GEANT3 GN3/NA3/T4 „Campus Best Practice“ Propisi za korišćenje ICT sistema Učiteljski fakultet u Beogradu.

Slides:



Advertisements
Similar presentations
1 Effective, secure and reliable hosted security and continuity solution.
Advertisements

Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Benefits of CA Technology & HVB Bank Romania Study Case Bucharest, May 31, 2005.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Unified Logs and Reporting for Hybrid Centralized Management
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Norman SecureSurf Protect your users when surfing the Internet.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Enthusio™ MSP Managed Service Provider Teachers Training Faculty University of Belgrade.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
ShareTech 2015 Next-Gen UTM.
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Norman Protection Powerful and flexible Protection Gateway.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Copyright 2008 © Mobile Telephone Networks. All rights reserved. MTN Business Hosting Services: Efficient Localization of Web & Digital Content Tolulope.
Server Implementation. NETGATE 2 Netgate2 Spam Firewall and Server deliver the most robust, effective and easy to manage security available.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Web Content Security Unlock the Power of the Web
Barracuda NG Firewall ™
Securing Information Systems
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
About Us | Our Mission | Looking Ahead THE COMPANY HOME | THE COMPANY
Web Content Security Unlock the Power of the Web
Critical Security Controls
Barracuda Web Filtering Service
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
DocFusion 365 Intelligent Template Designer and Document Generation Engine on Azure Enables Your Team to Increase Productivity MICROSOFT AZURE APP BUILDER.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Network Security Analysis Name : Waleed Al-Rumaih ID :
Securing the Network Perimeter with ISA 2004
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Veeam Backup Repository
Matt G change over point ?
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
Design Unit 26 Design a small or home office network
User Monitoring Appliance Secures Microsoft Azure by Auditing Privileged Users in the Cloud “Microsoft Azure provides an easily accessible platform for.
Built on the Powerful Microsoft Azure Platform, the SiouxApp “Project-Server” Helps to Manage Projects and More with App Enhancement Tools MICROSOFT AZURE.
Check Point Connectra NGX R60
Virtual Private Network
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
Emerging technologies-
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
Company Overview MegaPath is a leading provider of managed IP communications services in North America Business Founded in 1996 HQ in Pleasanton, CA 1,000+
Introduction to Symantec Security Service
Securing web applications Externally
INTERNET SECURITY.
Security Insights: Secure Messaging
Cloud Computing for Wireless Networks
Presentation transcript:

GEANT3 GN3/NA3/T4 „Campus Best Practice“ Propisi za korišćenje ICT sistema Učiteljski fakultet u Beogradu

Saša Milašinović direktor YUTRO. com, CSSA, MCSA, MCDBA, ISO27000 L. A Saša Milašinović direktor YUTRO.com, CSSA, MCSA, MCDBA, ISO27000 L.A. Intel vPro Specialist Član Udruženja e-Razvoj, rukovodilac radne grupe za Internet sasa@yutro.com

AGENDA O nama Mreža Učiteljskog fakulteta u Beogradu Monitoring Email Security Pravilnik za korišćenje ICT sistema Učiteljski fakultet u Beogradu

Partnerstva

Reference

Mreža Učiteljskog fakulteta 2002.

Mreža Učiteljskog fakulteta 2011. Optički link, optička vertikala, Gb horizontala Cisco & Extreme aktivna oprema Avaya VoIP rešenje Mreža bazirana na Microsoft tehnologiji Virtualizovani serveri na MS Hyper-V MS TMG (Threat Management Gateway – ex ISA) MS Exchange, MS SQL, MS IIS, AD/DC Wireless AP u celoj zgradi

Mreža Učiteljskog fakulteta Antologija srpske književnosti Virtualizovano na Hyper-V Program za studentsku službu CentOS Linux PostgreSQL Segmentirana mreža

Mreža Učiteljskog fakulteta Monitoring Monitoring 24/7/365 Sve što ima IP adresu Proaktivnost u održavanju i korekciji ICT sistema

Email security Customer Network Remote User Customer Network Spam and Virus Filter Attack Protection Appliance & Software Firewall Email Server Content Filter Server Software Companies traditionally relied on basic firewall protection for email security With appliance or software email security solutions, email threats are battled inside the firewall, inside the corporate network. Requires operational management and cost – bandwidth, storage Managed service offers unique capabilities the appliance and software solutions do not. It is in the cloud – outside of the premise. Managed service works through the MX Record No h/w or s/w required Removes the MX record broadcast – “cloak” or shields Capacity is on-demand Reduces bandwidth, storage costs No upgrades or maintenance Cost is low No need for IT staff Managed service provides benefits for both SME and large Enterprise Provides END-TO-END solution for SME Can provide ADDITIONAL PROTECTION for large enterprise with on-premise solution (FIRST LINE OF DEFENSE) Quarantine Email User

TLS= Transport Layer Security Email security SPAM FILTERS Statistical filtering Industry heuristics Proprietary heuristics Reputation analysis Reputation-based RBL filtering Premium Anti-Spam Multi-Language Filter Deep Content Analysis EMAIL ATTACK PROTECTION Denial of Service (DoS) Attack Protection Directory Harvest Attack (DHA) Protection TLS TLS Four Key Points to Remember COST CONTAINMENT: Immediate relief from damaging email threats Savings far exceed cost of the service QUICK/SEAMLESS DEPLOYMENT: Rapid service activation Immediate benefit without capital investment CUSTOMER SATISFACTION: Employee satisfaction with virtually no end user training ROBUST FUNCTIONALITY: Designed to empower the enterprise with email policy enforcement tools Provides flexibility to allow end user flexibility to manage and control their spam PRIMARY FILTERS Domain level black-and-white lists Distributed black lists Recipient deny lists User-level black-and-white lists Back Scatter Abatement VIRUS AND WORM FILTERING McAfee’s proprietary WormTraqSM, worm detection engine McAfee® Anti-virus Sophos® Anti-virus Authentium® Anti-virus CONTENT AND ATTACHMENT FILTERING Keyword filtering Attachment filtering Archive file integrity filtering HTML content protection Fraud protection Spam beacon and web bug detection and blocking TLS= Transport Layer Security

Pravilnik za korišćenje ICT sistema Pravilnik je napisan 2005. godine Povod: hack-ovanje sistema od strane radnika fakulteta, share-ovanja filmova i upozorenja od strane „Warner Bros“-a Pravilnik se nalazi na AMRES Wiki-u

Pravilnik za korišćenje ICT sistema Opšte odredbe Pristup IT opremi Sigurnost kompjutera Propisi o pristupu i zaštiti ličnih podataka Korišćenje sredstava Pravila o korišćenju elektronskih poruka, konferencijskih sistema UF mreže Prava drugih lica Kvalitet usluge, obaveza nadoknade Pravo pristupa rezervnim (back-up) zonama Korišćenje privatne opreme povezane sa fakultetskom mrežom Sankcionisanje

Pravilnik za korišćenje ICT sistema Pre pravilnika Hack-ovanje ICT sistema pred prijemni ispit Share-ovanje filmova (prijava „Warner Bros“) Zasedanje Saveta Fakulteta Posle pravilnika Pokušaj puštanja u promet key-loger-a Reakcija dekana

Pravilnik za korišćenje ICT sistema Zaključak Pravilnik postoji i usvojen je Niko nije potpisao da je upoznat sa pravilnikom (standard ISO27000) Postojanje pravilnika pozitivno utiče na svest korisnika o značaju ICT sistema Niko nije sankcionisan po ovom pravilniku ali se „nesporazumi“ lakše rešavaju

Hvala na pažnji ! Saša Milašinović 011.36.29.588 sasa@yutro.com Za detaljnije informacije, kontaktirajte nas: 011.36.29.588 sasa@yutro.com Saša Milašinović CSSA, MCSA, MCDBA, ISO27000 L.A. Intel vPro Specialist Član Udruženja e-Razvoj, rukovodilac radne grupe za Internet