Is Ppt is Ppt 1sst 10 Pranj

Embed Size (px)

Citation preview

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    1/34

    Akshay Anil Ganar (31)

    Anand Digamber Gawade (32)

    Pranjal Balkrishnar Gharat (33)

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    2/34

    Security, for a computing system, meansthat the information on the system is protected

    from unauthorized disclosure

    There are many ways in which the security

    of a computer system can be

    violated.

    The National Institute of Standards and Technology mainly

    oversees the issues of security and sets forth the rules andregulations.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    3/34

    Inside Attack:

    This is because the insider has a better knowledge of your

    systems functioning & hence it is easier to attack. These may be

    either ex-employee or unsatisfied employees.

    Attacks from outside :The outsider who would attack your security may be either your

    competitors or someone just making fun or trying out their luck or

    experimenting by disturbing your systems without any specialreasons.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    4/34

    Some apparently useful programs also contain features withhidden malicious intent.

    Malwares: This is the most general name for any malicious softwaredesigned for example to infiltrate, spy on or damage a computer .

    Trojans: These are programs which may pretend to do one thing, but in realitysteal information, alter it or cause other problems on a such as a computer.

    Spyware: This includes programs that surreptitiously monitor keystrokes, or

    other activity on a computer system . Worm: These are programs which are able to replicate themselves over a

    computer network, and also perform malicious acts.

    Bots: Bots are programs that take over and use the resources of a computersystem over a network without consent, and communicate those results to others

    who may control the Bots.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    5/34

    How much each of these threats affects the system

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    6/34

    These sites can pose serious threats to organizations.

    Social networking sites are breeding grounds for SPAM, scams, shareware and ahost of other attacks and these threats will continue to rise.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    7/34

    Social engineering is always a popular tool used by cyber criminals and

    phishing is still a popular method for doing just that.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    8/34

    Dos attacks are probably the nastiest and difficult to address. These are very

    easy to launch, difficult to track and isnt easy to refuse the requests of the

    attacker, without also refusing legitimate requests for service.

    There are toolkits available in the underground community that make this asimple matter of running a program and telling it which host to blast with

    request.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    9/34

    Classify information based on its importance, assigning security clearances

    to employees as needed.

    Install and use anti-virus software programs that scan PCs, computer

    networks, CDROMs, tape drives, diskettes, and Internet material, and

    destroy viruses when found.

    Update anti-virus programs on a regular basis.

    Forbid employees from putting programs on their office computers

    without company approval.

    Monitor activities of employees who keep odd hours at the office. Make

    certain that the company's hiring process includes extensive backgroundchecks, especially in cases where the employee would be handling

    sensitive information.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    10/34

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    11/34

    Founded in 1919, Halliburton is one of the world's largest providers of products

    and services to the oil and gas industry. It employs more than 50,000 people in

    nearly 70 countries.

    Halliburton Company provides various products and services to the energy

    industry for the exploration, development, and production of oil and natural gas. It

    operates in two segments, Completion and Production, and Drilling and

    Evaluation. Its services include fluid services, drilling services, drill bits, wire line

    and perforating services, testing and subsea services, software and asset solutions,

    and consulting and data management services.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    12/34

    Halliburton consists of two operating divisions

    Drilling and Evaluation : provides directional drilling services, drill bits and drilling fluid

    systems; data-gathering services such as logging and logging-while-drilling that help

    operators make initial evaluations of the formation.

    Completion and Production : provides cementing services which give structural support for

    the wellbore casing and isolate the producing zones; completion services including down

    hole and surface equipment, expandable and well technologies, and reservoir testing

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    13/34

    Company wants specially preferred for security solutions that required high

    processing speed as are the semi-trusted connections between peering

    businesses.

    Management teams that wants more centralized control and greater asset

    visibility.

    The employees are accessing social networking sites so company wants to

    restrict that sites they should allow to access the necessary sites only.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    14/34

    They should use the good antivirus and firewall protection to achieve high

    level of security.

    The information that is transferred over the network should be protected

    using better fire firewall configuration

    Restrict user to access non commercial sites using firewall configurationAll the resources including software and hardware should be protected by

    antivirus.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    15/34

    To monitor network activity in personal computer connected in network

    Microsoft Provides Firewall

    Start--->> Control Panel-->>security Center:

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    16/34

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    17/34

    Internet Settings to restrict useraccess for particular websites

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    18/34

    Halliburton use Norton 360 as Antivirus and Firewall Protection.

    Norton 360, developed by Symantec, is marketed as an "all-in-one" security suite. The

    package includes a personal firewall, phishing protection and the ability to detect and

    remove malware. Separating this suite from Norton Internet Security is the inclusion of file

    backup and PC maintenance capabilities.

    Symantec announced Project Genesis on February 7, 2006. Genesis would differ from

    Symantec's other consumer security products by incorporating file backup and PC

    maintenance tools with antivirus capabilities and a firewall. Phishing protection and real-

    time heuristics were also planned. Windows Vista compatibility was a major aspect ofGenesis.

    Genesis was renamed Norton 360 on May 31, 2006. Its feature set was confirmed it would

    have the same functionalities of Norton Internet Security with file backup, PC

    maintenance, phishing protection, and real-time heuristics.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    19/34

    Norton 360 4.0 delivers comprehensive Internet protection against all types of onlinethreats combining antivirus, anti-spyware, anti-phishing and identity protection tools

    in one handy application.

    Online Security

    Defends against most known online threats. Norton 360 makes use of Symantecs

    cutting-edge technology including sophisticated root kit detection features toprotect against spyware, viruses and many more.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    20/34

    Online Transaction SecurityNorton 360 protects against online identity theft. It safeguards your PC by identifying

    booby-trapped Web sites and automatically authenticates the most popular bankingand shopping sites. Symantec's advanced technology prevents phishing and email

    scam attacks to help protect your personal/billing information.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    21/34

    Automatic definition updates

    Norton 360 Live Update to keep the virus database up-to-date protecting againstthe latest online threats. It comes with automatic virus definition updates and

    feature updates to ensure your threat definitions stay current and that you are

    protected at the best possible level.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    22/34

    Backup and Restore

    To prevent your data from loss, Norton 360 version 4.0 performs automatic backups

    and restores data on request. You can use Symantec online storage space of 2Gb that

    comes free with your Norton 360 installation to upload your files.

    Storing data off-line provides extra protection when your computer is stolen or

    damaged.Optionally, you can buy Norton 360's additional online backup space for ifyou need more room for your files.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    23/34

    Norton 360 Updates

    Norton 360 will download and update any missing or outdated threat definitions

    automatically.

    You can arm yourself with optional components for Parental Control, Spam Control or

    protection against information theft.

    Parental Control and the anti-spam software called Spam Control, are freedownloads that can be obtained separately from the Symantec website.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    24/34

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    25/34

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    26/34

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    27/34

    Norton 360 4.0 PerformanceNorton 360 version 4.0 delivers significantly improved performance when

    compared to its previous version. Boot time is shorter, application starts quicker

    and most of the maintenance and/or tests are run in the background when the

    PC is idle to avoid system slowdown.

    Norton 360 combines Symantecs proven internet security and PC tune-up

    features with new anti-spyware and anti-phishing tools plus the and best-of-

    breed automatic backup technologies.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    28/34

    (SymantecOnline Network for Advanced Response)

    Unlike virus signatures, SONAR examines the behavior of applications to decide

    whether they are malicious.

    Various factors are considered before determining that a program is malicious, such as

    if the program adds a shortcut on the desktop or creates a Windows Add/Removeprograms entry. Both of those factors would indicate the program is not malware. The

    main use of SONAR is to enhance detection of zero day threats.

    zero-day attacks are based on flaws that are unknown, or have not yet been patched

    by the vendor, and they are particularly effective against signature-based antivirus

    protection. SONAR uses an algorithm to evaluate hundreds of attributes relating to

    software that is running on the computer, so it can spot malicious software, whether

    it's already been identified by Symantec researchers or not.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    29/34

    Norton provides quick scan to system by which user can scan a particular file. It also include

    fast scan which only scans infected files it also provide the option that disinfect the files.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    30/34

    Identifies applications that may be impacting your PCs performance, making it easier to

    keep your computer running at its best.

    Norton also rates the application while scanning them as per their health.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    31/34

    Norton checks the web sites and prompts that whether web site in secure or not. It shows

    Red Cross mark for unsecured web sites and green checkmark for secure web sites.It protects system from viruses and malwares.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    32/34

    Online Backup up to 2GB

    Reduces PC start-up time

    Protects your PC, online activities and your identity

    Delivers up to the minute virus protection

    Defends your wireless network from intruders

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    33/34

    Using Norton 360 our organization gets high level of security.

    It has increased the performance of the system.

    If product is not updated for long period of time then it willaffect your system.

  • 8/8/2019 Is Ppt is Ppt 1sst 10 Pranj

    34/34