bcis csm chapter three

18
BCIS Degree Course Communication Systems Management Session Three Network Security U Nyein Oo U Nyein Oo Senior Lecturer Senior Lecturer

Upload: backdoor

Post on 30-Nov-2014

609 views

Category:

Economy & Finance


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Bcis Csm Chapter Three

BCIS Degree CourseCommunication Systems Management

Session Three

Network Security

U Nyein OoU Nyein OoSenior LecturerSenior Lecturer

Page 2: Bcis Csm Chapter Three

Prepared By UNO 2

Topics to be presented

Part One

• Importance of Security

• Preventing Disruption

• Correcting Disruption– Disaster Recovery Plan

Page 3: Bcis Csm Chapter Three

Prepared By UNO 3

Network Security

• Protection of networks and their services from unauthorized modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and there are no harmful side-effects.

• Network security includes providing for data integrity.

Page 4: Bcis Csm Chapter Three

Prepared By UNO 4

Computer Virus

• a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself.”

• “a virus can spread throughout a computer system or network using the authorizations of every user using it to infect their programs”.

Page 5: Bcis Csm Chapter Three

Prepared By UNO 5

Different types of Computer Virus

• Macro virus

• Worm

• Trojan horse

• Hybrids

• Malware

• Spam

• Spyware

Page 6: Bcis Csm Chapter Three

Prepared By UNO 6

Preventive Action to Virus

• Don't use file and print sharing unless you must

• If you do use file sharing, use good passwords

• Don't allow Windows to open .VBS(vb script)

or .WSF(Windows Script) files

• Beware software of unknown origin

• Forged E-mail Addresses

• Use Anti-virus Software

• To get More Help

• To Find Security Patches

Page 7: Bcis Csm Chapter Three

Prepared By UNO 7

Anti-Virus Software

• Nortan Antivirus ( www.symantec.com)

• Mcafee Antivirus ( www.macfee.com)

• Bitdeffender (www.bitdeffender.com)

• F-Secure (www.f-secrure.com)

• PC-cillin (www.trendmicro.com)

• E-safe…etc

Page 8: Bcis Csm Chapter Three

Prepared By UNO 8

Page 9: Bcis Csm Chapter Three

Prepared By UNO 9

criteria of anti-virus software.

• Ease of Use • Effective at Identifying Viruses and Worms • Effective at Cleaning or Isolating Infected Files • Activity Reporting • Feature Set (Scanning Capabilities)• Ease of Installation and Setup• Help Documentation

Page 10: Bcis Csm Chapter Three

Prepared By UNO 10

DRP

• A disaster recovery plan (DRP) - sometimes referred to as a business continuity plan (BCP) or business process contingency plan (BPCP) - describes how an organization is to deal with potential disasters.

• Disaster recovery is becoming an increasingly important aspect of enterprise computing. As devices, systems, and networks become ever more complex, there are simply more things that can go wrong

Page 12: Bcis Csm Chapter Three

Prepared By UNO 12

Program Description – Pre-Planning Activities (Project Initiation) – Vulnerability Assessment and General Definition – Requirements – Business Impact Analysis – Detailed Definition of Requirements – Plan Development – Testing Program – Maintenance Program – Initial Plan Testing and Plan Implementation

Page 13: Bcis Csm Chapter Three

Prepared By UNO 13

Sample DRP

Page 14: Bcis Csm Chapter Three

Prepared By UNO 14

Page 15: Bcis Csm Chapter Three

Prepared By UNO 15

Common Network Security Threats

• Malicious Threats

• Unintentional Threats

• Physical Threats

Page 16: Bcis Csm Chapter Three

Prepared By UNO 16

Malicious Threats

• Software

• Spoofing

• Scanning

• Eavesdropping(spying)

• Spamming

• Tunneling

Page 17: Bcis Csm Chapter Three

Prepared By UNO 17

Unintentional Threats

• Maltfunction

• Human Errors

Page 18: Bcis Csm Chapter Three

Prepared By UNO 18

Physical Threats

• Fire• Water• Earthquake• Power Loss• Civil Disorder• Battle Damage