Presentation is loading. Please wait.

Presentation is loading. Please wait.

Recommending a Security Strategy

Similar presentations


Presentation on theme: "Recommending a Security Strategy"— Presentation transcript:

1 Recommending a Security Strategy
Ideas for today and tomorrow

2 Industry breach discovery
A few of our firm’s major competitors experienced a security data breach in its undisclosed cross-functional enterprise systems within a three-month timeframe. This event heightened the security awareness for our company.

3 Common Computer breaches
Figure 1

4 Enterprise-level Security action plan
IT Department Suppliers, Employees, and customers Implement the Security changes: For Suppliers Add a new Access Rule to Firewall Add certificate of Authority from a Third party [VeriSign] Add Public Key Encryption For Employees Add new Security Policies and train everyone in a Mandatory meeting Enforcement of Security Plan For Customers FAQ Best Practices with our software and hardware Internal Action Plan User Education and Training Develop FAQ from meetings Creation of a Honey Pot using Cisco Reviewing/Monitoring data Study Pharming attacks Create Access rules for the Network firewall. Review Potential Vulnerabilities

5 IT Reviews these potential vulnerabilities
Study Elevation of privilege Hoaxes Packet tampering Sniffer Spoofing Splogs Spyware Dumpster Diving Social engineering, hackers use their social skills to trick people into revealing access credentials or other valuable information.

6 Employees new security guidelines
Mandatory Computer-Use Meetings & sign document Discuss new Security Policies Computer do’s and dont’s in simple language

7 Security for Supplier Connections
The IT Teams will add specific computers from the Suppliers to have access to our network Set up a Certificate of Authority with a third party [VeriSign] Add Public Key Encryption

8 Security recommendations for customers
Add related FAQs to Customer Access area Add other Security Tips and expectations from firm, if a Virus or Worm found when connecting,

9 Network Security Plan for internal use
Certain file sharing applications are prohibited to be used on the corporate network. Kazaz, and IM software leaks cookies onto the network. Corporate laptops and computers can not be used for personal use. Virus protection scans every day with updates Authentication and authorization occurs by department only. New Information Security policies Requiring users to log off before leaving for lunch or meetings Never share passwords – and changing it every 30 days. Specific s and links to not click on No social engineering sites utilized on work computers, except Linked-In

10 Bibliography Google Images( figure1). (n.d.). Retrieved December 05, 2016, from Paige Baltzan. (2015). Business-Driven Technology. 6th Edition.


Download ppt "Recommending a Security Strategy"

Similar presentations


Ads by Google