Download presentation
Presentation is loading. Please wait.
Published byInnozenz Junge Modified over 6 years ago
1
GEANT3 GN3/NA3/T4 „Campus Best Practice“ Propisi za korišćenje ICT sistema Učiteljski fakultet u Beogradu
2
Saša Milašinović direktor YUTRO. com, CSSA, MCSA, MCDBA, ISO27000 L. A
Saša Milašinović direktor YUTRO.com, CSSA, MCSA, MCDBA, ISO27000 L.A. Intel vPro Specialist Član Udruženja e-Razvoj, rukovodilac radne grupe za Internet
3
AGENDA O nama Mreža Učiteljskog fakulteta u Beogradu Monitoring
Security Pravilnik za korišćenje ICT sistema Učiteljski fakultet u Beogradu
4
Partnerstva
5
Reference
6
Mreža Učiteljskog fakulteta
2002.
7
Mreža Učiteljskog fakulteta
2011. Optički link, optička vertikala, Gb horizontala Cisco & Extreme aktivna oprema Avaya VoIP rešenje Mreža bazirana na Microsoft tehnologiji Virtualizovani serveri na MS Hyper-V MS TMG (Threat Management Gateway – ex ISA) MS Exchange, MS SQL, MS IIS, AD/DC Wireless AP u celoj zgradi
8
Mreža Učiteljskog fakulteta
Antologija srpske književnosti Virtualizovano na Hyper-V Program za studentsku službu CentOS Linux PostgreSQL Segmentirana mreža
9
Mreža Učiteljskog fakulteta
Monitoring Monitoring 24/7/365 Sve što ima IP adresu Proaktivnost u održavanju i korekciji ICT sistema
10
Email security Customer Network Remote User Customer Network
Spam and Virus Filter Attack Protection Appliance & Software Firewall Server Content Filter Server Software Companies traditionally relied on basic firewall protection for security With appliance or software security solutions, threats are battled inside the firewall, inside the corporate network. Requires operational management and cost – bandwidth, storage Managed service offers unique capabilities the appliance and software solutions do not. It is in the cloud – outside of the premise. Managed service works through the MX Record No h/w or s/w required Removes the MX record broadcast – “cloak” or shields Capacity is on-demand Reduces bandwidth, storage costs No upgrades or maintenance Cost is low No need for IT staff Managed service provides benefits for both SME and large Enterprise Provides END-TO-END solution for SME Can provide ADDITIONAL PROTECTION for large enterprise with on-premise solution (FIRST LINE OF DEFENSE) Quarantine User
11
TLS= Transport Layer Security
security SPAM FILTERS Statistical filtering Industry heuristics Proprietary heuristics Reputation analysis Reputation-based RBL filtering Premium Anti-Spam Multi-Language Filter Deep Content Analysis ATTACK PROTECTION Denial of Service (DoS) Attack Protection Directory Harvest Attack (DHA) Protection TLS TLS Four Key Points to Remember COST CONTAINMENT: Immediate relief from damaging threats Savings far exceed cost of the service QUICK/SEAMLESS DEPLOYMENT: Rapid service activation Immediate benefit without capital investment CUSTOMER SATISFACTION: Employee satisfaction with virtually no end user training ROBUST FUNCTIONALITY: Designed to empower the enterprise with policy enforcement tools Provides flexibility to allow end user flexibility to manage and control their spam PRIMARY FILTERS Domain level black-and-white lists Distributed black lists Recipient deny lists User-level black-and-white lists Back Scatter Abatement VIRUS AND WORM FILTERING McAfee’s proprietary WormTraqSM, worm detection engine McAfee® Anti-virus Sophos® Anti-virus Authentium® Anti-virus CONTENT AND ATTACHMENT FILTERING Keyword filtering Attachment filtering Archive file integrity filtering HTML content protection Fraud protection Spam beacon and web bug detection and blocking TLS= Transport Layer Security
12
Pravilnik za korišćenje ICT sistema
Pravilnik je napisan godine Povod: hack-ovanje sistema od strane radnika fakulteta, share-ovanja filmova i upozorenja od strane „Warner Bros“-a Pravilnik se nalazi na AMRES Wiki-u
13
Pravilnik za korišćenje ICT sistema
Opšte odredbe Pristup IT opremi Sigurnost kompjutera Propisi o pristupu i zaštiti ličnih podataka Korišćenje sredstava Pravila o korišćenju elektronskih poruka, konferencijskih sistema UF mreže Prava drugih lica Kvalitet usluge, obaveza nadoknade Pravo pristupa rezervnim (back-up) zonama Korišćenje privatne opreme povezane sa fakultetskom mrežom Sankcionisanje
14
Pravilnik za korišćenje ICT sistema
Pre pravilnika Hack-ovanje ICT sistema pred prijemni ispit Share-ovanje filmova (prijava „Warner Bros“) Zasedanje Saveta Fakulteta Posle pravilnika Pokušaj puštanja u promet key-loger-a Reakcija dekana
15
Pravilnik za korišćenje ICT sistema
Zaključak Pravilnik postoji i usvojen je Niko nije potpisao da je upoznat sa pravilnikom (standard ISO27000) Postojanje pravilnika pozitivno utiče na svest korisnika o značaju ICT sistema Niko nije sankcionisan po ovom pravilniku ali se „nesporazumi“ lakše rešavaju
16
Hvala na pažnji ! Saša Milašinović 011.36.29.588 sasa@yutro.com
Za detaljnije informacije, kontaktirajte nas: Saša Milašinović CSSA, MCSA, MCDBA, ISO27000 L.A. Intel vPro Specialist Član Udruženja e-Razvoj, rukovodilac radne grupe za Internet
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.