Top Banner
Information Security Concerns Software Vulnerabilties Network Security and Authentication Open Discussion Information Security Sukant Kole Advanced Centre for Informatics & Innovative Learning Indira Gandhi National Open University, New Delhi August 24, 2010 Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting
65

Information Security: DBPO

Nov 11, 2014

Download

Education

Sukant Kole

This is a presentation on Information Security module as part of Diploma in Business Process Outsourcing by SOVET, IGNOU
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Information Security

Sukant Kole

Advanced Centre for Informatics & Innovative LearningIndira Gandhi National Open University, New Delhi

August 24, 2010

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 2: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

What is Information Security ?

Definition

Information Security means protection of information andinformation system from unauthorized access, modification andmisuse of information or destruction.

Impact of Weather Forecasting & Flight Scheduling System

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 3: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

What is Information Security ?

Definition

Information Security means protection of information andinformation system from unauthorized access, modification andmisuse of information or destruction.

Impact of Weather Forecasting & Flight Scheduling System

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 4: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Integrity

Confidentiality

Availability

Security

Privacy

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 5: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Integrity

Confidentiality

Availability

Security

Privacy

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 6: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Integrity

Confidentiality

Availability

Security

Privacy

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 7: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Integrity

Confidentiality

Availability

Security

Privacy

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 8: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Integrity

Confidentiality

Availability

Security

Privacy

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 9: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical

(Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 10: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical

(Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 11: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application

(Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 12: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application

(Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 13: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application

(Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 14: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices

Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 15: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices

Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 16: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 17: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 18: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 19: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 20: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 21: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Access restriction to datacentre, Security surveillance,Disaster Recovery

VLAN, Authentication Authorization & Auditing service,WPA-PSK

Security patches, Stable version, 3 tier architecture

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 22: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Access restriction to datacentre, Security surveillance,Disaster Recovery

VLAN, Authentication Authorization & Auditing service,WPA-PSK

Security patches, Stable version, 3 tier architecture

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 23: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Access restriction to datacentre, Security surveillance,Disaster Recovery

VLAN, Authentication Authorization & Auditing service,WPA-PSK

Security patches, Stable version, 3 tier architecture

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 24: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

What is encryption ?

Definition

“....In cryptography, encryption is the process of transforminginformation (referred to as plaintext) using an algorithm (calledcipher) to make it unreadable to anyone except those possessingspecial knowledge, usually referred to as a key. The result of theprocess is encrypted information (in cryptography, referred to asciphertext....” (Source: Wikipedia)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 25: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Symmetric Encryption

(Ref: http://www.devx.com/dbzone/Article/29232/1954)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 26: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Asymmetric Encryption

(Ref: www.uic.edu/depts/accc/newsletter/adn26/figure2.html)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 27: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies

(Password, Resource Access)

IT Policies (Backup, firewall, IDS & IPS)

General (Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 28: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies

(Password, Resource Access)

IT Policies (Backup, firewall, IDS & IPS)

General (Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 29: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies (Password, Resource Access)

IT Policies

(Backup, firewall, IDS & IPS)

General (Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 30: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies (Password, Resource Access)

IT Policies

(Backup, firewall, IDS & IPS)

General (Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 31: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies (Password, Resource Access)

IT Policies (Backup, firewall, IDS & IPS)

General

(Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 32: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies (Password, Resource Access)

IT Policies (Backup, firewall, IDS & IPS)

General

(Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 33: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies (Password, Resource Access)

IT Policies (Backup, firewall, IDS & IPS)

General (Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 34: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 35: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 36: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 37: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 38: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 39: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 40: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm

(Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 41: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm

(Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 42: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 43: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 44: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 45: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Definition

“....In the field of networking, the specialist area of networksecurity consists of the provisions and policies adopted by thenetwork administrator to prevent and monitor unauthorized access,misuse, modification, or denial of the computer network andnetwork-accessible resources....” (Source: Wikipedia)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 46: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)

Unauthorized access to resources (unsecured LAN /WLANnetwork points)

MAC Spoofing, Man-in-the-middle attack

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 47: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)

Unauthorized access to resources (unsecured LAN /WLANnetwork points)

MAC Spoofing, Man-in-the-middle attack

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 48: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)

Unauthorized access to resources (unsecured LAN /WLANnetwork points)

MAC Spoofing, Man-in-the-middle attack

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 49: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)

Unauthorized access to resources (unsecured LAN /WLANnetwork points)

MAC Spoofing, Man-in-the-middle attack

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 50: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)

Unauthorized access to resources (unsecured LAN /WLANnetwork points)

MAC Spoofing, Man-in-the-middle attack

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 51: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 52: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 53: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 54: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 55: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 56: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 57: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 58: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 59: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 60: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

De-Militarized Zones

Virtual LANs

Authentication, Authorization, Auditing Service (Desktop,Web)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 61: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

De-Militarized Zones

Virtual LANs

Authentication, Authorization, Auditing Service (Desktop,Web)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 62: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

De-Militarized Zones

Virtual LANs

Authentication, Authorization, Auditing Service (Desktop,Web)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 63: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

De-Militarized Zones

Virtual LANs

Authentication, Authorization, Auditing Service (Desktop,Web)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 64: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

De-Militarized Zones

Virtual LANs

Authentication, Authorization, Auditing Service (Desktop,Web)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Page 65: Information Security: DBPO

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting