Suche senden
Hochladen
Security Risk Management- moeshesh
•
Als PPTX, PDF herunterladen
•
1 gefällt mir
•
1,187 views
Mohamed Shishtawy
Folgen
Technologie
Business
Melden
Teilen
Melden
Teilen
1 von 16
Jetzt herunterladen
Empfohlen
HIPAA HITECH Compliance Assurance Template
HIPAA HITECH Compliance Assurance Template
data brackets
Mct summit na what's new in forefront endpoint protection 2012 beta
Mct summit na what's new in forefront endpoint protection 2012 beta
Peter De Tender
SMS Manager Static Demo | Aviation Safety Management System
SMS Manager Static Demo | Aviation Safety Management System
Universal Weather and Aviation, Inc.
Why do Hand-picked Cherries... (2009)
Why do Hand-picked Cherries... (2009)
Marc Jadoul
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
fcleary
Measured boot for embedded devices
Measured boot for embedded devices
Dmitry Baryshkov
Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)
Ian Sommerville
Mc afee conectando las piezas
Mc afee conectando las piezas
Software Guru
Empfohlen
HIPAA HITECH Compliance Assurance Template
HIPAA HITECH Compliance Assurance Template
data brackets
Mct summit na what's new in forefront endpoint protection 2012 beta
Mct summit na what's new in forefront endpoint protection 2012 beta
Peter De Tender
SMS Manager Static Demo | Aviation Safety Management System
SMS Manager Static Demo | Aviation Safety Management System
Universal Weather and Aviation, Inc.
Why do Hand-picked Cherries... (2009)
Why do Hand-picked Cherries... (2009)
Marc Jadoul
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
fcleary
Measured boot for embedded devices
Measured boot for embedded devices
Dmitry Baryshkov
Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)
Ian Sommerville
Mc afee conectando las piezas
Mc afee conectando las piezas
Software Guru
OER Talk @ University of Maryland #OAweek
OER Talk @ University of Maryland #OAweek
Nicole Allen
Human environment-interactions
Human environment-interactions
Lexi34
Weather
Weather
Игорь Анатольевич
Foil insulation radiant barrier from sinolam
Foil insulation radiant barrier from sinolam
WWW.SINOLAM.COM WEBSITE
Represii. Deportari. Foamete
Represii. Deportari. Foamete
Adela Negura
AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...
AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...
Azimut Yacht Club
экоблок презентация
экоблок презентация
musorabolshenet
Open Educational Resources and Capacity Building for Development
Open Educational Resources and Capacity Building for Development
Nicole Allen
OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)
OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)
Nicole Allen
Les données du Data Portal du Shift Project sur l'électricité britannique et ...
Les données du Data Portal du Shift Project sur l'électricité britannique et ...
The Shift Project
Social media
Social media
Norlela Alias
Una forma geométrica de medir irracionalidad
Una forma geométrica de medir irracionalidad
Pedro Morales
духовные ценности волонтёра
духовные ценности волонтёра
musorabolshenet
Business in the future
Business in the future
ryuuzaki Ghifari
үзүүлэн5
үзүүлэн5
munkhtuyagg
Warp9: reactive primitives
Warp9: reactive primitives
rystsov
Cleopatra
Cleopatra
mj_aerox
managerial accounting assignment - projected financial statements of maruti s...
managerial accounting assignment - projected financial statements of maruti s...
Tushar Upadhyay
Open access.2013 Biblioteca UPSC
Open access.2013 Biblioteca UPSC
Adela Negura
OCHO HERRAMIENTAS ESENCIALES
OCHO HERRAMIENTAS ESENCIALES
Ines Tazon
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management
Pinewood
High Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log Manager
Novell
Weitere ähnliche Inhalte
Andere mochten auch
OER Talk @ University of Maryland #OAweek
OER Talk @ University of Maryland #OAweek
Nicole Allen
Human environment-interactions
Human environment-interactions
Lexi34
Weather
Weather
Игорь Анатольевич
Foil insulation radiant barrier from sinolam
Foil insulation radiant barrier from sinolam
WWW.SINOLAM.COM WEBSITE
Represii. Deportari. Foamete
Represii. Deportari. Foamete
Adela Negura
AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...
AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...
Azimut Yacht Club
экоблок презентация
экоблок презентация
musorabolshenet
Open Educational Resources and Capacity Building for Development
Open Educational Resources and Capacity Building for Development
Nicole Allen
OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)
OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)
Nicole Allen
Les données du Data Portal du Shift Project sur l'électricité britannique et ...
Les données du Data Portal du Shift Project sur l'électricité britannique et ...
The Shift Project
Social media
Social media
Norlela Alias
Una forma geométrica de medir irracionalidad
Una forma geométrica de medir irracionalidad
Pedro Morales
духовные ценности волонтёра
духовные ценности волонтёра
musorabolshenet
Business in the future
Business in the future
ryuuzaki Ghifari
үзүүлэн5
үзүүлэн5
munkhtuyagg
Warp9: reactive primitives
Warp9: reactive primitives
rystsov
Cleopatra
Cleopatra
mj_aerox
managerial accounting assignment - projected financial statements of maruti s...
managerial accounting assignment - projected financial statements of maruti s...
Tushar Upadhyay
Open access.2013 Biblioteca UPSC
Open access.2013 Biblioteca UPSC
Adela Negura
OCHO HERRAMIENTAS ESENCIALES
OCHO HERRAMIENTAS ESENCIALES
Ines Tazon
Andere mochten auch
(20)
OER Talk @ University of Maryland #OAweek
OER Talk @ University of Maryland #OAweek
Human environment-interactions
Human environment-interactions
Weather
Weather
Foil insulation radiant barrier from sinolam
Foil insulation radiant barrier from sinolam
Represii. Deportari. Foamete
Represii. Deportari. Foamete
AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...
AZIMUT Azimut 68S, 2007, 1.200.000 € For Sale Brochure. Presented By azimut-y...
экоблок презентация
экоблок презентация
Open Educational Resources and Capacity Building for Development
Open Educational Resources and Capacity Building for Development
OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)
OER Overview (MCCLPHEI Annual Conference 6/19/14 Salem, MA)
Les données du Data Portal du Shift Project sur l'électricité britannique et ...
Les données du Data Portal du Shift Project sur l'électricité britannique et ...
Social media
Social media
Una forma geométrica de medir irracionalidad
Una forma geométrica de medir irracionalidad
духовные ценности волонтёра
духовные ценности волонтёра
Business in the future
Business in the future
үзүүлэн5
үзүүлэн5
Warp9: reactive primitives
Warp9: reactive primitives
Cleopatra
Cleopatra
managerial accounting assignment - projected financial statements of maruti s...
managerial accounting assignment - projected financial statements of maruti s...
Open access.2013 Biblioteca UPSC
Open access.2013 Biblioteca UPSC
OCHO HERRAMIENTAS ESENCIALES
OCHO HERRAMIENTAS ESENCIALES
Ähnlich wie Security Risk Management- moeshesh
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management
Pinewood
High Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log Manager
Novell
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
Reddy Marri
Process Steps
Process Steps
mfeKEG
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption Disasters
Venafi
Axxera Security Solutions
Axxera Security Solutions
akshayvreddy
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Bob Rhubart
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
Arrow ECS UK
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
Işınsu Akçetin
241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final
Anthony Hopkins
Security Awareness Training
Security Awareness Training
Daniel P Wallace
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
Sebastien Deleersnyder
DSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF Tech
Andris Soroka
SuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
Tieu Luu
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
Symantec
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012
Symantec
Continuous Delivery using Release Management Automation
Continuous Delivery using Release Management Automation
Premkumar Veerakumar
Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2
Naba Barkakati
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
Nicolai Henriksen
Ähnlich wie Security Risk Management- moeshesh
(20)
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management
High Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log Manager
Axxera Security Solutions Ver 2.0
Axxera Security Solutions Ver 2.0
Process Steps
Process Steps
Five Must Haves to Prevent Encryption Disasters
Five Must Haves to Prevent Encryption Disasters
Axxera Security Solutions
Axxera Security Solutions
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final
Security Awareness Training
Security Awareness Training
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
DSS ITSEC Conference 2012 - Radware WAF Tech
DSS ITSEC Conference 2012 - Radware WAF Tech
SuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012
Continuous Delivery using Release Management Automation
Continuous Delivery using Release Management Automation
Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
Kürzlich hochgeladen
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
Kürzlich hochgeladen
(20)
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Security Risk Management- moeshesh
1.
ePolicy Orchestrator 4.0
with Security Risk Management Mohamed A. Shishtawy © 2007 McAfee, Inc.
2.
Security Risk Management
with ePolicy Orchestrator
3.
Module Topics
• Security Risk Management with ePO – SRM Model – Centralized Security Management – Components & Architecture Security Risk Management with ePolicy Orchestrator Module 1 - 3 © 2009 McAfee, Inc. All rights reserved.
4.
Security Risk Management
SRM Model • Centralized Management • Components & Architecture • Machine import Identify & • Machine discovery group assets • Rogue detection • Infection reporting • Measure Determine vulnerability risk • Notification • Configuration Protect and • Enforcement block • Maintenance • Coverage reporting • Compliance reporting Measure • System compliance compliance • McAfee NAC Security Risk Management with ePolicy Orchestrator Module 1 - 4 © 2009 McAfee, Inc. All rights reserved.
5.
Protecting The Enterprise
• The Challenge – Identify & group assets – Determine risk – Protect and block threats – Measure compliance Security Risk Management with ePolicy Orchestrator Module 1 - 5 © 2009 McAfee, Inc. All rights reserved.
6.
Identify & Group
Assets • Import known machines from a browse list • Synchronize with Active Directory • Detect Rogue Systems • Group machines according to management needs • Assign policies on a generic or granular level Security Risk Management with ePolicy Orchestrator Module 1 - 6 © 2009 McAfee, Inc. All rights reserved.
7.
Determine Risk
• Monitor threat events and propagation • Determine infection and outbreak source • Provide Automatic Responses to rule infringement Security Risk Management with ePolicy Orchestrator Module 1 - 7 © 2009 McAfee, Inc. All rights reserved.
8.
Protect And Block
Threats • Ensure correct configuration • Enforce security policy • Maintain and update protection • Respond to rule intrusion Security Risk Management with ePolicy Orchestrator Module 1 - 8 © 2009 McAfee, Inc. All rights reserved.
9.
Measure Compliance
• Report on coverage and protection levels • Determine compliance to anti-virus policy • Determine compliance to system policy • Roll-up reporting across multiple ePO servers Security Risk Management with ePolicy Orchestrator Module 1 - 9 © 2009 McAfee, Inc. All rights reserved.
10.
Centralized System Security
Management SRM Model Centralized Mgmt • Components/Architecture ePolicy Automatic Manage only Orchestrator McAfee one policy Server and Download Responses to Master Site Threats framework Repository Consolidate monitoring Product Updates Automatic DAT File Updates and reporting Responses / Threat Database Notification Server Scalability & Rogue Web-based Bandwidth System Consoles savings Remote Secure Detection Agent Bi-directional Sensor Handler Channel Update Repository Product Updates Product Updates DAT File Updates DAT File Updates Policy Updates Threat Events Policy Updates Threat Events Easily discover non-compliant systems Managed Systems with McAfee Agents Managed Systems with McAfee Agents Security Risk Management with ePolicy Orchestrator Module 1 - 10 © 2009 McAfee, Inc. All rights reserved.
11.
Feature Management
• ePolicy Orchestrator manages products through: – Product deployment – Configuration management – Update and task configuration – Coverage reporting – Threat Event reporting Security Risk Management with ePolicy Orchestrator Module 1 - 11 © 2009 McAfee, Inc. All rights reserved.
12.
Architecture And Communication
Agent Handler McAfee Agent APACHE Event Parser Service Service Framework Service HTTP 80 Master UDP 8081 Repository UDP 8082 TCP 8081 DAL HTTP 8080 ePO Server Application Server Network Database (TOMCAT) Console UI Rogue HTTPS 8443 Notification Sensor System Rogue System HTTPS 8444 Sensor Security Risk Management with ePolicy Orchestrator Module 1 - 12 © 2009 McAfee, Inc. All rights reserved.
13.
Check Your Understanding
Choose the correct answer(s): What are the four primary stages of the Security Risk Management model? • Discover, Determine, Defend, Detect • Find & Manage, Evaluate, Enforce & Protect, Fix & Comply • Assess, Remediate, Measure, Prioritize Security Risk Management with ePolicy Orchestrator Module 1 - 13 © 2009 McAfee, Inc. All rights reserved.
14.
Check Your Understanding
Choose the correct answer(s): What are the four primary stages of the Security Risk Management model? • Discover, Determine, Defend, Detect Find & Manage, Evaluate, Enforce & Protect, Fix & Comply • Assess, Remediate, Measure, Prioritize Security Risk Management with ePolicy Orchestrator Module 1 - 14 © 2009 McAfee, Inc. All rights reserved.
15.
16.
ePolicy Orchestrator 4.0
with Security Risk Management Mohamed A. Shishtawy © 2007 McAfee, Inc.
Jetzt herunterladen