E Safety & Security Tools 13 th March 2009 Martin Quinn - The Westfield Centre.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Day 19. Security Tools Firewalls –Host Based –Network based IDS/IPS –Host Based –Network based –Signature based detection –Anomaly based detection Anti.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Protecting Students on the School Computer Network Enfield High School.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Because you need to protect your computers!!! By: Ashley Hubbard.
Stephanie Mercury.  A firewall allows or blocks traffic into and out of a private network or the user's computer.
NetTech Solutions Protecting the Computer Lesson 10.
Internet safety By Suman Nazir
Computer Security By Duncan Hall.
Chapter 10 Studycast Marilee Betz.  is NOT private or confidential.  Created by committees.  Vary  GAME PLAN  Common elements  Glossary of.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Web Content Security Unlock the Power of the Web
Barracuda NG Firewall ™
Chapter 40 Internet Security.
Managing Windows Security
Three steps to prevent Malware infection
COMPUTER CRIMES Presented by THABO.
Daniel “3ICE” Berezvai Reverse Proxy Presentation by:
Chapter 6 Application Hardening
Unit 4 IT Security.
Backdoor Attacks.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Cyber Security By: Pratik Gandhi.
Jon Peppler, Menlo Security Channels
Security in Networking
Unit 27: Network Operating Systems
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
ISMS Information Security Management System
PART 2.
Introduction to Systems Security
Computer Security.
Fire-wall.
Communications & Computer Networks Resource Notes - Introduction
AbbottLink™ - IP Address Overview
Computer Security By: Muhammed Anwar.
Hosted Security.
INTERNET SECURITY.
Presentation transcript:

E Safety & Security Tools 13 th March 2009 Martin Quinn - The Westfield Centre

Multi Layered Approach Firewall Proxy Server Web Filtering Spam Filtering NED Boxes Anti Virus Software E Safety Software

Lancashire Firewall Internet CLEO Network Lancashire Firewall School Computers Internet Computer Prevents Computers on the Internet making connections to a school computer

Proxy Servers Proxy Servers – Provide a controlled means of getting out on to the internet –Provide a route to internet -Prevent Computers connecting Directly to Internet –Web traffic going through the proxy servers is subject to the filtering. –Log where web traffic is going

Stats Proxies deal with 65 Million Websites a day 1.2 million Website blocked a day –Most Block pages are adware –15,000 + sites classed as Pornographic –20,000 + sites involve nudity

Web Filtering Smart Filter Web Filtering –Uses TrustedSource technology which acts like a credit rating agency for websites –Protects against anonymous proxies which attempt to bypass filtering

Spam Filtering – goes through spam filters before it gets delivered to school which strips out a lot of spam –Virtually all spam generated from “zombie” computers –93% of received is spam

Sophos Anti Virus Every day Sophos detects newly infected websites Protects against malicious programs that could ‘infect’ a computer and allow it to act as a host for inappropriate applications All Lancashire schools can use Sophos AV software

CLEO NED Ned Boxes host Espresso but allow schools to instantly block unsuitable sites They provide Logs that allow schools to see which web sites their users have been visiting. Forthcoming development is a greater degree of integration with Windows Active Directory to allow you to filter by AD groups

E Safety Software Monitors the whole school network not just the internet activity Provides a range of easily accessible reports Aiming for a launch in Summer Term

Thankyou