Presented by-
Anshika Mishra
Compton Computers Pvt. Ltd.
• Benetton Group is a global fashion brand.
• Benetton family who founded the company in 1965.
• Benetton has a network of over 6,500 stores in 120
countries.
• Benetton Group is one of the best-known fashion
companies in the world.
• 1st store in Belluno and 3yrs after in Paris.
3/26/2014 compton computers pvt. ltd. 2
• over 9,500 employees.
• Benetton has developed a network of small suppliers.
• Benetton is known for sponsorship of a number of
sports and for proactive and original “United Color”
publicity campaign.
3/26/2014 compton computers pvt. ltd. 3
3/26/2014 compton computers pvt. ltd. 4
• Compton Computers Pvt. Ltd. is one of the leading IT Solution Provider & System
integrator in India.
• Compton has been in this industry from the last 17 years and with it comes 17
valuable years of customer belief.
• An ISO 9001 certified company with Core expertise in designing IT Solution around
Structured Cabling, Wired & Wireless Networks, Server Solutions, Storage and
Backup Solution, Data Security and Surveillance.
• Compton has done many turn-key projects, where it has integrated end-to-end
solutions and won many awards for its work.
• At Compton we concentrate on understanding our clients requirements, design his
solution, integrate complete solution for him, optimize it and then put a proactive
management approach. Right from designing, integration, optimizing and managing
Compton follows a methodological approach complying to all ISO standards.
• CRN xcellence Award- Best Private Cloud Deployment
in SME’s 2013
• CRN Xcellence award- Among India’s Best System
Integrators for the year 2012
• Emerson presents Critical Difference Partner Award.
• CRN Xcellence award- Top solution provider- server
and storage –north 2011
• CRN Xcellence award top solution provider-server and
storage –north 2010
• CRN Xcellence award-top integrated solution provider-
north zone 2009
3/26/2014 compton computers pvt. ltd. 5
•Understand security services.
•Be aware of vulnerabilities and threats.
•Realize why network security is necessary.
•What are the elements of a comprehensive security
program.
3/26/2014 compton computers pvt. ltd. 6
Network security architect has following problems:
1. Context Privacy
2. Data Authentication
3. Reliable data storage
3. Data loss/theft
4. Content filtering
5. Malware
6. Intrusion detection
3/26/2014 compton computers pvt. ltd. 7
Problems -
• It is cumbersome for users to specify for gain policies.
• once the data is on the server who can access the
hardware.
Solution –
• Faces:
o Data changes according to who is viewieng.
• Future Research:
o Determining what data can be used without being
able to infer data.
o Grabbing only enough data for application purpose
without sacrificing usability.
3/26/2014 compton computers pvt. ltd. 8
Problems -
• Any participant with an appropriately
configured device can report falsified data.
• Devices are controlled by users.
• Incentives to mask private information.
Solution –
• Redundancy:
o Task cloning
o Ground truth
3/26/2014 compton computers pvt. ltd. 9
Problems -
• Deals with tempered data during transit.
Solution –
• cryptography
o cryptographically enhanced error correcting techniques.
• Encryption:
o Encrypted data that shows if it has been tempered with.
3/26/2014 compton computers pvt. ltd. 10
It is an error condition in information system in which
information is destroyed by failures or neglect in storage
, transmission or processing
Prevention-
 power failure- multi power circuits with battery back
up and a generator.
 software and hardware failure- journaling file system
and RAID storage.
3/26/2014 compton computers pvt. ltd. 11
A device or software application that monitors network or
system activities or policy violation.
Detection Methods:
1. Signature based detection
2. Statistical anomaly based detection
3. Stateful protocol analysis detection
3/26/2014 compton computers pvt. ltd. 12
1. Opening unsolicited e-mail attachments without
verifying their source and checking their content first.
2. Failing to install security patches especially for
microsoft office , microsoft internet explorer.
3. Installing screen savers or games from unknown
sources.
4. Not making and testing backups.
5. Using a modem while connected through a LAN
3/26/2014 compton computers pvt. ltd. 13
Sophistication
of HackerTools
Technical Knowledge
Required
High
Low 1980 1990 2000
3/26/2014 compton computers pvt. ltd. 14
 Have strong password
Use good anti viral product
Use good cryptography
Have good firewall
Have a back up system
Audit and monitor system and network
Have training and awareness program
Test your security frequently
3/26/2014 compton computers pvt. ltd. 15
A system or group of system that enforces an access
control policy between two networks
3/26/2014 compton computers pvt. ltd. 16
CYBEROAM-
• Provides user identity based network security
• It offers:
- network security solution
- Centralized security management
- Centralized visibility
• Global network security appliances provider, with a global
presence spanning more than 125 countries.
• We offer:
-cyberoam 300i
-cyberoam CR500ia
3/26/2014 compton computers pvt. ltd. 17
S.
No.
FEATURES CR300i CR500Ia
1. Copper GbE Ports 6 10
2. H/w bypass segment 1 2
3. Firewall throughput(UDP) 2600 Mbps 5000 Mbps
4. Firewall throughput(TCP) 1800 Mbps 3000 Mbps
5. Antivirus throughput 450 Mbps 750 Mbps
6. Back end servers supported 15 25
7. New sessions/seconds 15,000 25,000
8. Concurrent session 500,000 700,000
9. IPS throughput 850 1000
10. UTM throughput 350 550
3/26/2014 compton computers pvt. ltd. 18
Internet Security?
Buffer Overflows
Viruses
3/26/2014 compton computers pvt. ltd. 19
3/26/2014 compton computers pvt. ltd. 20
Assured Satisfaction
Low cost of operation
Best Outcome
Accuracy
Expediency
3/26/2014 compton computers pvt. ltd. 21
• The Internet works only because we implicitly trust
one another
• It is very easy to exploit this trust
• The same holds true for software
• It is important to stay on top of the latest security
advisories to know how to patch any security holes
3/26/2014 compton computers pvt. ltd. 22
3/26/2014 compton computers pvt. ltd. 23

Anshika

  • 1.
  • 2.
    • Benetton Groupis a global fashion brand. • Benetton family who founded the company in 1965. • Benetton has a network of over 6,500 stores in 120 countries. • Benetton Group is one of the best-known fashion companies in the world. • 1st store in Belluno and 3yrs after in Paris. 3/26/2014 compton computers pvt. ltd. 2
  • 3.
    • over 9,500employees. • Benetton has developed a network of small suppliers. • Benetton is known for sponsorship of a number of sports and for proactive and original “United Color” publicity campaign. 3/26/2014 compton computers pvt. ltd. 3
  • 4.
    3/26/2014 compton computerspvt. ltd. 4 • Compton Computers Pvt. Ltd. is one of the leading IT Solution Provider & System integrator in India. • Compton has been in this industry from the last 17 years and with it comes 17 valuable years of customer belief. • An ISO 9001 certified company with Core expertise in designing IT Solution around Structured Cabling, Wired & Wireless Networks, Server Solutions, Storage and Backup Solution, Data Security and Surveillance. • Compton has done many turn-key projects, where it has integrated end-to-end solutions and won many awards for its work. • At Compton we concentrate on understanding our clients requirements, design his solution, integrate complete solution for him, optimize it and then put a proactive management approach. Right from designing, integration, optimizing and managing Compton follows a methodological approach complying to all ISO standards.
  • 5.
    • CRN xcellenceAward- Best Private Cloud Deployment in SME’s 2013 • CRN Xcellence award- Among India’s Best System Integrators for the year 2012 • Emerson presents Critical Difference Partner Award. • CRN Xcellence award- Top solution provider- server and storage –north 2011 • CRN Xcellence award top solution provider-server and storage –north 2010 • CRN Xcellence award-top integrated solution provider- north zone 2009 3/26/2014 compton computers pvt. ltd. 5
  • 6.
    •Understand security services. •Beaware of vulnerabilities and threats. •Realize why network security is necessary. •What are the elements of a comprehensive security program. 3/26/2014 compton computers pvt. ltd. 6
  • 7.
    Network security architecthas following problems: 1. Context Privacy 2. Data Authentication 3. Reliable data storage 3. Data loss/theft 4. Content filtering 5. Malware 6. Intrusion detection 3/26/2014 compton computers pvt. ltd. 7
  • 8.
    Problems - • Itis cumbersome for users to specify for gain policies. • once the data is on the server who can access the hardware. Solution – • Faces: o Data changes according to who is viewieng. • Future Research: o Determining what data can be used without being able to infer data. o Grabbing only enough data for application purpose without sacrificing usability. 3/26/2014 compton computers pvt. ltd. 8
  • 9.
    Problems - • Anyparticipant with an appropriately configured device can report falsified data. • Devices are controlled by users. • Incentives to mask private information. Solution – • Redundancy: o Task cloning o Ground truth 3/26/2014 compton computers pvt. ltd. 9
  • 10.
    Problems - • Dealswith tempered data during transit. Solution – • cryptography o cryptographically enhanced error correcting techniques. • Encryption: o Encrypted data that shows if it has been tempered with. 3/26/2014 compton computers pvt. ltd. 10
  • 11.
    It is anerror condition in information system in which information is destroyed by failures or neglect in storage , transmission or processing Prevention-  power failure- multi power circuits with battery back up and a generator.  software and hardware failure- journaling file system and RAID storage. 3/26/2014 compton computers pvt. ltd. 11
  • 12.
    A device orsoftware application that monitors network or system activities or policy violation. Detection Methods: 1. Signature based detection 2. Statistical anomaly based detection 3. Stateful protocol analysis detection 3/26/2014 compton computers pvt. ltd. 12
  • 13.
    1. Opening unsolicitede-mail attachments without verifying their source and checking their content first. 2. Failing to install security patches especially for microsoft office , microsoft internet explorer. 3. Installing screen savers or games from unknown sources. 4. Not making and testing backups. 5. Using a modem while connected through a LAN 3/26/2014 compton computers pvt. ltd. 13
  • 14.
    Sophistication of HackerTools Technical Knowledge Required High Low1980 1990 2000 3/26/2014 compton computers pvt. ltd. 14
  • 15.
     Have strongpassword Use good anti viral product Use good cryptography Have good firewall Have a back up system Audit and monitor system and network Have training and awareness program Test your security frequently 3/26/2014 compton computers pvt. ltd. 15
  • 16.
    A system orgroup of system that enforces an access control policy between two networks 3/26/2014 compton computers pvt. ltd. 16
  • 17.
    CYBEROAM- • Provides useridentity based network security • It offers: - network security solution - Centralized security management - Centralized visibility • Global network security appliances provider, with a global presence spanning more than 125 countries. • We offer: -cyberoam 300i -cyberoam CR500ia 3/26/2014 compton computers pvt. ltd. 17
  • 18.
    S. No. FEATURES CR300i CR500Ia 1.Copper GbE Ports 6 10 2. H/w bypass segment 1 2 3. Firewall throughput(UDP) 2600 Mbps 5000 Mbps 4. Firewall throughput(TCP) 1800 Mbps 3000 Mbps 5. Antivirus throughput 450 Mbps 750 Mbps 6. Back end servers supported 15 25 7. New sessions/seconds 15,000 25,000 8. Concurrent session 500,000 700,000 9. IPS throughput 850 1000 10. UTM throughput 350 550 3/26/2014 compton computers pvt. ltd. 18
  • 19.
  • 20.
  • 21.
    Assured Satisfaction Low costof operation Best Outcome Accuracy Expediency 3/26/2014 compton computers pvt. ltd. 21
  • 22.
    • The Internetworks only because we implicitly trust one another • It is very easy to exploit this trust • The same holds true for software • It is important to stay on top of the latest security advisories to know how to patch any security holes 3/26/2014 compton computers pvt. ltd. 22
  • 23.