anshika
TRANSCRIPT
Network Security SolutionFor
United Colours of Benetton
Presented by-
Anshika MishraCompton Computers Pvt. Ltd.
04/13/2023 compton computers pvt. ltd. 2
About UCB
• Benetton Group is a global fashion brand.
• Benetton family who founded the company in 1965.
• Benetton has a network of over 6,500 stores in 120
countries.
• Benetton Group is one of the best-known fashion
companies in the world.
• 1st store in Belluno and 3yrs after in Paris.
04/13/2023 compton computers pvt. ltd. 3
• over 9,500 employees.
• Benetton has developed a network of small suppliers.
• Benetton is known for sponsorship of a number of
sports and for proactive and original “United Color”
publicity campaign.
04/13/2023 compton computers pvt. ltd. 4
Who are we??• Compton Computers Pvt. Ltd. is one of the leading IT Solution Provider & System
integrator in India.
• Compton has been in this industry from the last 17 years and with it comes 17 valuable years of customer belief.
• An ISO 9001 certified company with Core expertise in designing IT Solution around Structured Cabling, Wired & Wireless Networks, Server Solutions, Storage and Backup Solution, Data Security and Surveillance.
• Compton has done many turn-key projects, where it has integrated end-to-end solutions and won many awards for its work.
• At Compton we concentrate on understanding our clients requirements, design his solution, integrate complete solution for him, optimize it and then put a proactive management approach. Right from designing, integration, optimizing and managing Compton follows a methodological approach complying to all ISO standards.
04/13/2023 compton computers pvt. ltd. 5
• CRN xcellence Award- Best Private Cloud Deployment in
SME’s 2013
• CRN Xcellence award- Among India’s Best System Integrators
for the year 2012
• Emerson presents Critical Difference Partner Award.
• CRN Xcellence award- Top solution provider- server and
storage –north 2011
• CRN Xcellence award top solution provider-server and
storage –north 2010
• CRN Xcellence award-top integrated solution provider- north
zone 2009
Awards
04/13/2023 compton computers pvt. ltd. 6
Presentation objective•Understand security services.
•Be aware of vulnerabilities and threats.
•Realize why network security is necessary.
•What are the elements of a comprehensive security program.
04/13/2023 compton computers pvt. ltd. 7
Challenges of network security Network security architect has following problems:
1. Context Privacy
2. Data Authentication
3. Reliable data storage
3. Data loss/theft
4. Content filtering
5. Malware
6. Intrusion detection
04/13/2023 compton computers pvt. ltd. 8
Context PrivacyProblems -• It is cumbersome for users to specify for gain policies.• once the data is on the server who can access the hardware.
Solution –• Faces:o Data changes according to who is viewieng.
• Future Research:o Determining what data can be used without being able to infer data.o Grabbing only enough data for application purpose without sacrificing usability.
04/13/2023 compton computers pvt. ltd. 9
Reliable Data StorageProblems -• Any participant with an appropriately configured device can report falsified data.• Devices are controlled by users. • Incentives to mask private information.
Solution –• Redundancy: o Task cloningo Ground truth
04/13/2023 compton computers pvt. ltd. 10
Data AuthenticationProblems -• Deals with tempered data during transit.
Solution –• cryptographyo cryptographically enhanced error correcting techniques.
• Encryption:o Encrypted data that shows if it has been tempered with.
04/13/2023 compton computers pvt. ltd. 11
Data Loss/ Theft
It is an error condition in information system in which information is destroyed by failures or neglect in storage , transmission or processing
Prevention- power failure- multi power circuits with battery back up and a generator. software and hardware failure- journaling file system and RAID storage.
04/13/2023 compton computers pvt. ltd. 12
Intrusion DetectionA device or software application that monitors network or system activities or policy violation.
Detection Methods:
1. Signature based detection
2. Statistical anomaly based detection 3. Stateful protocol analysis detection
04/13/2023 compton computers pvt. ltd. 13
5 Worst Security Mistakes1. Opening unsolicited e-mail attachments without
verifying their source and checking their content first.
2. Failing to install security patches especially for microsoft office , microsoft internet explorer.
3. Installing screen savers or games from unknown sources.
4. Not making and testing backups.
5. Using a modem while connected through a LAN
04/13/2023 compton computers pvt. ltd. 14
Security incidents
Sophistication of HackerTools
Technical Knowledge Required
High
Low 1980 1990 2000
04/13/2023 compton computers pvt. ltd. 15
Elements of a comprehensive security program Have strong passwordUse good anti viral productUse good cryptographyHave good firewallHave a back up systemAudit and monitor system and network Have training and awareness programTest your security frequently
04/13/2023 compton computers pvt. ltd. 16
FirewallsA system or group of system that enforces an access control policy between two networks
04/13/2023 compton computers pvt. ltd. 17
Proposed solutionCYBEROAM-• Provides user identity based network security
• It offers:- network security solution - Centralized security management- Centralized visibility
• Global network security appliances provider, with a global presence spanning more than 125 countries.
• We offer: -cyberoam 300i -cyberoam CR500ia
04/13/2023 compton computers pvt. ltd. 18
comparisonS. No.
FEATURES CR300i CR500Ia
1. Copper GbE Ports 6 10
2. H/w bypass segment 1 2
3. Firewall throughput(UDP) 2600 Mbps 5000 Mbps
4. Firewall throughput(TCP) 1800 Mbps 3000 Mbps
5. Antivirus throughput 450 Mbps 750 Mbps
6. Back end servers supported 15 25
7. New sessions/seconds 15,000 25,000
8. Concurrent session 500,000 700,000
9. IPS throughput 850 1000
10. UTM throughput 350 550
04/13/2023 compton computers pvt. ltd. 19
Internet Security?
Malicious CodeSpoofing
Denial of Service
Port Scanning Replay AttackBuffer Overflows
Man-in-the-middle
Session Hijacking
Viruses
04/13/2023 compton computers pvt. ltd. 20
04/13/2023 compton computers pvt. ltd. 21
Why Compton?Assured Satisfaction
Low cost of operation
Best Outcome
Accuracy
Expediency
04/13/2023 compton computers pvt. ltd. 22
Summary• The Internet works only because we implicitly trust one another
• It is very easy to exploit this trust
• The same holds true for software
• It is important to stay on top of the latest security advisories to know how to patch any security holes
04/13/2023 compton computers pvt. ltd. 23
THANK YOU!!