Upload
pranjal-gharat
View
221
Download
0
Embed Size (px)
Citation preview
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
1/34
Akshay Anil Ganar (31)
Anand Digamber Gawade (32)
Pranjal Balkrishnar Gharat (33)
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
2/34
Security, for a computing system, meansthat the information on the system is protected
from unauthorized disclosure
There are many ways in which the security
of a computer system can be
violated.
The National Institute of Standards and Technology mainly
oversees the issues of security and sets forth the rules andregulations.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
3/34
Inside Attack:
This is because the insider has a better knowledge of your
systems functioning & hence it is easier to attack. These may be
either ex-employee or unsatisfied employees.
Attacks from outside :The outsider who would attack your security may be either your
competitors or someone just making fun or trying out their luck or
experimenting by disturbing your systems without any specialreasons.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
4/34
Some apparently useful programs also contain features withhidden malicious intent.
Malwares: This is the most general name for any malicious softwaredesigned for example to infiltrate, spy on or damage a computer .
Trojans: These are programs which may pretend to do one thing, but in realitysteal information, alter it or cause other problems on a such as a computer.
Spyware: This includes programs that surreptitiously monitor keystrokes, or
other activity on a computer system . Worm: These are programs which are able to replicate themselves over a
computer network, and also perform malicious acts.
Bots: Bots are programs that take over and use the resources of a computersystem over a network without consent, and communicate those results to others
who may control the Bots.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
5/34
How much each of these threats affects the system
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
6/34
These sites can pose serious threats to organizations.
Social networking sites are breeding grounds for SPAM, scams, shareware and ahost of other attacks and these threats will continue to rise.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
7/34
Social engineering is always a popular tool used by cyber criminals and
phishing is still a popular method for doing just that.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
8/34
Dos attacks are probably the nastiest and difficult to address. These are very
easy to launch, difficult to track and isnt easy to refuse the requests of the
attacker, without also refusing legitimate requests for service.
There are toolkits available in the underground community that make this asimple matter of running a program and telling it which host to blast with
request.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
9/34
Classify information based on its importance, assigning security clearances
to employees as needed.
Install and use anti-virus software programs that scan PCs, computer
networks, CDROMs, tape drives, diskettes, and Internet material, and
destroy viruses when found.
Update anti-virus programs on a regular basis.
Forbid employees from putting programs on their office computers
without company approval.
Monitor activities of employees who keep odd hours at the office. Make
certain that the company's hiring process includes extensive backgroundchecks, especially in cases where the employee would be handling
sensitive information.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
10/34
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
11/34
Founded in 1919, Halliburton is one of the world's largest providers of products
and services to the oil and gas industry. It employs more than 50,000 people in
nearly 70 countries.
Halliburton Company provides various products and services to the energy
industry for the exploration, development, and production of oil and natural gas. It
operates in two segments, Completion and Production, and Drilling and
Evaluation. Its services include fluid services, drilling services, drill bits, wire line
and perforating services, testing and subsea services, software and asset solutions,
and consulting and data management services.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
12/34
Halliburton consists of two operating divisions
Drilling and Evaluation : provides directional drilling services, drill bits and drilling fluid
systems; data-gathering services such as logging and logging-while-drilling that help
operators make initial evaluations of the formation.
Completion and Production : provides cementing services which give structural support for
the wellbore casing and isolate the producing zones; completion services including down
hole and surface equipment, expandable and well technologies, and reservoir testing
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
13/34
Company wants specially preferred for security solutions that required high
processing speed as are the semi-trusted connections between peering
businesses.
Management teams that wants more centralized control and greater asset
visibility.
The employees are accessing social networking sites so company wants to
restrict that sites they should allow to access the necessary sites only.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
14/34
They should use the good antivirus and firewall protection to achieve high
level of security.
The information that is transferred over the network should be protected
using better fire firewall configuration
Restrict user to access non commercial sites using firewall configurationAll the resources including software and hardware should be protected by
antivirus.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
15/34
To monitor network activity in personal computer connected in network
Microsoft Provides Firewall
Start--->> Control Panel-->>security Center:
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
16/34
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
17/34
Internet Settings to restrict useraccess for particular websites
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
18/34
Halliburton use Norton 360 as Antivirus and Firewall Protection.
Norton 360, developed by Symantec, is marketed as an "all-in-one" security suite. The
package includes a personal firewall, phishing protection and the ability to detect and
remove malware. Separating this suite from Norton Internet Security is the inclusion of file
backup and PC maintenance capabilities.
Symantec announced Project Genesis on February 7, 2006. Genesis would differ from
Symantec's other consumer security products by incorporating file backup and PC
maintenance tools with antivirus capabilities and a firewall. Phishing protection and real-
time heuristics were also planned. Windows Vista compatibility was a major aspect ofGenesis.
Genesis was renamed Norton 360 on May 31, 2006. Its feature set was confirmed it would
have the same functionalities of Norton Internet Security with file backup, PC
maintenance, phishing protection, and real-time heuristics.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
19/34
Norton 360 4.0 delivers comprehensive Internet protection against all types of onlinethreats combining antivirus, anti-spyware, anti-phishing and identity protection tools
in one handy application.
Online Security
Defends against most known online threats. Norton 360 makes use of Symantecs
cutting-edge technology including sophisticated root kit detection features toprotect against spyware, viruses and many more.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
20/34
Online Transaction SecurityNorton 360 protects against online identity theft. It safeguards your PC by identifying
booby-trapped Web sites and automatically authenticates the most popular bankingand shopping sites. Symantec's advanced technology prevents phishing and email
scam attacks to help protect your personal/billing information.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
21/34
Automatic definition updates
Norton 360 Live Update to keep the virus database up-to-date protecting againstthe latest online threats. It comes with automatic virus definition updates and
feature updates to ensure your threat definitions stay current and that you are
protected at the best possible level.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
22/34
Backup and Restore
To prevent your data from loss, Norton 360 version 4.0 performs automatic backups
and restores data on request. You can use Symantec online storage space of 2Gb that
comes free with your Norton 360 installation to upload your files.
Storing data off-line provides extra protection when your computer is stolen or
damaged.Optionally, you can buy Norton 360's additional online backup space for ifyou need more room for your files.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
23/34
Norton 360 Updates
Norton 360 will download and update any missing or outdated threat definitions
automatically.
You can arm yourself with optional components for Parental Control, Spam Control or
protection against information theft.
Parental Control and the anti-spam software called Spam Control, are freedownloads that can be obtained separately from the Symantec website.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
24/34
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
25/34
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
26/34
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
27/34
Norton 360 4.0 PerformanceNorton 360 version 4.0 delivers significantly improved performance when
compared to its previous version. Boot time is shorter, application starts quicker
and most of the maintenance and/or tests are run in the background when the
PC is idle to avoid system slowdown.
Norton 360 combines Symantecs proven internet security and PC tune-up
features with new anti-spyware and anti-phishing tools plus the and best-of-
breed automatic backup technologies.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
28/34
(SymantecOnline Network for Advanced Response)
Unlike virus signatures, SONAR examines the behavior of applications to decide
whether they are malicious.
Various factors are considered before determining that a program is malicious, such as
if the program adds a shortcut on the desktop or creates a Windows Add/Removeprograms entry. Both of those factors would indicate the program is not malware. The
main use of SONAR is to enhance detection of zero day threats.
zero-day attacks are based on flaws that are unknown, or have not yet been patched
by the vendor, and they are particularly effective against signature-based antivirus
protection. SONAR uses an algorithm to evaluate hundreds of attributes relating to
software that is running on the computer, so it can spot malicious software, whether
it's already been identified by Symantec researchers or not.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
29/34
Norton provides quick scan to system by which user can scan a particular file. It also include
fast scan which only scans infected files it also provide the option that disinfect the files.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
30/34
Identifies applications that may be impacting your PCs performance, making it easier to
keep your computer running at its best.
Norton also rates the application while scanning them as per their health.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
31/34
Norton checks the web sites and prompts that whether web site in secure or not. It shows
Red Cross mark for unsecured web sites and green checkmark for secure web sites.It protects system from viruses and malwares.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
32/34
Online Backup up to 2GB
Reduces PC start-up time
Protects your PC, online activities and your identity
Delivers up to the minute virus protection
Defends your wireless network from intruders
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
33/34
Using Norton 360 our organization gets high level of security.
It has increased the performance of the system.
If product is not updated for long period of time then it willaffect your system.
8/8/2019 Is Ppt is Ppt 1sst 10 Pranj
34/34