Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Pertemuan 9 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.

Similar presentations


Presentation on theme: "1 Pertemuan 9 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1."— Presentation transcript:

1 1 Pertemuan 9 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1

2 2 Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Mahasiswa dapat menyatakan Software Protection

3 3 Outline Materi Corporate profile: Proseq –What Do We Do? –How Do We Do It? –The Bottom Line –Vulnerability Update and Testing Service –Our Centre of Excellence and Our Partners Intrusion Detection –IDS Acceptance as A Recognised Component to Security –IDS Is Not ‘Fire and Forget’ –IDS Should Be part of Your Reaction to The Threat –Management by Specialist

4 4 Corporate Profile: Proseq In an increasingly uncertain world there’s one thing that you can be sure of – someone, somewhere is a busing your network or the services that are key to your business, be it on the Internet or on a private network.

5 5 What Do We Do? In a nutshell, our partners either integrate our service to provide secure Internet services, or they provide unique security services with the required level of local support.

6 6 How Do We Do It? Our partners provide our customers with everything from simple standarised security monitoring and handling SLAs to bespoke SLAs, integrating data and sensors from a variety of sources and not only the standard intrusion detection systems (IDSs).

7 7 The Bottom Line Of course, network abuse management isn’t just for fun.

8 8 Vulnerability Update and Testing Service Our well-established Vulnerability Update and testing service provides customers with the very latest information on all known vulnerability discoveries and will even advise you when new patches become available.

9 9 Our Centre of Excellence and Our Partners Naturally, while we make good use of our state-of-the-art software and hardware facilities, the one thing that we have become famous for is our highly trained and dedicated personnel.

10 10 Intrusion Detection IDS Acceptance as A Recognised Component to Security IDS Is Not ‘Fire and Forget’ IDS Should Be part of Your Reaction to The Threat Management by Specialist

11 11 IDS Acceptance as A Recognised Component to Security A common analogy applied to intrusion detection systems and firewalls is that of your home. It is common practice for people to buy an alarm or even a dog to complement the locks and doors of a house.

12 12 IDS IS Not ‘Fire and Forget’ There are two key points to remember regarding intrusion detection: –It does not assess and anticipate vulnerabilities in the network so much as monitor those areas of the network that administrators believe are vulnerable. –It does not automatically protect and secure a network once it detects an attack.

13 13 IDS Should Be Part of Your Reaction to The Threat Compaq estimate that the average financial trading house.

14 14 Management by Specialists The nature of intrusion detection integrates with the ‘managed security’ model to a greater extent than perhaps any other security technology. Intrusion detection should be a technology explored by any company that is serious about the threat inherent in today’s connected business world.

15 15 The End


Download ppt "1 Pertemuan 9 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1."

Similar presentations


Ads by Google