kegel network security presented by: walter ramirez kyla williamson brent sims

17
Kegel Networ k Securi ty Presented by: Walter Ramirez Kyla Williamson

Upload: charity-burke

Post on 25-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

KegelNetwork Security

Presented by:Walter RamirezKyla WilliamsonBrent Sims

Outline

Company BackgroundThreatsRecommendations

Company Background

4 DivisionsManufacturingBowling

TechnologiesKegel Training

CenterFizzion

ThreatsPhysical SecurityAuthenticationInternet Access & UsageBackup Systems and Data RecoveryVirus, spyware, adware, spam Authorization

RecommendationsPhysical SecuritySensitive areas and Access levelInternal monitoring and Who is responsibleSpecify how an employee should be identifiedSpecify the frequency of change of access code

RecommendationsAuthenticationAdd guidelines for cracking passwordReinforcement about sharing passwords and unauthorized access situationsDocumented permission for VPNCheck all software and hardware by CSO

RecommendationsInternet Access & UsageHighlight which types of web sites are prohibited Highlight the methods for internet monitoring

RecommendationsBackup Systems and Data Recovery No formal backup procedure Recommended that one be in writing

Anti-Virus, anti-spyware, anti-adware, anti spam software

Recommendations

AuthorizationRecommendations

Authorization based on different levels of access An encryption policy is mentioned but not fully documented.

Conclusion

Keep it Safe!Presented by:Walter RamirezKyla WilliamsonBrent Sims

Conclusion

Keep it Safe!Presented by:Walter RamirezKyla WilliamsonBrent Sims

ReferencesAndress, M. (2001, Nov 19) Effective security starts with policies, InfoWorld. Retrieved February 21, 2009, from Academic Search Premier.Avolio, F. M. (2000, March 20). Best practices in network security, Network Computing. Retrieved February 23, 2009 from http://www.networkcomputing.com/1105/1105f2.html.Connolly, P. J. (2000, July 10). Security starts from within, InfoWorld. Retrieved from Academic Search Premier February 21, 2009.Dunbar, M. (2001, November). Sound policy equals strong security,

Credit Union Magazine. Retrieved February 21, 2009, from Business Source Premier.

ReferencesEllis, C. (2003, February). '7 Steps' for network security, Communications News. Retrieved February 23, 2009, from http://findarticles.com/p/articles/mi_m0CMN/is_2_40/ai_97724647.Forcht, K. and Ayers, W. (2000/2001, Winter) Developing a computer security policy for organizational use and implementation, Journal of Computer Information Systems. Retrieved February 12, 2007, from http://search.ebscohost.com.Gartenberg, M. (2002, June 24). Being tough, gentle with data security, Computerworld. Retrieved February 25, 2009, from Academic Search Premier.

ReferencesHulme, G. (2000, October 16). Beware of the threat from within, InformationWeek. Retrieved February 22, 2009, from http://search.ebscohost.com.Hulme, G. (2001, Sept 3). Management takes notice, Information Week. Retrieved July 2, 2002, from http://search.ebscohost.com.Jacobs, J. A., Pearl, M. C., & Irvine, S. (2001, March). Protecting online privacy to avoid liability. Association Management. Retrieved February 25, 2009, from http://search.ebscohost.com.Kegel Training Center. (n.d.) Retrieved March 31, 2009 from, http://www.kegeltrainingcenter.com/default.asp.

ReferencesKonicki, S., Scott, K., Garvey, M., Gilbert, A., Greenemeier L., & Rendleman, J. (2001, October 15). IT on high alert. InformationWeek. Retrieved Feb 25, 2009, from Academic Search Premier.Luzadder, D., Bryce, R., Gohring, N., Ploskina, B., Scanlon, B., Smetannikov, M., & Spangler, T. (2001, October 22). Feeling insecure, Interactive Week. Retrieved February 22, 2009, from Academic Search Premier.Palmer, M. (2001,May/June) Information security framework; Best

practices for security policy on the e-commerce age, Information Systems Security. Retrieved February 22, 2009, from Academic Source Premier.

ReferencesSmith, G. (2009, January 30). Keeping watch, Utility week. Retrieved February 23, 2009, from LexisNexis.Woods, C. (2000 February, 11). Get data safety policies on paper, American Banker. Retrieved February 22, 2009, from Business Source Premier.Yasin, R. (2001, January 8). Policy management hits the web, InternetWeek. Retrieved July 2, 2002, from Academic Search Premier.