing:
 java scripts and html scripts

12/23/2013

11
FEATURES OF UTM
FIREWALL INSPECTION
INTRUSION PREVENTION
URL FILTERING
ANTI-VIRUS
ANTI-SPAM
VIRTUAL PRIVATE NETWORK

12/23/2013

12
• FIREWALL INSPECTION
• A system designed to prevent unauthorized access to or from a
private network
• Firewalls can be implemented in both hardware and software, or a
combination of both.

12/23/2013

13
• INTRUSION PREVENTION
• Intrusion prevention systems (IPS), also known as intrusion detection
and prevention systems (IDPS)
•

Monitor network and/or system activities for malicious activity

• Identify malicious activity, log information about this activity, attempt to
block/stop it, and report it

12/23/2013

14
• URL FILTERING
URL filtering is strictly a client protection technology of UTM.
It can be used for both providing policy enforcement, such as limiting access
to what sites different users can access based on category and organizational
policy, as well as to act as another layer of security by limiting access to
potentially malicious sites.

12/23/2013

15
• ANTI-SPAM
• Unwanted e-mail messages, usually sent by commercial, malicious, or
fraudulent entities .
• The anti-spam feature examines transmitted e-mail messages to identify
spam.
• When the device detects a message seemed to be spam, it blocks the
e-mail message.

12/23/2013

16
• ANTI VIRUS

The UTM Appliance AntiVirus feature handles the
detection and removal of viruses.

12/23/2013

17
• VPN (VIRTUAL PRIVATE NETWORK)
Used to connect two or more private networks via the
internet

•Provides an encrypted tunnel
between the two private networks
•Usually cheaper than a private
leased line
•Once established and as long as the
encryption remains secure the VPN is
impervious to exploitation

12/23/2013

18
STANDARD - UTM
 Unified Threat Management

 Integration of
• Firewall
• Intrusion Prevention for blocking network
threats
• Anti-Virus for blocking file based threats
• Anti-Spyware for blocking Spyware
 Faster updates to the dynamic changing

threat environment and elimination of False
Positives
12/23/2013

19
Integrated Threat Protection in Action

Error message:
“Drops” copy of itself
on system and
attempts to propagate

“Innocent” Video Link:
Redirects to malicious Website

“Out of date” Flash player error:
“Download” malware file

Solution:
Integrated Web Filtering
Blocks access to malicious Website
Network Antivirus
Blocks download of virus
Intrusion Protection
Blocks the spread of the worm
12/23/2013

20
TYPES OF UTM

UTM
Hardware
based

12/23/2013

Software
based

21
ADVANTAGES
• REDUCED COMPLEXITY: Single security solution.
• SIMPLICITY : Avoidance of multiple software installation and
maintenance
• EASY MANAGEMENT
• LOW OPERATOR INTERACTION

• EASY TO TROUBLESHOOT

12/23/2013

22
DISADVANTAGES
o Single point of failure for network traffic
o Single point of compromise if the UTM has vulnerabilities
o Potential impact on latency and bandwidth when the UTM cannot keep
up with the traffic

12/23/2013

23
NEXT GENERATION - UTM
Identity-based UTM: provide discrete identity information
of each user in the network along with network log data.

They allow creation of identity-based network access policies for
individual users, delivering complete visibility and control on the
network activities.
Voice Over IP security
Instant Messaging
Worm protection
Expanded security
security to every corner of an organization’s network, from the core to
the perimeter and every point in between.

12/23/2013

24
CONCLUSION
• UTM is answer to new challenges in the “wild” Internet
• UTM is integrated solution with easy management
• UTM offers complete support for all users, whether they are at an
enterprise site or in between network zones-ensuring maximum
protection

12/23/2013

25
REFERENCE
[1] Ranjit Shrirang Nimbalkar , Dr. B. B. Meshram “Survey on Integrated
Management” International Journal of Engineering Research &
Technology (IJERT), Vol. 2, Issue 6, June - 2013
[2] U.R.Naik and P.R.Chandra, “Designing Highperformance
Networking Applications,” Intel Press, 2004.

12/23/2013

26
12/23/2013

27

More Related Content

What's hot

Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer networkpoorvavyas4
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewallMd Shihab
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshellHishan Shouketh
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applicationsNiyas Nazar
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Utm (unified threat management) security solutions
Utm (unified threat management) security solutionsUtm (unified threat management) security solutions
Utm (unified threat management) security solutionsAnthony Daniel
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security AttacksSajid Hasan
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 

What's hot (20)

Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Utm (unified threat management) security solutions
Utm (unified threat management) security solutionsUtm (unified threat management) security solutions
Utm (unified threat management) security solutions
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Web Security Attacks
Web Security AttacksWeb Security Attacks
Web Security Attacks
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Viewers also liked

Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat ManagementMilan Petrásek
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesElsa Cariello
 
Unified Threat Management Solutions
Unified Threat Management SolutionsUnified Threat Management Solutions
Unified Threat Management SolutionsKelvin Charles
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 
Sophos Certified Engineer
Sophos Certified EngineerSophos Certified Engineer
Sophos Certified EngineerFranklin Nsude
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Securityneoma329
 
Alphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 

Viewers also liked (15)

Unified Threat Management
Unified Threat ManagementUnified Threat Management
Unified Threat Management
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for Dummies
 
Unified Threat Management Solutions
Unified Threat Management SolutionsUnified Threat Management Solutions
Unified Threat Management Solutions
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Sophos Certified Engineer
Sophos Certified EngineerSophos Certified Engineer
Sophos Certified Engineer
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Alphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTM
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Firewall
Firewall Firewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to unified threat management by Nisha Menon K

Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionKerry Desberg
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptxlochanrajdahal
 
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalA guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalRishabh Dangwal
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityEditor IJMTER
 
How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...Cyber Security Infotech Pvt. Ltd.
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...ijcncs
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Lana Sorrels
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...SyvilMaeTapinit
 
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...VOROR
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 

Similar to unified threat management by Nisha Menon K (20)

Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...
Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...
Are You Wondering Why Your Organization Needs An Unified Threat Management Sy...
 
Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...
Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...
Are You Wondering Why Your Organization Needs a Unified Threat Management Sys...
 
Unlocking the Promise of UTM Protection
Unlocking the Promise of UTM ProtectionUnlocking the Promise of UTM Protection
Unlocking the Promise of UTM Protection
 
Network security
Network securityNetwork security
Network security
 
unit 2 IT security solution.pptx
unit 2 IT security solution.pptxunit 2 IT security solution.pptx
unit 2 IT security solution.pptx
 
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh DangwalA guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
A guide to Unified Threat Management Systems (UTMs) by Rishabh Dangwal
 
Prevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network Security
 
How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...How unified threat management (utm) can benefit your enterprise network envir...
How unified threat management (utm) can benefit your enterprise network envir...
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
 
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 

More from Nisha Menon K

High capacity optical
High capacity opticalHigh capacity optical
High capacity opticalNisha Menon K
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon kNisha Menon K
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kNisha Menon K
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless TechnologyNisha Menon K
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Nisha Menon K
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KNisha Menon K
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNisha Menon K
 

More from Nisha Menon K (10)

High capacity optical
High capacity opticalHigh capacity optical
High capacity optical
 
non line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon knon line of sight error detection in mobile communication by nisha menon k
non line of sight error detection in mobile communication by nisha menon k
 
cognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon kcognitive femtocell network by nisha menon k
cognitive femtocell network by nisha menon k
 
Future of Wireless Technology
Future of Wireless TechnologyFuture of Wireless Technology
Future of Wireless Technology
 
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat Delta encoding in data compression by Nisha Menon K studying mtech at fisat
Delta encoding in data compression by Nisha Menon K studying mtech at fisat
 
Turbo equalization
Turbo equalizationTurbo equalization
Turbo equalization
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
Noise models presented by Nisha Menon K
Noise models presented by Nisha Menon KNoise models presented by Nisha Menon K
Noise models presented by Nisha Menon K
 
Femtocells
FemtocellsFemtocells
Femtocells
 
Skinput
SkinputSkinput
Skinput
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

unified threat management by Nisha Menon K

  • 1. UNIFIED THREAT MANAGEMENT NISHA MENON K ROLL NO: 16 M-TECH COMMUNICATION ENGINEERING 12/23/2013 1
  • 2. OUTLINE  INTRODUCTION  THREATS  FEATURES OF UTM  TYPES OF UTM  ADVANTAGES  DISADVANTAGES  NEXT GENERATION UTM  CONCLUSION 12/23/2013 2
  • 3. INTRODUCTION Unified threat management (UTM) is a comprehensive solution that has recently emerged in the network security industry. . A Unified Threat Management (UTM) can simplify management of security strategy, with just one device taking the place of multiple layers of legacy security hardware and software. Additionally, UTM security solutions can be monitored and configured from a single, centralized management console. 12/23/2013 3
  • 5. Why UTM?? • UTM solutions emerged of the need to stem the increasing number of attacks on corporate information systems via hacking/cracking, viruses, worms - mostly an outcome of blended threats and insider threats. • Firms have been increasingly falling victim to attacks from cyber hackers. • Traditional security solutions which evolved to tackle specific threats are usually more difficult to deploy, manage and update. This increases operational complexities and overhead costs. • Today's organizations demand an integrated approach to network security and productivity that combines the features of traditional technologies with the streamlined ease of use of UTM 12/23/2013 5
  • 6.  UTM typically includes a firewall, antivirus software, content filtering and a spam filter in a single integrated package. Content filtering Firewall Antivirus 12/23/2013 6
  • 8. Spyware/Adware  Spyware is any software that utilizes a computer’s Internet access without the host’s knowledge or explicit permission  Approximately 90% of computers have some form of Spyware.  Aids in gathering information:    12/23/2013 Browsing habits (sites visited, links clicked, etc.) Data entered into forms (including account names, passwords, text of Web forms and Web-based email, etc.) Key stokes and work habits 8
  • 9. Application Attacks  Unpatched Servers:  Servers do not get up to date Buffer Overflow patches Malicious Hacker  Attacker sends malicious code through a buffer overflow  Server is infected  New users who access server get infected 12/23/2013 9
  • 10. File Based Threats  Example: Internet download  Viruses and malicious code File Server infection:  Peer to Peer Corp Network  Instant Messaging apps  Shareware sites  Compromised servers  Legitimate corporations  Web based email  Threats pass through firewalls  Once inside the network, others are easily affected 12/23/2013 10
  • 11. E-mail Viruses  E-mail has become the primary Corp Network means for distributing threats  Trojans are easy to deliver and install  HTML viruses (no user intervention) with webmail  E-mails with attachments containing:  java scripts and html scripts 12/23/2013 11
  • 12. FEATURES OF UTM FIREWALL INSPECTION INTRUSION PREVENTION URL FILTERING ANTI-VIRUS ANTI-SPAM VIRTUAL PRIVATE NETWORK 12/23/2013 12
  • 13. • FIREWALL INSPECTION • A system designed to prevent unauthorized access to or from a private network • Firewalls can be implemented in both hardware and software, or a combination of both. 12/23/2013 13
  • 14. • INTRUSION PREVENTION • Intrusion prevention systems (IPS), also known as intrusion detection and prevention systems (IDPS) • Monitor network and/or system activities for malicious activity • Identify malicious activity, log information about this activity, attempt to block/stop it, and report it 12/23/2013 14
  • 15. • URL FILTERING URL filtering is strictly a client protection technology of UTM. It can be used for both providing policy enforcement, such as limiting access to what sites different users can access based on category and organizational policy, as well as to act as another layer of security by limiting access to potentially malicious sites. 12/23/2013 15
  • 16. • ANTI-SPAM • Unwanted e-mail messages, usually sent by commercial, malicious, or fraudulent entities . • The anti-spam feature examines transmitted e-mail messages to identify spam. • When the device detects a message seemed to be spam, it blocks the e-mail message. 12/23/2013 16
  • 17. • ANTI VIRUS The UTM Appliance AntiVirus feature handles the detection and removal of viruses. 12/23/2013 17
  • 18. • VPN (VIRTUAL PRIVATE NETWORK) Used to connect two or more private networks via the internet •Provides an encrypted tunnel between the two private networks •Usually cheaper than a private leased line •Once established and as long as the encryption remains secure the VPN is impervious to exploitation 12/23/2013 18
  • 19. STANDARD - UTM  Unified Threat Management  Integration of • Firewall • Intrusion Prevention for blocking network threats • Anti-Virus for blocking file based threats • Anti-Spyware for blocking Spyware  Faster updates to the dynamic changing threat environment and elimination of False Positives 12/23/2013 19
  • 20. Integrated Threat Protection in Action Error message: “Drops” copy of itself on system and attempts to propagate “Innocent” Video Link: Redirects to malicious Website “Out of date” Flash player error: “Download” malware file Solution: Integrated Web Filtering Blocks access to malicious Website Network Antivirus Blocks download of virus Intrusion Protection Blocks the spread of the worm 12/23/2013 20
  • 22. ADVANTAGES • REDUCED COMPLEXITY: Single security solution. • SIMPLICITY : Avoidance of multiple software installation and maintenance • EASY MANAGEMENT • LOW OPERATOR INTERACTION • EASY TO TROUBLESHOOT 12/23/2013 22
  • 23. DISADVANTAGES o Single point of failure for network traffic o Single point of compromise if the UTM has vulnerabilities o Potential impact on latency and bandwidth when the UTM cannot keep up with the traffic 12/23/2013 23
  • 24. NEXT GENERATION - UTM Identity-based UTM: provide discrete identity information of each user in the network along with network log data. They allow creation of identity-based network access policies for individual users, delivering complete visibility and control on the network activities. Voice Over IP security Instant Messaging Worm protection Expanded security security to every corner of an organization’s network, from the core to the perimeter and every point in between. 12/23/2013 24
  • 25. CONCLUSION • UTM is answer to new challenges in the “wild” Internet • UTM is integrated solution with easy management • UTM offers complete support for all users, whether they are at an enterprise site or in between network zones-ensuring maximum protection 12/23/2013 25
  • 26. REFERENCE [1] Ranjit Shrirang Nimbalkar , Dr. B. B. Meshram “Survey on Integrated Management” International Journal of Engineering Research & Technology (IJERT), Vol. 2, Issue 6, June - 2013 [2] U.R.Naik and P.R.Chandra, “Designing Highperformance Networking Applications,” Intel Press, 2004. 12/23/2013 26