Download presentation
Presentation is loading. Please wait.
Published byAndrea Thompson Modified over 8 years ago
1
SELF-DEFENDING NETWORK
2
CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion
3
INTRODUCTION Viruses and worms continue to disrupt business, causing system downtime, lost productivity, and continual patching. Existing anti-virus solutions, which rely on recognizing attack signatures, are unable to detect and contain "day- zero" viruses and the denial-of-service (DOS) attacks that they spawn. Recent worm and virus infections have elevated the issue of keeping insecure nodes from infecting the network and made this a top priority for enterprises today.
4
What is Self Defending Network? The self defending network can enable the network to detect and defend itself against certain attacks. Self-defending networks differ from traditional network defenses in that self-defending networks have the capability to provide some amount of automatic protection of the network components. The layered self-defending network includes components that can protect the network connections in the data center, at the remote or branch location, and at the desktop.
5
Types of Network Attacks There are several types of network attacks:- Viruses Worms Trojans DOS DDOS Spyware Phising
6
Structure of Self Defending Network Security Policy :- ->Acceptable Use/Access ->Network Connections ->Data Access Control ->Privacy Safeguards ->Protecting Physical and Logical Assets
7
Processes and Procedures ->Incident response -> Monitoring -> Manage and Improve -> Compliance audit Technology Solution -> Multiple layers of security -> Integrated security vs overlay security -> Behavior and signature technology -> System-level approach
8
Conclusion Self-Defending Network, an innovative, multi phased security initiative that dramatically improves the ability of networks to identify, prevent, and adapt to security threats. Self-Defending Network Initiative significantly advances strategy of integrating security services throughout IP networks.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.