SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.

Slides:



Advertisements
Similar presentations
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
Advertisements

Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewall Planning and Design Chapter 1. Learning Objectives Understand the misconceptions about firewalls Realize that a firewall is dependent on an effective.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Stephen S. Yau CSE , Fall Security Strategies.
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
Department Of Computer Engineering
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
1 © 2004 Cisco Systems, Inc. All rights reserved. Cisco Self Defending Network SECURING THE INTELLIGENT INFORMATION NETWORK James Jones CCIE 1550, CISSP.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Pg 1 of 25 AGI IP-Based Network Solutions Phil Flores Major Account Manager – Cisco Systems, inc.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
(CISCO) Self-Defending Networks Ben Sangster. Agenda (CISCO) Self-Defending Network Concept Why do we need SDN’s? Foundation of the CSDN? Endpoint Protection.
Information Security What is Information Security?
Completing network setup. INTRODUCTION Course Overview Course Objectives.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Self-Defending Networks Self-Defending Networks By-  Aseem Khan  Adeeb Akhil Shahi  Mohammed Sohail  Saiprasad H Bevinakatti.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Some Great Open Source Intrusion Detection Systems (IDSs)
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Surveillance and Security Systems Cyber Security Integration.
Chapter 1: Explore the Network
Advanced Endpoint Security Data Connectors-Charlotte January 2016
OIT Security Operations
Internet Quarantine: Requirements for Containing Self-Propagating Code
Chapter 1: Exploring the Network
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Juniper Software-Defined Secure Network
CHAPTER FOUR OVERVIEW SECTION ETHICS
Compliance with hardening standards
Lecture 8. Cyber Security, Ethics and Trust
Operating system Security
Fundamentals of Information Systems
Module 1: Introduction to Designing Security
Security Automation Standards Landscape
Microsoft’s Security Strategy
Virtualization & Security real solutions
Internet and Network Security
Get instant internet security | | Wire IT Solutions
Cloud Security for Endpoints
How to Mitigate the Consequences What are the Countermeasures?
Networking for Home and Small Businesses – Chapter 8
CHAPTER FOUR OVERVIEW SECTION ETHICS
The MobileIron® Threat Detection difference:
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Microsoft Data Insights Summit
Introduction to Internet Worm
Hosted Security.
Security Insights: Secure Messaging
What You Should Know About Driving Down MTTD and MTTR
BullGuard Support. BullGuard- The Virus Protection Software Now a day’s variety of malware and viruses are attacking your systems and ultimately attacking.
Presentation transcript:

SELF-DEFENDING NETWORK

CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion

INTRODUCTION Viruses and worms continue to disrupt business, causing system downtime, lost productivity, and continual patching. Existing anti-virus solutions, which rely on recognizing attack signatures, are unable to detect and contain "day- zero" viruses and the denial-of-service (DOS) attacks that they spawn. Recent worm and virus infections have elevated the issue of keeping insecure nodes from infecting the network and made this a top priority for enterprises today.

What is Self Defending Network? The self defending network can enable the network to detect and defend itself against certain attacks. Self-defending networks differ from traditional network defenses in that self-defending networks have the capability to provide some amount of automatic protection of the network components. The layered self-defending network includes components that can protect the network connections in the data center, at the remote or branch location, and at the desktop.

Types of Network Attacks There are several types of network attacks:- Viruses Worms Trojans DOS DDOS Spyware Phising

Structure of Self Defending Network  Security Policy :- ->Acceptable Use/Access ->Network Connections ->Data Access Control ->Privacy Safeguards ->Protecting Physical and Logical Assets

 Processes and Procedures ->Incident response -> Monitoring -> Manage and Improve -> Compliance audit  Technology Solution -> Multiple layers of security -> Integrated security vs overlay security -> Behavior and signature technology -> System-level approach

Conclusion Self-Defending Network, an innovative, multi phased security initiative that dramatically improves the ability of networks to identify, prevent, and adapt to security threats. Self-Defending Network Initiative significantly advances strategy of integrating security services throughout IP networks.