bcis csm chapter three
DESCRIPTION
TRANSCRIPT
![Page 1: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/1.jpg)
BCIS Degree CourseCommunication Systems Management
Session Three
Network Security
U Nyein OoU Nyein OoSenior LecturerSenior Lecturer
![Page 2: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/2.jpg)
Prepared By UNO 2
Topics to be presented
Part One
• Importance of Security
• Preventing Disruption
• Correcting Disruption– Disaster Recovery Plan
![Page 3: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/3.jpg)
Prepared By UNO 3
Network Security
• Protection of networks and their services from unauthorized modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and there are no harmful side-effects.
• Network security includes providing for data integrity.
![Page 4: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/4.jpg)
Prepared By UNO 4
Computer Virus
• a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself.”
• “a virus can spread throughout a computer system or network using the authorizations of every user using it to infect their programs”.
![Page 5: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/5.jpg)
Prepared By UNO 5
Different types of Computer Virus
• Macro virus
• Worm
• Trojan horse
• Hybrids
• Malware
• Spam
• Spyware
![Page 6: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/6.jpg)
Prepared By UNO 6
Preventive Action to Virus
• Don't use file and print sharing unless you must
• If you do use file sharing, use good passwords
• Don't allow Windows to open .VBS(vb script)
or .WSF(Windows Script) files
• Beware software of unknown origin
• Forged E-mail Addresses
• Use Anti-virus Software
• To get More Help
• To Find Security Patches
![Page 7: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/7.jpg)
Prepared By UNO 7
Anti-Virus Software
• Nortan Antivirus ( www.symantec.com)
• Mcafee Antivirus ( www.macfee.com)
• Bitdeffender (www.bitdeffender.com)
• F-Secure (www.f-secrure.com)
• PC-cillin (www.trendmicro.com)
• E-safe…etc
![Page 8: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/8.jpg)
Prepared By UNO 8
![Page 9: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/9.jpg)
Prepared By UNO 9
criteria of anti-virus software.
• Ease of Use • Effective at Identifying Viruses and Worms • Effective at Cleaning or Isolating Infected Files • Activity Reporting • Feature Set (Scanning Capabilities)• Ease of Installation and Setup• Help Documentation
![Page 10: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/10.jpg)
Prepared By UNO 10
DRP
• A disaster recovery plan (DRP) - sometimes referred to as a business continuity plan (BCP) or business process contingency plan (BPCP) - describes how an organization is to deal with potential disasters.
• Disaster recovery is becoming an increasingly important aspect of enterprise computing. As devices, systems, and networks become ever more complex, there are simply more things that can go wrong
![Page 11: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/11.jpg)
Prepared By UNO 11
DRP Planning
• Program Description
• Planning Scope and Plan Objectives
• Project Organization and Staffing
• Project Control
• Schedule of Deliverables
• Resource Requirements
![Page 12: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/12.jpg)
Prepared By UNO 12
Program Description – Pre-Planning Activities (Project Initiation) – Vulnerability Assessment and General Definition – Requirements – Business Impact Analysis – Detailed Definition of Requirements – Plan Development – Testing Program – Maintenance Program – Initial Plan Testing and Plan Implementation
![Page 13: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/13.jpg)
Prepared By UNO 13
Sample DRP
![Page 14: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/14.jpg)
Prepared By UNO 14
![Page 15: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/15.jpg)
Prepared By UNO 15
Common Network Security Threats
• Malicious Threats
• Unintentional Threats
• Physical Threats
![Page 16: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/16.jpg)
Prepared By UNO 16
Malicious Threats
• Software
• Spoofing
• Scanning
• Eavesdropping(spying)
• Spamming
• Tunneling
![Page 17: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/17.jpg)
Prepared By UNO 17
Unintentional Threats
• Maltfunction
• Human Errors
![Page 18: Bcis Csm Chapter Three](https://reader036.vdocuments.mx/reader036/viewer/2022082804/547c80585806b5fe3f8b4791/html5/thumbnails/18.jpg)
Prepared By UNO 18
Physical Threats
• Fire• Water• Earthquake• Power Loss• Civil Disorder• Battle Damage