Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.

Slides:



Advertisements
Similar presentations
To ensure quality instruction and educational success, NVC Information Technology is committed to delivering high quality technical leadership, resources,
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Enterprise Architecture in Action Bill Branson Director, Information Technology Architecture Frank Russell Company.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Purdue University proudly presents Doug Couch & Nathan Heck, IT Security Analysts.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
© 2008 McAfee, Inc. “Endpoint” Security Defining the endpoints and how to protect them.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Digital Technology Basics Digital Technology Basics includes two lessons:  Lesson 1: The Modern Digital Experience  Lesson 2: Digital Technology & Career.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
New Data Regulation Law 201 CMR TJX Video.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Introduction to computers. What is a personal computer? Capacity: Large hard disks combined with a large working memory (RAM) Speed: Fast. Normally measured.
1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th.
INFORMATION SECURITY THE NEXT GENERATION 13 th World Electronics Forum Israel Christopher Joscelyne Board Member & Membership Chairman AEEMA November 2007.
NW Security and Firewalls Network Security
ELKAT Security Engineering Ltd. Poland Activity Plan Avi Arbili Regional Sales Director – Europe Cell:+972-(0) 52 – Tel: +972-(0) Fax:
2006 vs Domain% of Exam 1.0 Personal Computer Components 21% 2.0 Laptop and Portable Devices 11% 3.0 Operating Systems 21% 4.0 Printers.
INFORMATION TECHNOLOGY Personal Electronic Devices Information Technology College of Public and Community Service University of Massachusetts at Boston.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Surviving in a hostile world  The myth of fortress applications  Tomas Olovsson CTO, Appgate Professor at Goteborg University, Sweden.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Introduction to Windows 7. Desktop Maximize, Minimizing, and Restoring.
1.1 System Performance Security Module 1 Version 5.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Exploring the Network.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 6 of the Executive Guide manual Technology.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Getting a Grip on Mobile Devices. Last year thousands of travellers left personal items in London taxi cabs.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
The Changing World of Endpoint Protection
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
Development of a Clean Room/Highly Restricted Zone June 12, 2012 Thomas Garrubba - CVS Caremark; Manager, Technical Assessments Group ©2011 The Shared.
CPT 123 Internet Skills Class Notes Internet Security Session B.
OIT and IT providers across campus are launching an awareness campaign to provide tips and resources to help you stay safe online and protect AU resources.
IS3220 Information Technology Infrastructure Security
LO2 Understand the key components used in networking.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
SY0-401 COMPTIA Security+ Certification Exam Vcepracticetest.com.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Chapter 7. Identifying Assets and Activities to Be Protected
Level 2 Diploma Unit 11 IT Security
TECHNOLOGY GUIDE THREE
4 Windows 7.
HARDENING CLIENT COMPUTERS
Securing the Network Perimeter with ISA 2004
IS4550 Security Policies and Implementation
برنامج أمن أنظمة الحاسب
Implementing Client Security on Windows 2000 and Windows XP Level 150
Unit 1 insight – Hardware and software of a computer
Data Lost Prevention (DLP) © Copyright 2009 Technica All rights reserved. No part of this presentation in all its property may be used or reproduced in.
Comodo Dome Data Protection
Presentation transcript:

Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson

Copyright Security-Assessment.com 2004

The issues Information Loss Perimeter Breakdown Mobile Users New Technology Vulnerabilities Future Directions

Copyright Security-Assessment.com 2004 Perimeter Breakdown Perimeters slowly disappearing – VPN – Partner Connections – Home Users – Wireless Insecurities Zones of Trust Testing Security

Copyright Security-Assessment.com 2004 Laptop Users Current Laptop Loss Rate >4% Information and hardware costs Theft Prevention on increase Minimum controls required for mobile population – Personal Firewall – AV – Disk Encryption Policy and Security Architecture Requirements Citrix is your Friend!

Copyright Security-Assessment.com 2004 New Technology and Information Loss USB Fobs External Memory Cards CD / DVD Writers Common PDA’s Integration of Cell Phone Technology IM VoIP

Copyright Security-Assessment.com 2004

General Strategies Track New Technology Opportunities Research and define Policy Default Deny Enforce Policy – Technical Controls – Policy Controls – HR Controls – Approval / Authorisation Controls

Copyright Security-Assessment.com 2004 VoIP Implement your strategy and policy Architect! Default Deny “Free is not necessarily cost effective” Research Be Proactive. Your people are using this now.

Copyright Security-Assessment.com 2004 Instant Messaging Manage malicious code via A/V or other means Control at the gateway – Default Deny – Man in the Middle inspection Have approved processes and systems

Copyright Security-Assessment.com 2004 Mobile Storage Devices Encrypt removable media USB management of storage devices Flash memory security Allow managed access to USB storage devices Block illegal software installation Block.exe.com.vbs.mp3 files etc Printer, modem permissions management Client side content filtering of removable media

Copyright Security-Assessment.com 2004 Mobile Communications Discover your Mobile Perimeter – Asset Database, exposure management – Capture changes to Mobile Perimeter – Vulnerabilities – Connections Control Connectivity Control Mobile Information Security – Encryption – A/V – Content

Copyright Security-Assessment.com 2004 Emerging Enforcement Technologies Reflex Magnetics, Reflex Disk Net Pro Trust Digital, Trust Enterprise Mobile Suite Asset Discovery and Management Anti-Spyware for Enterprises Connection Enforcement Enterprise Quality Encryption for Laptops / Mobile Systems Application Aware Firewalls MITM Proxys Fractured Networks (zones of trust)

Copyright Security-Assessment.com 2004

Thank You Questions?