BCIS Degree Course Communication Systems Management Session Three Network Security U Nyein Oo Senior Lecturer
Topics to be presented Part One Importance of Security Preventing Disruption Correcting Disruption Disaster Recovery Plan
Network Security Protection of networks and their services from unauthorized modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and there are no harmful side-effects.  Network security includes providing for data integrity.
Computer Virus a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself.”  “ a virus can spread throughout a computer system or network using the authorizations of every user using it to infect their programs”.
Different types of Computer Virus Macro virus Worm Trojan horse Hybrids Malware Spam Spyware
Preventive Action to Virus Don't use file and print sharing unless you must If you do use file sharing, use good passwords  Don't allow Windows to open .VBS(vb script)   or .WSF(Windows Script) files Beware software of unknown origin Forged E-mail Addresses Use Anti-virus Software To get  More Help To Find Security Patches
Anti-Virus Software Nortan Antivirus (  www.symantec.com ) Mcafee Antivirus (  www.macfee.com ) Bitdeffender ( www.bitdeffender.com ) F-Secure ( www.f-secrure.com ) PC-cillin ( www.trendmicro.com ) E-safe…etc
 
criteria of anti-virus software. Ease of Use  Effective at Identifying Viruses and Worms  Effective at Cleaning or Isolating Infected Files  Activity Reporting  Feature Set (Scanning Capabilities) Ease of Installation and Setup Help Documentation
DRP A disaster recovery plan (DRP) - sometimes referred to as a  business continuity  plan (BCP) or business process contingency plan (BPCP) - describes how an organization is to deal with potential disasters.  Disaster recovery is becoming an increasingly important aspect of enterprise computing. As devices, systems, and networks become ever more complex, there are simply more things that can go wrong
DRP Planning Program Description  Planning Scope and Plan Objectives   Project Organization and Staffing   Project Control   Schedule of Deliverables   Resource Requirements
Program Description  Pre-Planning Activities (Project Initiation)  Vulnerability Assessment and General Definition  Requirements  Business Impact Analysis  Detailed Definition of Requirements  Plan Development  Testing Program  Maintenance Program  Initial Plan Testing and Plan Implementation
Sample DRP
 
Common Network Security Threats Malicious Threats   Unintentional Threats   Physical Threats
Malicious Threats Software Spoofing Scanning Eavesdropping(spying) Spamming Tunneling
Unintentional Threats Maltfunction Human Errors
Physical Threats Fire Water Earthquake Power Loss Civil Disorder Battle Damage

Bcis Csm Chapter Three

  • 1.
    BCIS Degree CourseCommunication Systems Management Session Three Network Security U Nyein Oo Senior Lecturer
  • 2.
    Topics to bepresented Part One Importance of Security Preventing Disruption Correcting Disruption Disaster Recovery Plan
  • 3.
    Network Security Protectionof networks and their services from unauthorized modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and there are no harmful side-effects. Network security includes providing for data integrity.
  • 4.
    Computer Virus aprogram that can 'infect' other programs by modifying them to include a possibly evolved copy of itself.” “ a virus can spread throughout a computer system or network using the authorizations of every user using it to infect their programs”.
  • 5.
    Different types ofComputer Virus Macro virus Worm Trojan horse Hybrids Malware Spam Spyware
  • 6.
    Preventive Action toVirus Don't use file and print sharing unless you must If you do use file sharing, use good passwords Don't allow Windows to open .VBS(vb script) or .WSF(Windows Script) files Beware software of unknown origin Forged E-mail Addresses Use Anti-virus Software To get More Help To Find Security Patches
  • 7.
    Anti-Virus Software NortanAntivirus ( www.symantec.com ) Mcafee Antivirus ( www.macfee.com ) Bitdeffender ( www.bitdeffender.com ) F-Secure ( www.f-secrure.com ) PC-cillin ( www.trendmicro.com ) E-safe…etc
  • 8.
  • 9.
    criteria of anti-virussoftware. Ease of Use Effective at Identifying Viruses and Worms Effective at Cleaning or Isolating Infected Files Activity Reporting Feature Set (Scanning Capabilities) Ease of Installation and Setup Help Documentation
  • 10.
    DRP A disasterrecovery plan (DRP) - sometimes referred to as a business continuity plan (BCP) or business process contingency plan (BPCP) - describes how an organization is to deal with potential disasters. Disaster recovery is becoming an increasingly important aspect of enterprise computing. As devices, systems, and networks become ever more complex, there are simply more things that can go wrong
  • 11.
    DRP Planning ProgramDescription Planning Scope and Plan Objectives Project Organization and Staffing Project Control Schedule of Deliverables Resource Requirements
  • 12.
    Program Description Pre-Planning Activities (Project Initiation) Vulnerability Assessment and General Definition Requirements Business Impact Analysis Detailed Definition of Requirements Plan Development Testing Program Maintenance Program Initial Plan Testing and Plan Implementation
  • 13.
  • 14.
  • 15.
    Common Network SecurityThreats Malicious Threats Unintentional Threats Physical Threats
  • 16.
    Malicious Threats SoftwareSpoofing Scanning Eavesdropping(spying) Spamming Tunneling
  • 17.
  • 18.
    Physical Threats FireWater Earthquake Power Loss Civil Disorder Battle Damage