anshika
TRANSCRIPT
![Page 1: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/1.jpg)
Network Security SolutionFor
United Colours of Benetton
Presented by-
Anshika MishraCompton Computers Pvt. Ltd.
![Page 2: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/2.jpg)
04/13/2023 compton computers pvt. ltd. 2
About UCB
• Benetton Group is a global fashion brand.
• Benetton family who founded the company in 1965.
• Benetton has a network of over 6,500 stores in 120
countries.
• Benetton Group is one of the best-known fashion
companies in the world.
• 1st store in Belluno and 3yrs after in Paris.
![Page 3: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/3.jpg)
04/13/2023 compton computers pvt. ltd. 3
• over 9,500 employees.
• Benetton has developed a network of small suppliers.
• Benetton is known for sponsorship of a number of
sports and for proactive and original “United Color”
publicity campaign.
![Page 4: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/4.jpg)
04/13/2023 compton computers pvt. ltd. 4
Who are we??• Compton Computers Pvt. Ltd. is one of the leading IT Solution Provider & System
integrator in India.
• Compton has been in this industry from the last 17 years and with it comes 17 valuable years of customer belief.
• An ISO 9001 certified company with Core expertise in designing IT Solution around Structured Cabling, Wired & Wireless Networks, Server Solutions, Storage and Backup Solution, Data Security and Surveillance.
• Compton has done many turn-key projects, where it has integrated end-to-end solutions and won many awards for its work.
• At Compton we concentrate on understanding our clients requirements, design his solution, integrate complete solution for him, optimize it and then put a proactive management approach. Right from designing, integration, optimizing and managing Compton follows a methodological approach complying to all ISO standards.
![Page 5: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/5.jpg)
04/13/2023 compton computers pvt. ltd. 5
• CRN xcellence Award- Best Private Cloud Deployment in
SME’s 2013
• CRN Xcellence award- Among India’s Best System Integrators
for the year 2012
• Emerson presents Critical Difference Partner Award.
• CRN Xcellence award- Top solution provider- server and
storage –north 2011
• CRN Xcellence award top solution provider-server and
storage –north 2010
• CRN Xcellence award-top integrated solution provider- north
zone 2009
Awards
![Page 6: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/6.jpg)
04/13/2023 compton computers pvt. ltd. 6
Presentation objective•Understand security services.
•Be aware of vulnerabilities and threats.
•Realize why network security is necessary.
•What are the elements of a comprehensive security program.
![Page 7: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/7.jpg)
04/13/2023 compton computers pvt. ltd. 7
Challenges of network security Network security architect has following problems:
1. Context Privacy
2. Data Authentication
3. Reliable data storage
3. Data loss/theft
4. Content filtering
5. Malware
6. Intrusion detection
![Page 8: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/8.jpg)
04/13/2023 compton computers pvt. ltd. 8
Context PrivacyProblems -• It is cumbersome for users to specify for gain policies.• once the data is on the server who can access the hardware.
Solution –• Faces:o Data changes according to who is viewieng.
• Future Research:o Determining what data can be used without being able to infer data.o Grabbing only enough data for application purpose without sacrificing usability.
![Page 9: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/9.jpg)
04/13/2023 compton computers pvt. ltd. 9
Reliable Data StorageProblems -• Any participant with an appropriately configured device can report falsified data.• Devices are controlled by users. • Incentives to mask private information.
Solution –• Redundancy: o Task cloningo Ground truth
![Page 10: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/10.jpg)
04/13/2023 compton computers pvt. ltd. 10
Data AuthenticationProblems -• Deals with tempered data during transit.
Solution –• cryptographyo cryptographically enhanced error correcting techniques.
• Encryption:o Encrypted data that shows if it has been tempered with.
![Page 11: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/11.jpg)
04/13/2023 compton computers pvt. ltd. 11
Data Loss/ Theft
It is an error condition in information system in which information is destroyed by failures or neglect in storage , transmission or processing
Prevention- power failure- multi power circuits with battery back up and a generator. software and hardware failure- journaling file system and RAID storage.
![Page 12: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/12.jpg)
04/13/2023 compton computers pvt. ltd. 12
Intrusion DetectionA device or software application that monitors network or system activities or policy violation.
Detection Methods:
1. Signature based detection
2. Statistical anomaly based detection 3. Stateful protocol analysis detection
![Page 13: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/13.jpg)
04/13/2023 compton computers pvt. ltd. 13
5 Worst Security Mistakes1. Opening unsolicited e-mail attachments without
verifying their source and checking their content first.
2. Failing to install security patches especially for microsoft office , microsoft internet explorer.
3. Installing screen savers or games from unknown sources.
4. Not making and testing backups.
5. Using a modem while connected through a LAN
![Page 14: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/14.jpg)
04/13/2023 compton computers pvt. ltd. 14
Security incidents
Sophistication of HackerTools
Technical Knowledge Required
High
Low 1980 1990 2000
![Page 15: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/15.jpg)
04/13/2023 compton computers pvt. ltd. 15
Elements of a comprehensive security program Have strong passwordUse good anti viral productUse good cryptographyHave good firewallHave a back up systemAudit and monitor system and network Have training and awareness programTest your security frequently
![Page 16: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/16.jpg)
04/13/2023 compton computers pvt. ltd. 16
FirewallsA system or group of system that enforces an access control policy between two networks
![Page 17: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/17.jpg)
04/13/2023 compton computers pvt. ltd. 17
Proposed solutionCYBEROAM-• Provides user identity based network security
• It offers:- network security solution - Centralized security management- Centralized visibility
• Global network security appliances provider, with a global presence spanning more than 125 countries.
• We offer: -cyberoam 300i -cyberoam CR500ia
![Page 18: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/18.jpg)
04/13/2023 compton computers pvt. ltd. 18
comparisonS. No.
FEATURES CR300i CR500Ia
1. Copper GbE Ports 6 10
2. H/w bypass segment 1 2
3. Firewall throughput(UDP) 2600 Mbps 5000 Mbps
4. Firewall throughput(TCP) 1800 Mbps 3000 Mbps
5. Antivirus throughput 450 Mbps 750 Mbps
6. Back end servers supported 15 25
7. New sessions/seconds 15,000 25,000
8. Concurrent session 500,000 700,000
9. IPS throughput 850 1000
10. UTM throughput 350 550
![Page 19: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/19.jpg)
04/13/2023 compton computers pvt. ltd. 19
Internet Security?
Malicious CodeSpoofing
Denial of Service
Port Scanning Replay AttackBuffer Overflows
Man-in-the-middle
Session Hijacking
Viruses
![Page 20: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/20.jpg)
04/13/2023 compton computers pvt. ltd. 20
![Page 21: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/21.jpg)
04/13/2023 compton computers pvt. ltd. 21
Why Compton?Assured Satisfaction
Low cost of operation
Best Outcome
Accuracy
Expediency
![Page 22: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/22.jpg)
04/13/2023 compton computers pvt. ltd. 22
Summary• The Internet works only because we implicitly trust one another
• It is very easy to exploit this trust
• The same holds true for software
• It is important to stay on top of the latest security advisories to know how to patch any security holes
![Page 23: Anshika](https://reader033.vdocuments.site/reader033/viewer/2022052506/55737e9dd8b42af4698b50fe/html5/thumbnails/23.jpg)
04/13/2023 compton computers pvt. ltd. 23
THANK YOU!!