1 / 6

IT Consultant Project

IT Consultant Project. Chad Lucas. The problem: Hackers, Worms, Trojans, Malware. We live in a day and age where almost all of our information is handled digitally. People and companies keep highly confidential information on networks and it is essential that these things be kept safe.

cora
Télécharger la présentation

IT Consultant Project

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT Consultant Project Chad Lucas

  2. The problem: Hackers, Worms, Trojans, Malware... • We live in a day and age where almost all of our information is handled digitally. • People and companies keep highly confidential information on networks and it is essential that these things be kept safe. • Many people (hackers) and other people who have malicious intentions jeopardize this information and this makes security one of the most important topics concerning IT.

  3. Information Security • Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction – Wikipedia definition. • There are many confidential things that are kept on companies computer networks and databases i.e. credit card information, products, customer information, finances etc. • It is not only important to ensure that this information is kept out of the wrong hands, but also mutually important to ensure that this information is not lost due to viruses or other malware that could potentially cause a crash.

  4. My search technique • When my topic of security was selected I then used search engines such as Google along with scholarly engines such as Business Source Premier. • I gathered information regarding security, including different companies who offered security answers with their products. • Based on my interview, I realized that my IT professional needed good information on the latest and best software and hardware and I did my best to come up with products whose implementation into their business plan would be beneficial.

  5. The Products • The Cisco ASA 5500 Series IPS Solution provides intrusion prevention, firewall, and VPN in a single, easy-to-deploy platform. Intrusion prevention services enhance firewall protection by looking deeper into the flows to provide protection against threats, including worms, Trojans, distributed denial of service, reconnaissance, and exploits against application and OS vulnerabilities. • Juniper Networks IDP Series Intrusion Detection and Prevention Appliances offer the latest capabilities in network intrusion detection and prevention to protect the network from a wide range of attacks. Using industry-recognized stateful intrusion detection and prevention techniques, the IDP Series provides zero-day protection against worms, trojans, spyware, keyloggers, and other malware.

  6. Feedback • The IT professional was very pleased with my findings, he said that the information that I brought back was up-to-date and my thinking was concise. • He did not inform me if he is going to incorporate these products into their business plan or attempt to implement these appliances into their customers networks but he said that there is a strong possibility that he will. • He thanked me for my research and was thankful I chose him for this project.

More Related