Download presentation
Presentation is loading. Please wait.
1
Trey Shaffer TreyS @ PostNet.com Trey.Shaffer @ OneCo.net
2
Intros, Background Trey Class
3
Security, broadly speaking Threat assessment Approach Solution
4
Risk Assessment Mission Critical Data Mission Critical Transactions Public Image Lost Productivity –Data recovery –Virus
5
Security Overview 80/20 rule 95/5 rule Send attackers to your neighbor
6
Corporate Data Loss Sneaker Net Laptops PDAs RAS/VPN Hacker
7
Methods of Protection Unplug Restrict Access Control Access
8
Restrict Access – Who User/Password Certificates Random Generator Biometric
9
Certificates You Are Who You (say you) Are Three Parties –User –Host –Cert Authority
10
Restrict Access – Where Certificates Telephone Number IP Address DNS Reverse
11
Methodology Choose one Thorough Repeatable
12
Break?
13
Techie Stuff TCP/IP Protocol –How it works Barrier Solutions –Address translation –Proxy –Firewall
14
TCP/IP Postal Mail Analogy Unique address –Network –Host Gateway Ports
15
Control Access Naked Isolation DMZ Internal
16
Solutions Meet Various Needs –Features –Ease of use –Performance –Cost Hybrid Feature Sets
17
Address Translation Mask Addresses –Many internal –Single/few external Inexpensive Universal Limited Flexibility
18
Proxy Address Translation Caching –Performance –Utilization Management –Control –Reporting
19
Firewall Hardware/Software Extended Features Complex/Flexible Policy Multi-Point Implementation Complementary Services –VPN –Web filtering
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.