Anshika

23
Network Security Solution For United Colours of Benetton Presented by- Anshika Mishra Compton Computers Pvt. Ltd.

Transcript of Anshika

Page 1: Anshika

Network Security SolutionFor

United Colours of Benetton

Presented by-

Anshika MishraCompton Computers Pvt. Ltd.

Page 2: Anshika

04/13/2023 compton computers pvt. ltd. 2

About UCB

• Benetton Group is a global fashion brand.

• Benetton family who founded the company in 1965.

• Benetton has a network of over 6,500 stores in 120

countries.

• Benetton Group is one of the best-known fashion

companies in the world.

• 1st store in Belluno and 3yrs after in Paris.

Page 3: Anshika

04/13/2023 compton computers pvt. ltd. 3

• over 9,500 employees.

• Benetton has developed a network of small suppliers.

• Benetton is known for sponsorship of a number of

sports and for proactive and original “United Color”

publicity campaign.

Page 4: Anshika

04/13/2023 compton computers pvt. ltd. 4

Who are we??• Compton Computers Pvt. Ltd. is one of the leading IT Solution Provider & System

integrator in India.

• Compton has been in this industry from the last 17 years and with it comes 17 valuable years of customer belief.

• An ISO 9001 certified company with Core expertise in designing IT Solution around Structured Cabling, Wired & Wireless Networks, Server Solutions, Storage and Backup Solution, Data Security and Surveillance.

• Compton has done many turn-key projects, where it has integrated end-to-end solutions and won many awards for its work.

• At Compton we concentrate on understanding our clients requirements, design his solution, integrate complete solution for him, optimize it and then put a proactive management approach. Right from designing, integration, optimizing and managing Compton follows a methodological approach complying to all ISO standards.

Page 5: Anshika

04/13/2023 compton computers pvt. ltd. 5

• CRN xcellence Award- Best Private Cloud Deployment in

SME’s 2013

• CRN Xcellence award- Among India’s Best System Integrators

for the year 2012

• Emerson presents Critical Difference Partner Award.

• CRN Xcellence award- Top solution provider- server and

storage –north 2011

• CRN Xcellence award top solution provider-server and

storage –north 2010

• CRN Xcellence award-top integrated solution provider- north

zone 2009

Awards

Page 6: Anshika

04/13/2023 compton computers pvt. ltd. 6

Presentation objective•Understand security services.

•Be aware of vulnerabilities and threats.

•Realize why network security is necessary.

•What are the elements of a comprehensive security program.

Page 7: Anshika

04/13/2023 compton computers pvt. ltd. 7

Challenges of network security Network security architect has following problems:

1. Context Privacy

2. Data Authentication

3. Reliable data storage

3. Data loss/theft

4. Content filtering

5. Malware

6. Intrusion detection

Page 8: Anshika

04/13/2023 compton computers pvt. ltd. 8

Context PrivacyProblems -• It is cumbersome for users to specify for gain policies.• once the data is on the server who can access the hardware.

Solution –• Faces:o Data changes according to who is viewieng.

• Future Research:o Determining what data can be used without being able to infer data.o Grabbing only enough data for application purpose without sacrificing usability.

Page 9: Anshika

04/13/2023 compton computers pvt. ltd. 9

Reliable Data StorageProblems -• Any participant with an appropriately configured device can report falsified data.• Devices are controlled by users. • Incentives to mask private information.

Solution –• Redundancy: o Task cloningo Ground truth

Page 10: Anshika

04/13/2023 compton computers pvt. ltd. 10

Data AuthenticationProblems -• Deals with tempered data during transit.

Solution –• cryptographyo cryptographically enhanced error correcting techniques.

• Encryption:o Encrypted data that shows if it has been tempered with.

Page 11: Anshika

04/13/2023 compton computers pvt. ltd. 11

Data Loss/ Theft

It is an error condition in information system in which information is destroyed by failures or neglect in storage , transmission or processing

Prevention- power failure- multi power circuits with battery back up and a generator. software and hardware failure- journaling file system and RAID storage.

Page 12: Anshika

04/13/2023 compton computers pvt. ltd. 12

Intrusion DetectionA device or software application that monitors network or system activities or policy violation.

Detection Methods:

1. Signature based detection

2. Statistical anomaly based detection 3. Stateful protocol analysis detection

Page 13: Anshika

04/13/2023 compton computers pvt. ltd. 13

5 Worst Security Mistakes1. Opening unsolicited e-mail attachments without

verifying their source and checking their content first.

2. Failing to install security patches especially for microsoft office , microsoft internet explorer.

3. Installing screen savers or games from unknown sources.

4. Not making and testing backups.

5. Using a modem while connected through a LAN

Page 14: Anshika

04/13/2023 compton computers pvt. ltd. 14

Security incidents

Sophistication of HackerTools

Technical Knowledge Required

High

Low 1980 1990 2000

Page 15: Anshika

04/13/2023 compton computers pvt. ltd. 15

Elements of a comprehensive security program Have strong passwordUse good anti viral productUse good cryptographyHave good firewallHave a back up systemAudit and monitor system and network Have training and awareness programTest your security frequently

Page 16: Anshika

04/13/2023 compton computers pvt. ltd. 16

FirewallsA system or group of system that enforces an access control policy between two networks

Page 17: Anshika

04/13/2023 compton computers pvt. ltd. 17

Proposed solutionCYBEROAM-• Provides user identity based network security

• It offers:- network security solution - Centralized security management- Centralized visibility

• Global network security appliances provider, with a global presence spanning more than 125 countries.

• We offer: -cyberoam 300i -cyberoam CR500ia

Page 18: Anshika

04/13/2023 compton computers pvt. ltd. 18

comparisonS. No.

FEATURES CR300i CR500Ia

1. Copper GbE Ports 6 10

2. H/w bypass segment 1 2

3. Firewall throughput(UDP) 2600 Mbps 5000 Mbps

4. Firewall throughput(TCP) 1800 Mbps 3000 Mbps

5. Antivirus throughput 450 Mbps 750 Mbps

6. Back end servers supported 15 25

7. New sessions/seconds 15,000 25,000

8. Concurrent session 500,000 700,000

9. IPS throughput 850 1000

10. UTM throughput 350 550

Page 19: Anshika

04/13/2023 compton computers pvt. ltd. 19

Internet Security?

Malicious CodeSpoofing

Denial of Service

Port Scanning Replay AttackBuffer Overflows

Man-in-the-middle

Session Hijacking

Viruses

Page 20: Anshika

04/13/2023 compton computers pvt. ltd. 20

Page 21: Anshika

04/13/2023 compton computers pvt. ltd. 21

Why Compton?Assured Satisfaction

Low cost of operation

Best Outcome

Accuracy

Expediency

Page 22: Anshika

04/13/2023 compton computers pvt. ltd. 22

Summary• The Internet works only because we implicitly trust one another

• It is very easy to exploit this trust

• The same holds true for software

• It is important to stay on top of the latest security advisories to know how to patch any security holes

Page 23: Anshika

04/13/2023 compton computers pvt. ltd. 23

THANK YOU!!