1 Secure Online Presence Savio Fernandes

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

Patch Management Patch Management in a Windows based environment
Final Project Instructor: Nguyen Anh Tu Students: Tran Tien Tai Tran Tien Tai Tran Ngoc Mai Tran Ngoc Mai Tu Kim Tuan Tu Kim Tuan Nguyen Ngoc Phuong Nguyen.
Updating from 7.5/8.0 to 8.5 Technical Review Presenter: Mark Danus, Sales Engineer/Training Manager Conference #: Pin#:
UNIVERSITY OF EDUCATION BY H.M.ISHTIAQ RAFIQUE. Domain Name Structure.
1 How To Use a Browser A Module of the CYC Course – Computer Basics
© , Actuate Corporation Engineer Orientation IT Facility.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
EditHelp! Louise Webster editHelp! service © ETSI All rights reserved ETSI seminar.
0 - 0.
1 Overview Program Goals Laptops Wireless Networking Desktop Management Support Training Pilot Project Timelines Connecting Classrooms Agenda.
ALGEBRAIC EXPRESSIONS
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
©2011 Quest Software, Inc. All rights reserved.. Andrei Polevoi, Tatiana Golubovich Program Management Group ActiveRoles Add-on Manager Overview.
Your Definitive Lockdown Guide
Google as a Hacking Tool James Lee Advanced Searching.
Banking Services AVAILABLE FOR A SMALL BUSINESS. BANKING SERVICES 2 Welcome 1. Agenda 2. Ground Rules 3. Introductions.
Dial In Number Pin: 3959 Information About Microsoft September 21, 2012 Security Bulletin Jeremy Tinder Security Program Manager Microsoft.
Computer Security: Best Practices for Home Computing Presented by Student Help Desk Merced Community College.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
Mobile Device Security and Control NSAA IT Conference and Workshop Fourth Session: 2:45pm – 4:00pm _____________________________________.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
INTERNET SHIELD COURSE F-SECURE ® ANTI-VIRUS CLIENT SECURITY 6.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
How to Navigate the IFPUG Member Services Area 1.
1 Effective, secure and reliable hosted security and continuity solution.
My ELAS December 2012.
Outpost Office Firewall Product presentation. What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium.
Security Systems BU Communication Systems Slide 1 DCNtech MPCC IO NClientPC Installing and Operating with Multi PC Control  Windows Set-up.
1 Directed Depth First Search Adjacency Lists A: F G B: A H C: A D D: C F E: C D G F: E: G: : H: B: I: H: F A B C G D E H I.
COMOS Mobile Solutions 1.0 Simplified global collaboration
Security Systems BU Communication Systems Slide 1 DCNtech MPCC IO NServerPC Installing and Operating with Multi PC Control  Windows Set-up.
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
MSDN Connection Get personalised information on the topics and technologies you want Profile yourself today and get updates via RSS Get personalised information.
Properties of Exponents
Getting Familiar with Web Pages 1 2 The Internet Worldwide collection of interconnected computer networks that enables businesses, organizations, governments,
Classes-To-Go! 4A Feeds for Speed Pat Donnelly Director, BIVA Board.
Addition 1’s to 20.
25 seconds left…...
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
Test B, 100 Subtraction Facts
Services Course Windows Live SkyDrive Participant Guide.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
Week 1.
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
Building an EMS Database on a Company Intranet By: Nicholas Bollons Sally Goodman.
Use the buttons on the top to navigate through the presentation 1 PrevNext Menu.
Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
LobbyPal Online Visitor Management System by Aquarius Soft
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
IT:Network:Microsoft Applications
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
IDS Intrusion Detection Systems
Avenues International Inc.
Top 5 Open Source Firewall Software for Linux User
Information Security Session November 11, 2004
Designing IIS Security (IIS – Internet Information Service)

Presentation transcript:

1 Secure Online Presence Savio Fernandes

2 Rule #1: Determine the value of Information that you want to secure Then decide on the investments that you need to make. The cost of the security solution should not exceed the value of the information Image taken from

3 Rule #2: Classify your information Also determine who is authorized to access the information Image taken from

4 Rule #3: Different level of sensitivity will require different security levels. Image taken from

5 Endpoint Security Management Image taken from

6 Patch Management Apply patches but test before deploying on production servers. Image taken from

7 Windows Patches Visit for patches. All Critical (Express) patches should be applied

8 Microsoft Update Get all Microsoft updates in one place:

9 Ensure that the anti-virus software is configured to receive the latest updates automatically Image taken from

10 Host Based Intrusion Detection System (IDS) should be deployed on servers in addition to the network IDS Image taken from

11 Protect your Application and database severs via additional firewalls. Internet users should not be able to reach the application and database servers directly. Only the webserver should be able to access the application servers. You should also have another firewall in front of the webserver preferably of a different make than the other firewalls. Image taken from

12 Security Audit - Nessus You should conduct a weekly audit of your infrastructure with tools such as Nessus (Freeware) Snapshot of Nessus product – downloaded from

13 Beware of Zero-day Attacks Image taken from

14 Install the Free McAfee SiteAdvisor Snapshot of page taken from

15 Heed the advise given by McAfee SiteAdvisor when downloading software Google search output - when a search was made for free networking tools

16 Subscribe to Security Newsletters Snapshot of page at

17 Incident Response Report the computer incidents to the National Computer Incident response team. e.g. In India log the incident at Snapshot of US-CERT home page at

18 Thank You T Image taken from:

19 Disclaimer "The images presented and products referenced are the intellectual property of their respective owners. The use of such images is for non-commercial educational purposes only and no claim otherwise is made regarding the said images."