SlideShare a Scribd company logo
1 of 10
Network Security
The Crucial Role in Protecting
Organizations Data
Analogy
General Solution at Application
Level
• Audit / Proactive hardening(securing)
- System must audit: status and configuration of all application
components
- perform security test and proactive hardening of the components
- detailed security audit reports: pre & post-deployment of
applications.
- Install all current patches.
- Change default passwords.
- Implement recommended security configurations.
• Real-Time Protection
• behavioral-based intrusion prevention system / automatic
protection provided by most antivirus, anti-spy ware, and other anti
mal ware programs.
• Detect, and block application–level attacks for which none of
signature scan and patch is known to (zero-day threats).
• Other names: Real-time protection / on-access scanning /
background guard / resident shield / auto-protect
• Multi-tier protection
• what? network services that are delivered using multiple
servers
• disaster recovery and backup: applies Recovery Point Objective
(RPO) and Recovery Time Objective (RTO)
• RPO : data lose
• RTP : time for disaster recovery online & fully functioned in place
of the production system.
• Distributed Management / Centralized
Reporting
• Task and responsibility to monitor and manage application &
database security across business units/geography boundary.
• Outsourcing: consultants, contractors, or business partners.
• Selective Encryption
• ‘last line’ of defense for the most sensitive data
• advantage: prevention of unauthorized access to data by legitimate
users
• Example:the ability of a database administrator to grant, revoke, or
change users’ access right that is within his job scope with the
restriction to copy, or do any changes to actual information in the
database such as users’ credit card number.
Network security

More Related Content

What's hot

Ceps departmental environment
Ceps departmental environmentCeps departmental environment
Ceps departmental environment
cepsuclan
 
Ken Brown's Resume.20160706
Ken Brown's Resume.20160706Ken Brown's Resume.20160706
Ken Brown's Resume.20160706
Ken Brown
 

What's hot (20)

Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008Prioritized Approach Twenty Critical Controls 2008
Prioritized Approach Twenty Critical Controls 2008
 
Continuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing RiskContinuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing Risk
 
Why Do We Need to Third-Party Security Solution?
Why Do We Need to Third-Party Security Solution?Why Do We Need to Third-Party Security Solution?
Why Do We Need to Third-Party Security Solution?
 
Lumension Security Solutions
Lumension Security SolutionsLumension Security Solutions
Lumension Security Solutions
 
Ceps departmental environment
Ceps departmental environmentCeps departmental environment
Ceps departmental environment
 
RMF Roles and Responsibilities (Part 1)
RMF Roles and Responsibilities (Part 1) RMF Roles and Responsibilities (Part 1)
RMF Roles and Responsibilities (Part 1)
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
Centraleyezer
CentraleyezerCentraleyezer
Centraleyezer
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life CycleUnderstanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
Understanding the Risk Management Framework & (ISC)2 CAP Module 4: Life Cycle
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...
 
Ken Brown's Resume.20160706
Ken Brown's Resume.20160706Ken Brown's Resume.20160706
Ken Brown's Resume.20160706
 
Tripwire.ppt
Tripwire.pptTripwire.ppt
Tripwire.ppt
 
Auditing information System
Auditing information SystemAuditing information System
Auditing information System
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: CategorizeUnderstanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
Connect security to your business with mc afee epo software
Connect security to your business with mc afee epo softwareConnect security to your business with mc afee epo software
Connect security to your business with mc afee epo software
 
NIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation ProcessNIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation Process
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
 
Procedural Controls
Procedural ControlsProcedural Controls
Procedural Controls
 

Viewers also liked

Un giorno di attesa
Un giorno di attesaUn giorno di attesa
Un giorno di attesa
LaEri
 
Schmitt ama 2.5 presentation
Schmitt   ama 2.5 presentationSchmitt   ama 2.5 presentation
Schmitt ama 2.5 presentation
jamiejacks
 
How can enjoy nutella
How can enjoy nutellaHow can enjoy nutella
How can enjoy nutella
cucuyc
 
Instruction for making a Midori Sour
Instruction for making a Midori SourInstruction for making a Midori Sour
Instruction for making a Midori Sour
LeeJunSeop
 
How to make a ‘mini bike’
How to make a ‘mini bike’How to make a ‘mini bike’
How to make a ‘mini bike’
cucuyc
 

Viewers also liked (18)

Comune di vicchio
Comune di vicchioComune di vicchio
Comune di vicchio
 
Surapong soponkij cluster growth and energy demand cld presentation
Surapong soponkij   cluster growth and energy demand cld presentationSurapong soponkij   cluster growth and energy demand cld presentation
Surapong soponkij cluster growth and energy demand cld presentation
 
La tecnología educativa como apoyo pedagógico
La tecnología educativa como apoyo pedagógicoLa tecnología educativa como apoyo pedagógico
La tecnología educativa como apoyo pedagógico
 
Un giorno di attesa
Un giorno di attesaUn giorno di attesa
Un giorno di attesa
 
Schmitt ama 2.5 presentation
Schmitt   ama 2.5 presentationSchmitt   ama 2.5 presentation
Schmitt ama 2.5 presentation
 
How can enjoy nutella
How can enjoy nutellaHow can enjoy nutella
How can enjoy nutella
 
Instruction for making a Midori Sour
Instruction for making a Midori SourInstruction for making a Midori Sour
Instruction for making a Midori Sour
 
Social Media and HR Sept 2013
Social Media and HR Sept 2013Social Media and HR Sept 2013
Social Media and HR Sept 2013
 
Reinvent Work Summit #RWS15 Graphic Recording
Reinvent Work Summit #RWS15 Graphic RecordingReinvent Work Summit #RWS15 Graphic Recording
Reinvent Work Summit #RWS15 Graphic Recording
 
Ee
EeEe
Ee
 
5 outcomes of Impact99 2012
5 outcomes of Impact99 20125 outcomes of Impact99 2012
5 outcomes of Impact99 2012
 
How to make a ‘mini bike’
How to make a ‘mini bike’How to make a ‘mini bike’
How to make a ‘mini bike’
 
Taller 1 cultura norte santander
Taller 1 cultura norte santanderTaller 1 cultura norte santander
Taller 1 cultura norte santander
 
Bab%203(2)
Bab%203(2)Bab%203(2)
Bab%203(2)
 
Surapong soponkij cluster growth and energy demand cld ai summit
Surapong soponkij   cluster growth and energy demand cld ai summitSurapong soponkij   cluster growth and energy demand cld ai summit
Surapong soponkij cluster growth and energy demand cld ai summit
 
Social Media for HR
Social Media for HRSocial Media for HR
Social Media for HR
 
Elizabethan fashion
Elizabethan fashionElizabethan fashion
Elizabethan fashion
 
Make it Big! The Effect of Font Size and Line Spacing on Online Readability.
Make it Big! The Effect of Font Size and Line Spacing on Online Readability.Make it Big! The Effect of Font Size and Line Spacing on Online Readability.
Make it Big! The Effect of Font Size and Line Spacing on Online Readability.
 

Similar to Network security

IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
Saravanan Purushothaman
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
danhaley45372
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
Invincea, Inc.
 
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
technext1
 

Similar to Network security (20)

Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
 
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
 
Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
 
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best PracticesThe Great Disconnect of Data Protection: Perception, Reality and Best Practices
The Great Disconnect of Data Protection: Perception, Reality and Best Practices
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Coud discovery chap 5
Coud discovery chap 5Coud discovery chap 5
Coud discovery chap 5
 
CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptx
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance Webinar
 
IT ELECT 4 NETWORK SECURITY LECTURE 6-5-13
IT ELECT 4 NETWORK SECURITY LECTURE 6-5-13IT ELECT 4 NETWORK SECURITY LECTURE 6-5-13
IT ELECT 4 NETWORK SECURITY LECTURE 6-5-13
 
Security Patterns - An Introduction
Security Patterns - An IntroductionSecurity Patterns - An Introduction
Security Patterns - An Introduction
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developer
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
 
31779261-NOC-and-SOC.pdf
31779261-NOC-and-SOC.pdf31779261-NOC-and-SOC.pdf
31779261-NOC-and-SOC.pdf
 
IT6701 Information Management - Unit II
IT6701 Information Management - Unit II   IT6701 Information Management - Unit II
IT6701 Information Management - Unit II
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
 

Network security

  • 1. Network Security The Crucial Role in Protecting Organizations Data
  • 3. General Solution at Application Level • Audit / Proactive hardening(securing) - System must audit: status and configuration of all application components - perform security test and proactive hardening of the components - detailed security audit reports: pre & post-deployment of applications. - Install all current patches. - Change default passwords. - Implement recommended security configurations.
  • 4. • Real-Time Protection • behavioral-based intrusion prevention system / automatic protection provided by most antivirus, anti-spy ware, and other anti mal ware programs. • Detect, and block application–level attacks for which none of signature scan and patch is known to (zero-day threats). • Other names: Real-time protection / on-access scanning / background guard / resident shield / auto-protect
  • 5.
  • 6. • Multi-tier protection • what? network services that are delivered using multiple servers • disaster recovery and backup: applies Recovery Point Objective (RPO) and Recovery Time Objective (RTO) • RPO : data lose • RTP : time for disaster recovery online & fully functioned in place of the production system.
  • 7. • Distributed Management / Centralized Reporting • Task and responsibility to monitor and manage application & database security across business units/geography boundary. • Outsourcing: consultants, contractors, or business partners.
  • 8.
  • 9. • Selective Encryption • ‘last line’ of defense for the most sensitive data • advantage: prevention of unauthorized access to data by legitimate users • Example:the ability of a database administrator to grant, revoke, or change users’ access right that is within his job scope with the restriction to copy, or do any changes to actual information in the database such as users’ credit card number.

Editor's Notes

  1. Network security:the guard to protect the network. -most modern security system is found in the Jewel of House, where it counts the most as the place keeps the priceless Britain’s crown jewels. -meaning: network security is moving away from protecting perimeter of the network to protecting data at the source.
  2. Cth application: server management ( http://bobcares.com/pro-active-server-management.html / ) http://www.dynamicnet.net/managed-services/managed-server-security/server-hardening/server-hardening-details/
  3. - Complements proactive hardening -‘real time’, the situations might be during data loaded into the computer’s active memory: insert CD, open mail, web browsing, and files in computer being opened or executed.
  4. The RPO indicates the amount of data that users are willing to lose in an event of disaster. Example stated by NScaled technical solution brief is if snapshots of a server are taken every 30 minutes and the last snapshot was taken at 2 PM, a disaster taking place at 2.29 PM means 29 minutes of data may be completely lost. Meanwhile for RTO, it represents the amount of time taken to get the disaster recovery online and fully functioned for in place of the original production system. RTO ten
  5. capability to delegate the responsibility for, and task involved in monitoring as well as managing application and database security across the geography boundary or business units, while providing centralized reporting of audit results.