Security strategies
This presentation is the property of its rightful owner.
Sponsored Links
1 / 12

Security Strategies PowerPoint PPT Presentation


  • 40 Views
  • Uploaded on
  • Presentation posted in: General

Security Strategies. By Debbie Flemming, MCSE, CSSA Communications Network Engineer. Overview. Access Risks for your Company How to protect those Risks How to protect your internal Network from the WAN. THREATS Attacks from viruses, Trojans, or other malware

Download Presentation

Security Strategies

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Security strategies

Security Strategies

By Debbie Flemming, MCSE, CSSA

Communications Network Engineer


Overview

Overview

  • Access Risks for your Company

  • How to protect those Risks

  • How to protect your internal Network from the WAN


Security strategies

  • THREATS

    • Attacks from viruses, Trojans, or other malware

    • Unauthorized access to computer systems

    • Insider abuse of network resources.

    • This includes problems such as using the internet for

    • non-work related access or downloading unlicensed software


Security strategies

  • RISK ASSESSMENT

    • What data and applications are most valuable to your organization?

    • Where do your most valuable data and applications reside?

    • What will the impact from a loss of data or applications,

  • such as downtime caused by the virus attach?

    • What is the most cost effective way to address the risks?


Security strategies

  • Protect Desktops and Servers

  • Reduce time and labor costs for deployment of operating systems,

  • software, and updates

  • Fewer conflicts between applications due to more uniform environment

  • Increased use productivity due to reduced downtime from

  • malicious attacks or software


Protect your lan

Protect your LAN

  • Update operating systems and software

  • Use anti-malware software

  • Protect Your Data – Data Backup

  • Take advantage of Directory Services

  • Protect Documents with rights management


Protect network

Protect Network


Firewall at perimeter

Firewall at Perimeter


Security strategies

Firewall

VPN

Server

Internet

Telecommunter

VPN’s for Telecommuters


Summary

Summary

  • Risk Management

  • Protect Desktops and Servers

  • Protect Networks


Security strategies

Questions?


  • Login