Information Security: DBPO

Preview:

DESCRIPTION

This is a presentation on Information Security module as part of Diploma in Business Process Outsourcing by SOVET, IGNOU

Citation preview

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Information Security

Sukant Kole

Advanced Centre for Informatics & Innovative LearningIndira Gandhi National Open University, New Delhi

August 24, 2010

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

What is Information Security ?

Definition

Information Security means protection of information andinformation system from unauthorized access, modification andmisuse of information or destruction.

Impact of Weather Forecasting & Flight Scheduling System

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

What is Information Security ?

Definition

Information Security means protection of information andinformation system from unauthorized access, modification andmisuse of information or destruction.

Impact of Weather Forecasting & Flight Scheduling System

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Integrity

Confidentiality

Availability

Security

Privacy

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Integrity

Confidentiality

Availability

Security

Privacy

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Integrity

Confidentiality

Availability

Security

Privacy

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Integrity

Confidentiality

Availability

Security

Privacy

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Integrity

Confidentiality

Availability

Security

Privacy

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical

(Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical

(Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application

(Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application

(Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application

(Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices

Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices

Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Physical (Malicious insiders, Careless Employees)

Network

Application (Exploited Vulnerabilities, Zero day attacks)

Access Devices Mobile devices, USB Devices

Social Networking

Cloud computing security

Cyber Espionage

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Access restriction to datacentre, Security surveillance,Disaster Recovery

VLAN, Authentication Authorization & Auditing service,WPA-PSK

Security patches, Stable version, 3 tier architecture

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Access restriction to datacentre, Security surveillance,Disaster Recovery

VLAN, Authentication Authorization & Auditing service,WPA-PSK

Security patches, Stable version, 3 tier architecture

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Access restriction to datacentre, Security surveillance,Disaster Recovery

VLAN, Authentication Authorization & Auditing service,WPA-PSK

Security patches, Stable version, 3 tier architecture

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

What is encryption ?

Definition

“....In cryptography, encryption is the process of transforminginformation (referred to as plaintext) using an algorithm (calledcipher) to make it unreadable to anyone except those possessingspecial knowledge, usually referred to as a key. The result of theprocess is encrypted information (in cryptography, referred to asciphertext....” (Source: Wikipedia)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Symmetric Encryption

(Ref: http://www.devx.com/dbzone/Article/29232/1954)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

Asymmetric Encryption

(Ref: www.uic.edu/depts/accc/newsletter/adn26/figure2.html)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies

(Password, Resource Access)

IT Policies (Backup, firewall, IDS & IPS)

General (Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies

(Password, Resource Access)

IT Policies (Backup, firewall, IDS & IPS)

General (Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies (Password, Resource Access)

IT Policies

(Backup, firewall, IDS & IPS)

General (Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies (Password, Resource Access)

IT Policies

(Backup, firewall, IDS & IPS)

General (Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies (Password, Resource Access)

IT Policies (Backup, firewall, IDS & IPS)

General

(Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies (Password, Resource Access)

IT Policies (Backup, firewall, IDS & IPS)

General

(Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

IntroductionAttributes of Information SecurityType of threatsTypes of security measuresEncryptionSecurity Policies

User Policies (Password, Resource Access)

IT Policies (Backup, firewall, IDS & IPS)

General (Service License Agreement, Business Continuity)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm

(Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm

(Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Introduction

Infection process

Viruses

Worm (Morris Worm, November 2, 1988)

Trojan Horses

Social Engineering attacks

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Definition

“....In the field of networking, the specialist area of networksecurity consists of the provisions and policies adopted by thenetwork administrator to prevent and monitor unauthorized access,misuse, modification, or denial of the computer network andnetwork-accessible resources....” (Source: Wikipedia)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)

Unauthorized access to resources (unsecured LAN /WLANnetwork points)

MAC Spoofing, Man-in-the-middle attack

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)

Unauthorized access to resources (unsecured LAN /WLANnetwork points)

MAC Spoofing, Man-in-the-middle attack

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)

Unauthorized access to resources (unsecured LAN /WLANnetwork points)

MAC Spoofing, Man-in-the-middle attack

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)

Unauthorized access to resources (unsecured LAN /WLANnetwork points)

MAC Spoofing, Man-in-the-middle attack

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Denial of Service (ARP Posioning, DNS Cache Poisoning,Packet flooding)

Unauthorized access to resources (unsecured LAN /WLANnetwork points)

MAC Spoofing, Man-in-the-middle attack

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

Firewall [Software, Hardware]

Virtual LANs, Virtual Private Networks

Secured and encrypted access to resources

De-Militarized Zones

Intrusion Detection & Prevention System

Honeypots

Directory Services (LDAP, MS-ADS)

Vulnerability Assessment tools (Nessus, Wireshark)

Penetration Testing assessment

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

De-Militarized Zones

Virtual LANs

Authentication, Authorization, Auditing Service (Desktop,Web)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

De-Militarized Zones

Virtual LANs

Authentication, Authorization, Auditing Service (Desktop,Web)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

De-Militarized Zones

Virtual LANs

Authentication, Authorization, Auditing Service (Desktop,Web)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

De-Militarized Zones

Virtual LANs

Authentication, Authorization, Auditing Service (Desktop,Web)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

What is network securityThreats to network securityTools of network securitySecure network devices

De-Militarized Zones

Virtual LANs

Authentication, Authorization, Auditing Service (Desktop,Web)

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Information Security ConcernsSoftware Vulnerabilties

Network Security and AuthenticationOpen Discussion

Sukant Kole BPOI-007 Course 7 - IT Skills: DBPO-Finance & Accounting

Recommended