Download presentation
Presentation is loading. Please wait.
Published byWinifred Andrea Francis Modified over 9 years ago
1
C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES Chapter 9 Analysis Policy © Routledge Richard Phillips and Rayton R. Sianjina
2
A NALYSIS P OLICY TCP Packet Analysis OS Hardening Router Security Firewall Encryption Network Address Translation (NAT) Intrusion detection/prevention systems (IDPS) © Routledge
3
A NALYSIS P OLICY One policy that continues to grow and change as technology grows and changes is analysis policy. Analysis policy consists of the following predetermined technology standards to maintain the security of a system’s infrastructure from outside threats: Open network port maintenance Transmission Control Protocol packet analysis Operating System Hardening Router security Firewall system maintenance Encryption development Network address translation Intrusion detection/prevention systems Virus/Malware protection. © Routledge
4
A NALYSIS P OLICY Symantec Technologies Inc.’s best practices for intrusion detection/prevention systems (IDPS) include: 1. the use of multiple types or all four kinds of IDPS technologies to create a comprehensive protection base; 2. working with IDPS technologies that are capable of integrating 3. defining the system IDPS needs before purchasing the technology. © Routledge
5
A NALYSIS P OLICY Four types of IDPS: 1. network-based which monitors network segments or devices 2. wireless which monitors wireless systems for suspicious traffic 3. network behaviour analysis (NBA) which monitors network traffic for unusual traffic flow 4. host-based which monitors a single host for suspicious activity. © Routledge
6
A NALYSIS P OLICY Disaster recovery: best and most widely adopted disaster recovery strategy is known as GFS (Grandfather, Father, Son) where system data is backed up in three ways. Daily backups can be either differential (a backup of all changes made since the last full backup) or incremental (a backup of only the additions to data since the last backup). © Routledge
7
C ONCLUSION Overall, an effective system analysis policy requires system administrators who know the smallest details of the network and the technology. They should meet with and report results to district and building administrators to keep them informed. © Routledge
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.