Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY
Security Log Logon – Failures – Success Which one do you need to watch? Which one is more important?
Security Log
Security Global Threats – External Through Websites Through computers connected via modem (primarily laptops) Backdoor programs by-passing firewall
Security – Internal Poor file level security Poor user vigilance Man in the middle attacks
Security Remote Access – VPN Camarillo – Dialup
ANTIVIRUS External – Firewalls – filtering at SMTP gateways Internal – Proxy servers – Content scanning – Attachment scanning
TREND MICRO Spoke and hub layout – 10 minutes to full update
SMS Patch Updates – Updated virus pattern protection files are not enough. – Q. How does 1 helpdesk person support more than 200 computers that can be located anywhere in the world? – A. SMS
Security Why so important – Today the value in many companies is moving away from the tangible to the intangible – IP in this class refers to Internet Protocol, however in the business world IP stands for Intellectual Property and companies go to great lengths to protect it.
Security Virus are spreading much more rapidly – NIMDA330 days – Blaster25 days
Security SPAM – 50% of all incoming is SPAM – 75% in near future – 10,000,000 s in month of Jan through Indianapolis alone. – Overloads bandwidth – Reduces productivity – Increases disk space requirements – Increases time to complete backups
Network Evaluation Questions?