Bcis Csm Chapter Three

492 views

Published on

Published in: Economy & Finance, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
492
On SlideShare
0
From Embeds
0
Number of Embeds
27
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Bcis Csm Chapter Three

  1. 1. BCIS Degree Course Communication Systems Management Session Three Network Security U Nyein Oo Senior Lecturer
  2. 2. Topics to be presented <ul><li>Part One </li></ul><ul><li>Importance of Security </li></ul><ul><li>Preventing Disruption </li></ul><ul><li>Correcting Disruption </li></ul><ul><ul><li>Disaster Recovery Plan </li></ul></ul>
  3. 3. Network Security <ul><li>Protection of networks and their services from unauthorized modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and there are no harmful side-effects. </li></ul><ul><li>Network security includes providing for data integrity. </li></ul>
  4. 4. Computer Virus <ul><li>a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself.” </li></ul><ul><li>“ a virus can spread throughout a computer system or network using the authorizations of every user using it to infect their programs”. </li></ul>
  5. 5. Different types of Computer Virus <ul><li>Macro virus </li></ul><ul><li>Worm </li></ul><ul><li>Trojan horse </li></ul><ul><li>Hybrids </li></ul><ul><li>Malware </li></ul><ul><li>Spam </li></ul><ul><li>Spyware </li></ul>
  6. 6. Preventive Action to Virus <ul><li>Don't use file and print sharing unless you must </li></ul><ul><li>If you do use file sharing, use good passwords </li></ul><ul><li>Don't allow Windows to open .VBS(vb script) </li></ul><ul><li> or .WSF(Windows Script) files </li></ul><ul><li>Beware software of unknown origin </li></ul><ul><li>Forged E-mail Addresses </li></ul><ul><li>Use Anti-virus Software </li></ul><ul><li>To get More Help </li></ul><ul><li>To Find Security Patches </li></ul>
  7. 7. Anti-Virus Software <ul><li>Nortan Antivirus ( www.symantec.com ) </li></ul><ul><li>Mcafee Antivirus ( www.macfee.com ) </li></ul><ul><li>Bitdeffender ( www.bitdeffender.com ) </li></ul><ul><li>F-Secure ( www.f-secrure.com ) </li></ul><ul><li>PC-cillin ( www.trendmicro.com ) </li></ul><ul><li>E-safe…etc </li></ul>
  8. 9. criteria of anti-virus software. <ul><li>Ease of Use </li></ul><ul><li>Effective at Identifying Viruses and Worms </li></ul><ul><li>Effective at Cleaning or Isolating Infected Files </li></ul><ul><li>Activity Reporting </li></ul><ul><li>Feature Set (Scanning Capabilities) </li></ul><ul><li>Ease of Installation and Setup </li></ul><ul><li>Help Documentation </li></ul>
  9. 10. DRP <ul><li>A disaster recovery plan (DRP) - sometimes referred to as a business continuity plan (BCP) or business process contingency plan (BPCP) - describes how an organization is to deal with potential disasters. </li></ul><ul><li>Disaster recovery is becoming an increasingly important aspect of enterprise computing. As devices, systems, and networks become ever more complex, there are simply more things that can go wrong </li></ul>
  10. 11. DRP Planning <ul><li>Program Description </li></ul><ul><li>Planning Scope and Plan Objectives </li></ul><ul><li>Project Organization and Staffing </li></ul><ul><li>Project Control </li></ul><ul><li>Schedule of Deliverables </li></ul><ul><li>Resource Requirements </li></ul>
  11. 12. Program Description <ul><ul><li>Pre-Planning Activities (Project Initiation) </li></ul></ul><ul><ul><li>Vulnerability Assessment and General Definition </li></ul></ul><ul><ul><li>Requirements </li></ul></ul><ul><ul><li>Business Impact Analysis </li></ul></ul><ul><ul><li>Detailed Definition of Requirements </li></ul></ul><ul><ul><li>Plan Development </li></ul></ul><ul><ul><li>Testing Program </li></ul></ul><ul><ul><li>Maintenance Program </li></ul></ul><ul><ul><li>Initial Plan Testing and Plan Implementation </li></ul></ul>
  12. 13. Sample DRP
  13. 15. Common Network Security Threats <ul><li>Malicious Threats </li></ul><ul><li>Unintentional Threats </li></ul><ul><li>Physical Threats </li></ul>
  14. 16. Malicious Threats <ul><li>Software </li></ul><ul><li>Spoofing </li></ul><ul><li>Scanning </li></ul><ul><li>Eavesdropping(spying) </li></ul><ul><li>Spamming </li></ul><ul><li>Tunneling </li></ul>
  15. 17. Unintentional Threats <ul><li>Maltfunction </li></ul><ul><li>Human Errors </li></ul>
  16. 18. Physical Threats <ul><li>Fire </li></ul><ul><li>Water </li></ul><ul><li>Earthquake </li></ul><ul><li>Power Loss </li></ul><ul><li>Civil Disorder </li></ul><ul><li>Battle Damage </li></ul>

×