Rawabi Holding Company Information Assurance

Slides:



Advertisements
Similar presentations
Database Security Policies and Procedures and Implementation for the Disaster Management Communication System Presented By: Radostina Georgieva Master.
Advertisements

VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 11 Exploring Secure Topologies  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Security+ Guide to Network Security Fundamentals
Network and Security Patterns
E-business Infrastructure
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Joseph Ferracin Director IT Security Solutions Managing Security.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Using Technology to Manage Information Chapter 14.
Security and Privacy in Smart Communities By: Dr. Tan Hanh, Dr. Hoang Xuan Dau Posts and Telecommunications Institute of Technology (PTIT), Hanoi, Vietnam.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Securing Wired Local Area Networks(LANs)
Information Assurance Policy Tim Shimeall
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Chapter 2 Securing Network Server and User Workstations.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Computer Security By Duncan Hall.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY.
For More Tutorials CMGT 554 ENTIRE COURSE  CMGT 554 Week 1 DQ 1  CMGT 554 Week 2 Individual Assingment Paper Patton Fuller Community.
Virtual Private Networks
Glimpses of Aramco’s Supply-Chain Management Divison
COLLEGE OF BUSINESS ADMINISTRATION
«My future profession»
Aramco Information Assurance Policy
Information and documentation media systems.
Virtual Private Networks (VPN)
Biometrics in Banking Security
Introduction to Telecommunication
Al-Ahli Commercial Bank
Network Security Basics: Malware and Attacks
Introduction To Telecom
MISY3321- Intro. to Information Assurance
Klynveld Peat Marwick Goerdeler
Information Technology (IT) Department
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Virtual Private Networks (VPN)
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
CYB 110 Teaching Effectively-- snaptutorial.com
CYB 110 Education for Service-- tutorialrank.com
Risk of the Internet At Home
IT Vocab IT = information technology Server Client or host
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Security Essentials for Small Businesses
Computer Security Distributed System Security
IS4680 Security Auditing for Compliance
12 STEPS TO A GDPR AWARE NETWORK
Capitalize on Your Business’s Technology
Topic 12: Virtual Private Networks
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Rawabi Holding Company Information Assurance A Trend To Excellence MISY 3321: Introduction to Information Assurance Section: 101 Name: Mohammad Khalifa Aldossary ID: 200800586 Major: Management Information System Supervised By: Dr. Mohammad Rafiq

Outline 1. Introduction and Brief History of the Organization 2. Type of Information Rawabi Deals With 3. Loss and Miss-Use of Information 4. Organization Information Assurance Policies 5. Security System Execution 6. Conclusion

1. Introduction and Brief History of the Organization In the present decades, human beings are racing in a large scale to cope up with the latest technologies invented Companies are involved in updating and enriching its environment with recent upsurge trends of technologies Rawabi holding company is one of the leading companies in Saudi Arabia, amid to Aramco and Sabic, which was found in 1980 There is a need of having an integrated system, because of having more than 20 buildings in geographical dispersed locations to work in 25 disciplines of products and services to cover Thousands of employees data to save

2. Type of Information Rawabi Deals With Rawabi deals with information about the following: The employees at first The society (CRM) Contractors and Project-sides Suppliers (SRM) Technological and Oil(extraction, refining, processing)-related information. When we say assure, we mean to make it confidential, secure against external attacks, accurate, integral, and available for internal usage.

3. Loss and Miss-Use of Information In year 2007, Mr. Mario Foster, Rawabi IT group manager, recognized that the company level in its operations and different processes was in top of the trend Nonetheless, the technology used was not too weak Also, there was a huge problem in the panel of having a weak domain that can be cracked easily by external attacks

3. Loss and Miss-Use of Information Therefore, Mr. Mario Foster in February 2007 started to plan and implement the project. His aim was to: 3.1. Unify the database servers and link them to the network 3.2. Install Cisco telecommunication system 3.3. Purchase a new domain for the company Once they’ve finished in 2009, the company information became too reliable and secure.

4. Organization Information Assurance Policies Network Access Policy User Account Policy Remote Access Policy Information Protection Policy See Figure (4-1) Computer Security Policy

5. Security System Execution In order to secure the company’s intranet, extranet, and the internal network from any filthy criminal attack, there is a need to have some sort of a security system to monitor the situation. Two important attackers to be aware of which are The Denial of Service (DoS) The Distributed Denial of Service (DDoS) In Rawabi, they configured a system called the Security Device Manager (SDM) It provides an integrated management of cisco such as firewalls (site integrity), Virtual Private Networks –VPNs- (data privacy), and encryption (privacy).

6. Conclusion When we look after today’s global market, we tend to feel that the environment we are in is always not secure. This for sure would give us a hint that we always need to save our assets. One of the most platinum assets is information Rawabi, one of the top companies in Saudi Arabia who serve in distinguish sectors, implemented different ideologies to assure information. From my opinion, I suggest for different organizations to do the same as Rawabi analyst did who made their work more efficient and reliable

THANK YOU FOR LISTENING Q’s & A’s

Return To the Slide