Guest Lecture - Current Industry Standards On Network Security.pptx

Guest Lecture - Current Industry Standards On Network Security.pptx

This preview shows page 1 - 10 out of 32 pages.

Current Industry Standards for Network Security Presented By: Subho Roy Chowdhury Varsha Anandani Hewlett Packard Enterprise R&D Bangalore
Image of page 1

Subscribe to view the full document.

Agenda Introduction to Network Security Why Security is important? Types of Network Security Policies, Standards, and Procedures Effective Policies What Drives Policy Development? Types of Information Security Policies Enterprise Information Security Policy (EISP) Issue-Specific Security Policy (ISSP)
Image of page 2
Agenda Systems-Specific Policy (SysSP) Frameworks and Industry Standards Security Providers and Products NIST Security Models FIPS SETA HPE Standards for Network Security Summary QA
Image of page 3

Subscribe to view the full document.

Introduction No Sinhalese, whether man or woman, would venture out of the house without a bunch of keys in his hand, for without such a talisman he would fear that some devil might take advantage of his weak state to slip into his body. —The Golden Bough, Sir James George Frazer
Image of page 4
What is Network Security The Internet is a public network consisting of thousands of interconnected private computer networks. Private computer network systems are exposed to threats from anywhere on the public network. Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment.
Image of page 5

Subscribe to view the full document.

Why Security is important? Digitization has transformed our world. How we live, work, play, and learn have all changed. Every organization that wants to deliver the services that customers and employees demand must protect its network. Network security also helps you protect proprietary information from attack. Ultimately it protects your reputation.
Image of page 6
15-441 Networks Fall 2002 7 Who is vulnerable? Financial institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK
Image of page 7

Subscribe to view the full document.

How Does Network Security Works? Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats.
Image of page 8
Types Of Network Security Access Control Antivirus and Antimalware software Application security Behavior Analytics Data loss prevention Email security Firewalls Intrusion prevention systems
Image of page 9

Subscribe to view the full document.

Contd… Mobile Device Security Network segmentation Security information and event management VPN Web security Wireless security
Image of page 10
You've reached the end of this preview.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern