1 / 12

Security Strategies

Security Strategies. By Debbie Flemming, MCSE, CSSA Communications Network Engineer. Overview. Access Risks for your Company How to protect those Risks How to protect your internal Network from the WAN. THREATS Attacks from viruses, Trojans, or other malware

reya
Télécharger la présentation

Security Strategies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Strategies By Debbie Flemming, MCSE, CSSA Communications Network Engineer

  2. Overview • Access Risks for your Company • How to protect those Risks • How to protect your internal Network from the WAN

  3. THREATS • Attacks from viruses, Trojans, or other malware • Unauthorized access to computer systems • Insider abuse of network resources. • This includes problems such as using the internet for • non-work related access or downloading unlicensed software

  4. RISK ASSESSMENT • What data and applications are most valuable to your organization? • Where do your most valuable data and applications reside? • What will the impact from a loss of data or applications, • such as downtime caused by the virus attach? • What is the most cost effective way to address the risks?

  5. Protect Desktops and Servers • Reduce time and labor costs for deployment of operating systems, • software, and updates • Fewer conflicts between applications due to more uniform environment • Increased use productivity due to reduced downtime from • malicious attacks or software

  6. Protect your LAN • Update operating systems and software • Use anti-malware software • Protect Your Data – Data Backup • Take advantage of Directory Services • Protect Documents with rights management

  7. Protect Network

  8. Firewall at Perimeter

  9. Firewall VPN Server Internet Telecommunter VPN’s for Telecommuters

  10. Summary • Risk Management • Protect Desktops and Servers • Protect Networks

  11. Questions?

More Related