Download presentation
Presentation is loading. Please wait.
Published byJoshua Maxwell Modified over 9 years ago
1
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY
2
Security Log Logon – Failures – Success Which one do you need to watch? Which one is more important?
3
Security Log
5
Security Global Threats – External Through Websites Through computers connected via modem (primarily laptops) Backdoor programs by-passing firewall
6
Security – Internal Poor file level security Poor user vigilance Man in the middle attacks
7
Security Remote Access – VPN Camarillo – Dialup
8
ANTIVIRUS External – Firewalls – Email filtering at SMTP gateways Internal – Proxy servers – Content scanning – Attachment scanning
9
TREND MICRO Spoke and hub layout – 10 minutes to full update
10
SMS Patch Updates – Updated virus pattern protection files are not enough. – Q. How does 1 helpdesk person support more than 200 computers that can be located anywhere in the world? – A. SMS
11
Security Why so important – Today the value in many companies is moving away from the tangible to the intangible – IP in this class refers to Internet Protocol, however in the business world IP stands for Intellectual Property and companies go to great lengths to protect it.
12
Security Virus are spreading much more rapidly – NIMDA330 days – Blaster25 days
13
Security SPAM – 50% of all incoming email is SPAM – 75% in near future – 10,000,000 emails in month of Jan through Indianapolis alone. – Overloads bandwidth – Reduces productivity – Increases disk space requirements – Increases time to complete backups
14
Network Evaluation Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.