SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
CASE-STUDY
On
Best Practices
For Securing
Your
Enterprise
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
Acknowledgement
No significant achievement can be a solo performance especially when starting a case-study
from ground up. “The Case-Study Best Practices For Securing your Enterprise” has by no
means been an exception. It took very special people to enable and support it. During tenure
of this Case-study . I am fortunate to have interested with people ,who in their own
capacities have encouraged and guided me. I would like to acknowledge their valued co-
operation and express my sincere gratitude to them.
For her unstinted and invaluable guidance, I wish to express my heartfelt gratitude to my
guide Miss. Urvi Patel (lecturer) without whom this project could not have been realized. I
sincerely thank her for advising me whenever the road map seemed blocked, inspire of her
busy schedule.
Finally, I would like to express my deepest gratitude towards the Head of Department and
Mrs. C.S.Bari (lecturer) for having given me a platform and opportunity to work on this
case-study.
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
Table of Content
1. Introduction~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~2
2. Chapter 1~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~3
3. Chapter 2~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~4
4. Chapter 3~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 6
5. Chapter 4~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~7
6. Chapter 5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~8
7. Chapter 6~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 9
8. Chapter 7`~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~11
9. Chapter 8~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~12
10. Chapter 9~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~13
11. Chapter 10~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~14
12. Conclusion`~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~16
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
Introduction
In this White Paper, we’ll prioritize our “Top 10” recommended security
practices for building online trust both inside and outside your
enterprise. While these guidelines are not comprehensive, they are focused
on the most critical areas every enterprise needs to adopt -- from running
SSL on servers to supplying client side SSL certificates to employees, to
establishing solid policies and procedures for security and embracing
paperless transactions
Yet, while it has become more convenient to do business online, it has
also become more difficult to ensure reliable and secure data exchange
and communications. Continually evolving security threats and changing
regulatory standards can make maintaining a trusted online environment a
challenge for any size enterprise.
In today’s global economy, businesses depend on the Internet like
never before enterprises are increasingly conducting e-commerce
transactions and opening up access to their network resources to
vendors, business partners, customers and remote employees.
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
CHAPTER
1
Without SSL encryption, the integrity of data is compromised
Awareness and understanding of the benefits of SSL technology has expanded considerably over the
past several years. More and more users are looking for the lock eavesdropping that might
jeopardize the security or integrity of the data transmission. handshake, all data transmitted from
one to the other is encrypted, preventing any installation of the certificate on the server. Once the
browser and server perform their symbol indicating that a session is encrypted with SSL.
Deploy SSL Server Certificates throughout your enterprise. SSL is the most widely deployed
security protocol in the world. It should be deployed on any and all servers to protect any
confidential and personal information that is passing from browser to server.
Secure Sockets Layer (SSL) encryption is one of the leading technologies used today to secure web
sites, intranets, extranets and other server-based applications. Without it, the integrity of data
exchanged over public and private networks can be compromised, ultimately affecting business
continuity and your bottom line. SSL safeguards network access, online communications and digital
transactions by enabling a secure channel between your servers and your users.
Millions of sites have installed the X.509 special server digital certificate that activates SSL browsers
and servers so all that is needed from the enterprise perspective is the simple between browsers and
servers. The support for SSL is already built into all modern webs.
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
CHAPTER
2
Without robust physical and network security, sensitive corporate
data is at risk of intrusion
The use of firewalls, intrusion detection, and client PC virus software, server-based virus
checking and keeping all systems up to date with security patches will prevent most types of
threats from impacting operations, compromising sensitive data or threatening your business
continuity.
Firewalls are an essential part of network security. Firewalls restrict access from one network to
another and inspect and restrict all traffic flowing through the network. Firewalls should restrict
access from the Internet and from one internal network (e.g. application servers) to another network
(e.g. database). It is necessary to carefully construct the IP address ranges and the ports to which the
firewall will open access. In addition, it’s recommended to use multiple layers of firewalls for
distinctly different functional portions of the network – one for the demilitarized zone (DMZ), a
second for the web server, a third for the application server and perhaps a fourth for the database
layers.
To secure network access paths, start with the basics, such as locking computers that are not in use.
Beyond the basics, more robust solutions include key card access, hardware tokens or biometric
access to especially sensitive areas.
Network security is about computer systems and network access control, as well as detection and
response to unwanted incursions. The risks from poor security are tremendous: theft, interruptions
of service, physical damage, compromised system integrity and unauthorized disclosure of
proprietary corporate information.
Intrusion detection systems watch for attacks, parse audit logs, alert administrators as attacks are
happening, protect system files, expose a hacker’s techniques, illustrate which vulnerabilities need
to be addressed and help to track down perpetrators of attacks.
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
Another must-have is up-to-date virus and Trojan checking software on all client machines. There
are thousands of viruses and each new one is more sophisticated and more damaging than its
predecessor. A tremendous and costly amount of damage has been done by the last few worldwide
email-based viruses. A particularly robust solution is the server-based virus software that runs on
email transfer machines (such as Microsoft Exchange) to prevent infected messages from moving
on to users or from leaving one client to infect others.
Finally, the simplest but most powerful thing of all – ensure every security patch for all operating
systems and applications is applied on all systems as soon as they come out. Hackers know well the
vulnerabilities of Microsoft’s Internet Information System Web Servers and seek sites running them
as easy targets. Patches that make IIS not vulnerable have been freely available for years and yet
over 30 percent of IIS systems on the public web are not up to date. This one is worth repeating:
apply all security patches immediately.
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
Chapter
3
Building an effective in-house PKI system will take considerable time
and expense. Opt for managed PKI services.
Having security services fully managed will allow you to focus on applications needed to
drive your business while a trusted third-party builds out the complex, secure and expensive
public key infrastructure and manages it for you.
Public Key Infrastructure (PKI) is a tool to enable online applications to be used in ways otherwise
not possible. Without an efficient method for issuing, revoking and managing credentials,
businesses would not be able to deploy a benefits system on an intranet and expect employees to
use it exclusively for their benefits information, especially if a large percentage of employees are
remote. Similarly, a sales force would not be able to fully utilize a CRM system –the crown jewel
of the company – if access was not safe and secure. Businesses are clamping down on the uses of
e-mail and many are banning instant messenger usage – all because these systems are not yet
secure
Early generation PKI was great in theory, but in practice it required a complex install of software
and hardware, it required specialized IT talent and it required special security to protect systems.
Needless to say, all of this also translated to tremendous financial cost. But, PKI has matured and
sufficient innovation has occurred to the point where it can be an outsourced component of
applications. A trusted third party – a certificate authority (CA) – can build, maintain, manage and
keep secure the public key infrastructure an enterprise needs. The CA behind a fully managed
service has expertise in authentication techniques and methodologies. The enterprise knows the
business rules it wants to implement and the applications it needs to deploy to automate its
business processes. The integration point is how the certificates are used in the
applications to implement security. Many applications are already certificate-ready like browsers,
email and VPNs and the trend are to do this more and more.
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
Chapter
4
Free software will crack your password in 30
minutes
Passwords are weak and getting weaker as computers get faster and stakes of cracking passwords
get higher and more enticing to those “bad guys”. Cracking passwords is getting more fruitful as
more mission-critical systems are networked. With free downloadable software anyone can crack a
6-character password in 30 minutes and an 8-character password in six hours.
Passwords are weak and getting weaker, making your secure systems vulnerable.
Dramatically decrease that vulnerability by enforcing strict password usage rules.
Most organizations have needs in one or more of the following application areas that can be outsourced to a
trusted third-party: secure access, secure messaging and paperless transactions. Secure access to corporate
networks like the intranet and access to critical applications like CRM instant messenger provides a
mechanism to securely identify the message sender and to protect the contents from eavesdropping. While a
paperless transaction takes a paper-based process that requires intent to be demonstrated today with a “wet”
signature and makes it totally digital to save time and cost of paper-based processes.
You need to immediately set rules about how people construct passwords (use upper and lower
case, always include at least one number and punctuation character, do not use names from your
personal profile, make them at least 8 characters), and how often they change them. Most
importantly, where you need to continue to use passwords, make sure all passwords disable after
five failed attempts to thwart brute force cracking attempts. Get and run password crackers
internally to root out weak passwords. Then, begin to shift over to low-cost, outsourced
authentication and digital SSL certificate services to replace these passwords.
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
Chapter
5
Email is leaking your business secrets
Issue all employees digital client certificates for signed/encrypted email to protect corporate
data and to increase confidence in the origination, authenticity and confidentiality of all
corporate communications.
Secure messaging (think e-mail for now but later, instant messaging, voice over IP and so on) is
about making sure only the intended recipients of a message can read it. The more that email is
used, the more important it becomes for company confidential information. This is especially true
for email going outside the enterprise. Email moves across the public network from server to server
in plain text. Servers along the way can and do save all messages they touch and have the right to do
so. In most email systems, a sender has no control over who gets a forwarded email message and no
audit trail showing this has happened.
The key components of a fully managed security service are flexible authentication models (how do
we know individuals are who they say they are?), an administration interface (who from the
organization is authorized to make changes and control the process?) and an operational interface
(where do the individual constituents of the organization come to get their credentials?).
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
Chapter
6
Replace weak password entry-points and expensive time-synchronized tokens to secure systems
with digital certificates which are much more secure than passwords, lower cost than secure tokens
and yet, when fully managed, are easy to deploy.
SSL supports authenticated identity on BOTH sides: server and client. When the server presents a
certificate to the client it means that the server has been authenticated (the organization that has domain
control acquired the certificate and has been validated) and the client (browser) verifies that the certificate
domain and the server domain match. When the client presents a certificate to the server it means that the
client has been authenticated. Client authentication involves verifying the identity of the human and that
this human and the certificate are bound to the machine communicating with the server. These client SSL
certificates reside in the browser and in this way replace password access to secure web sites.
Traditional access control solutions are either
ineffective or costly
With a simple exchange of client certificates, any two employees can now sign and encrypt messages to
each other. It can be proven that these messages have not been altered; their origin can be verified and no
eavesdropper on any system in between can read the message. This should be required on company
confidential email. Furthermore, organizations should also deploy a secure instant messaging product
quickly and disallow use of non-secure IM. Instant messaging has become a common part of business
and serves a very useful function; however, critical company information is being transmitted over IM
systems and could be archived by uncredentialed parties. With a secure IM, that would no longer be an
issue.
Certificates are much more secure than passwords because one cannot socially engineer away another
person’s certificate. Stealing their computer with the certificate on it doesn’t work because it still requires
a password to activate the certificate. Because certificates are much more secure, more important
applications can be made accessible like CRM systems and corporate intranets.
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
Chapter
SSL is vital for encryption when dealing with sensitive data. But SSL does not provide identity about the
web site being visited – this is the “dirty little secret of Internet security.” To protect your business
identity on your web site, use a trust mark or site seal which cannot be copied.
For organizations, this will eliminate the possibility of their site being spoofed and for a customer it
provides the confidence that they are on a legitimate web site. Unfortunately, many existing “identity”
products (seals) do not provide protection – they can be click-copied. Visit any web page with a graphic
icon or seal on it and right click to see the menu.
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
7
Your web site can be spoofed with a point and a click
Chapter
Many companies are or will soon be installing virtual private networks (VPNs) to allow secure access to
critical systems for remote users. This is a great move but do not weaken this by allowing identification
via password; instead require client certificates installed in the VPN for entry.
Time-synchronized tokens are small devices that generate a number that the user needs to enter managed
security service that issues and manages the lifecycle of client into a web page for secure access to a
network or application. Unfortunately, they are expensive, people lose them, batteries fail and you can
“loan” them to others easily. Implement a client -side certificates.
Allowing modem access into the heart of secure networks is one of the most common sources of
intrusion. There are hundreds of people with what are called war dialers who try to access
corporate or government systems via modem banks. They are frequently successful.
Project and protect your business identity through your web site using a trust mark establishes
both identity and trust with site visitors.
Instead, use a dynamically generated site seal that cannot be copied. For example, GeoTrust site seals
are placed on web pages to identify that the site is legitimate, authentic and validated via an active call
to a trusted third party. First, they consider the confirmation of site identity of the owner of highest
importance. Second, it is designed to combat fraudulent usage.
Third, it provides a “self-policing” capability that is unique to the web. If it determines that it cannot
confirm the identity of the site owner from which it is launched, it causes the image to completely
disappear. Finally, it links to a rich repository of validated information about the site and its owner to
assist the user – and ultimately the site itself. This establishes trust with the merchant that will
hopefully lead to numerous transactions.
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
8
Testing in production is tempting fate
Chapter
Create a demilitarized zone (DMZ) to cordon off risky network activities from your business-
critical production network segments for all modem access, for simulating production or for
allowing customers to do any kind of acceptance testing.
Create a DMZ that has access to the Internet but limited access to internal networks.
This is accomplished through careful setup of firewalls that cordon off the DMZ from the rest of
the network while still allowing full Internet access. The firewalls protect the critical portions of
the network from this DMZ.
If customer acceptance testing is part of your business, only allow this kind of testing through the
DMZ.
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
9
The weakest link in your security is your people
Chapter
Define your security protocol. This is perhaps the most overlooked, and the most dreaded of the
10 guidelines, yet it is the easiest and arguably the biggest impact item
of all: write it down, communicate it and enforce it.
Security is only as strong as your organization’s weakest link. Security is never entirely automatic, it
involves people. People have the biggest impact on how successful an organization’s security strategy
will be. The “bad guys” have found that social engineering is the easiest way to breach an organization’s
security. Organizations can combat social engineering and simple errors best by having clearly written,
clearly explained security policies that are enforced.
Clearly document the appropriate processes and rules for accessing the facilities, accessing the
networks, acceptable use of company systems and networks and acceptable use of company
email and browsers.
List standards that are supported and those that are not. Include operating systems that are allowed on
the network and explain why others are not. Allowing a visitor to come in to your conference room
where there is a network tap and plug in, is a very common way networks are
penetrated as quickly as you can say “Trojan Horse”.
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
10
“Nobody knows if you’re a dog on the web”
“Nobody knows you are a dog on the web” is a famous New Yorker cartoon that graces many web
sites, presentations and even T-shirts. This points to the single biggest threat in using the web for
critical transactions. The standard procedure to authenticate an individual is to query them about a
set of shared secrets only you and the other person could know. The challenge with conducting
business over the web is that the individuals are unknown to the business and therefore there are no
shared secrets.
Many organizations that require their customers to sign up, register or fill out applications are
looking to eliminate manual paper processes and the manual approval process. In order to
conduct online applications, organizations must be able to authenticate the consumer is who they
say they are and have the ability to generate e-signatures.
If the above mentioned 10 steps are not followed then following are effects mentioned:
Start using well-tested, mature authentication technologies to establish identity of anonymous web-
based individuals. Streamline your business through paperless transactions
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
PROS CONS
Application Independent Limited Application Support
High Performance Poor Performance
Scalable Fixed
Good Security Bad Security
Highly Protected No Protection
Conclusion
The Internet represents an opportunity for enterprises to extend their reach, integrate their
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
community of employees, business partners and customers and to reduce costs by using inexpensive
public networks. Inside and outside the enterprise, business is moving online, which means there’s
an important need to establish secure communications and practices in both extranet and intranet
applications. Every enterprise network needs protection of confidentiality of data, integrity of data
and secure access to data for appropriate users. There are, of course, many different aspects of
security in enterprise networks, and our “Top 10”recommendations represent just a few best
practices in the areas of physical security, data security and network security.
GeoTrust Solutions for Enterprise Security
GeoTrust is committed to aggressively developing solutions that are progressive and innovative to
help
you secure your enterprise systems and maintain secure e-commerce transactions, trusted identities
and
fully managed trusted e-business environments. GeoTrust offers a comprehensive array of enterprise
security solutions to secure online identities for people, devices and applications, including
Enterprise SSL .™
Enterprise SSL is an ideal solution for any enterprise that needs to deploy and manage
five or more SSL certificates. It includes powerful 1024-bit signed certificates and a centralized,
web-
based administrative portal for complete control over certificate lifecycle management.
Client Certificates.
True Credentials® is a fully- managed, web-based client certificate service that safeguards
communication and data exchange between your enterprise and your employees,
vendors, business partners and customers. It provides secure network access to credentialed users,
enables
secure messaging and S/MIME and supports digital signature applications.
SSL Security for Mobile Environments.
The Power Server ID™ SSL certificate provides the highest level of browser compatibility and web
security for mobile and networked environments. An ideal solution for hosting companies and
enterprises with a global e-business base, Power Server ID ensures that any customer can connect
from any device, anywhere, anytime.
Code Signing Certificates.
Code Signing certificates are available for developers to ensure that code that is passed to platforms,
particularly wireless platforms, is not tampered with in any way. Code Signing certificates assure
developers of the code integrity, protects handheld users from viruses and enables enterprises to roll
out secure applications faster.
[Best Practices To Secure Your Enterprise] [2011-12]
| N.B.MEHTA SCIENCE COLLEGE BORDI
References
GeoTrust Solutions for Enterprise Security
Enterprise SSL

Weitere ähnliche Inhalte

Was ist angesagt?

Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromiseCMR WORLD TECH
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderArmor
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Bloxx
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloudkairostech
 
Challenges2013
Challenges2013Challenges2013
Challenges2013Lancope, Inc.
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Edureka!
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security LandscapeArrow ECS UK
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaFaysal Ghauri
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
50 Shapes of Network & Information Security
50 Shapes of Network & Information Security50 Shapes of Network & Information Security
50 Shapes of Network & Information SecurityHatem ElSahhar
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...Nicolas Beyer
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware Sanyog Chandra
 

Was ist angesagt? (19)

Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
 
Project 3
Project 3Project 3
Project 3
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
50 Shapes of Network & Information Security
50 Shapes of Network & Information Security50 Shapes of Network & Information Security
50 Shapes of Network & Information Security
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware
 

Ă„hnlich wie Case study

Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxinfosec train
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration Protected Harbor
 
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Seven Deadly Threats and  Vulnerabilities in Cloud ComputingSeven Deadly Threats and  Vulnerabilities in Cloud Computing
Seven Deadly Threats and Vulnerabilities in Cloud ComputingMervat Bamiah
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptxMinnySkyy
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxInfosectrain3
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplaceSameerShaik43
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412Hai Nguyen
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeSysfore Technologies
 

Ă„hnlich wie Case study (20)

Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration The Top 5 Risks of Cloud Migration
The Top 5 Risks of Cloud Migration
 
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Seven Deadly Threats and  Vulnerabilities in Cloud ComputingSeven Deadly Threats and  Vulnerabilities in Cloud Computing
Seven Deadly Threats and Vulnerabilities in Cloud Computing
 
CCSK.pptx
CCSK.pptxCCSK.pptx
CCSK.pptx
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptx
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
 
4192 sslvpn sb_0412
4192 sslvpn sb_04124192 sslvpn sb_0412
4192 sslvpn sb_0412
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 

Mehr von Shehrevar Davierwala

Build Virtual Assistant Using AI
Build Virtual Assistant Using AI Build Virtual Assistant Using AI
Build Virtual Assistant Using AI Shehrevar Davierwala
 
Build brand reputation using facebook
Build brand reputation using facebookBuild brand reputation using facebook
Build brand reputation using facebookShehrevar Davierwala
 
Learn Digital Marketing : 0 to Hero Day 1
Learn Digital Marketing :  0 to Hero Day 1 Learn Digital Marketing :  0 to Hero Day 1
Learn Digital Marketing : 0 to Hero Day 1 Shehrevar Davierwala
 
Digital Marketing for Sustainable Business - Afghan Perspective
Digital Marketing for Sustainable Business - Afghan Perspective  Digital Marketing for Sustainable Business - Afghan Perspective
Digital Marketing for Sustainable Business - Afghan Perspective Shehrevar Davierwala
 
Developing stunning website in clicks - 2
Developing stunning website in clicks - 2Developing stunning website in clicks - 2
Developing stunning website in clicks - 2Shehrevar Davierwala
 
Developing stunning website in clicks
Developing stunning website in clicksDeveloping stunning website in clicks
Developing stunning website in clicksShehrevar Davierwala
 
Google forms for data analysis
Google forms for data analysisGoogle forms for data analysis
Google forms for data analysisShehrevar Davierwala
 

Mehr von Shehrevar Davierwala (20)

Introduction_Swift
Introduction_SwiftIntroduction_Swift
Introduction_Swift
 
PsudoCode.pptx
PsudoCode.pptxPsudoCode.pptx
PsudoCode.pptx
 
Number System.pptx
Number System.pptxNumber System.pptx
Number System.pptx
 
Java Script (Module 1).pptx
Java Script (Module 1).pptxJava Script (Module 1).pptx
Java Script (Module 1).pptx
 
Website in Clicks Day 2
Website in Clicks Day 2Website in Clicks Day 2
Website in Clicks Day 2
 
Develop Website in Clicks
Develop Website in ClicksDevelop Website in Clicks
Develop Website in Clicks
 
Build Virtual Assistant Using AI
Build Virtual Assistant Using AI Build Virtual Assistant Using AI
Build Virtual Assistant Using AI
 
Build brand reputation using facebook
Build brand reputation using facebookBuild brand reputation using facebook
Build brand reputation using facebook
 
Digital Marketing Session 2
Digital Marketing Session 2Digital Marketing Session 2
Digital Marketing Session 2
 
Learn Digital Marketing : 0 to Hero Day 1
Learn Digital Marketing :  0 to Hero Day 1 Learn Digital Marketing :  0 to Hero Day 1
Learn Digital Marketing : 0 to Hero Day 1
 
Standard template
Standard templateStandard template
Standard template
 
Digital Marketing for Sustainable Business - Afghan Perspective
Digital Marketing for Sustainable Business - Afghan Perspective  Digital Marketing for Sustainable Business - Afghan Perspective
Digital Marketing for Sustainable Business - Afghan Perspective
 
Developing stunning website in clicks - 2
Developing stunning website in clicks - 2Developing stunning website in clicks - 2
Developing stunning website in clicks - 2
 
Developing stunning website in clicks
Developing stunning website in clicksDeveloping stunning website in clicks
Developing stunning website in clicks
 
Google forms for data analysis
Google forms for data analysisGoogle forms for data analysis
Google forms for data analysis
 
Webdesign session1
Webdesign session1Webdesign session1
Webdesign session1
 
Tech talk webtech
Tech talk webtechTech talk webtech
Tech talk webtech
 
Tech talk php_cms
Tech talk php_cmsTech talk php_cms
Tech talk php_cms
 
Ph pbasics
Ph pbasicsPh pbasics
Ph pbasics
 
Php mysql
Php mysqlPhp mysql
Php mysql
 

KĂĽrzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

KĂĽrzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Case study

  • 1. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI CASE-STUDY On Best Practices For Securing Your Enterprise
  • 2. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI Acknowledgement No significant achievement can be a solo performance especially when starting a case-study from ground up. “The Case-Study Best Practices For Securing your Enterprise” has by no means been an exception. It took very special people to enable and support it. During tenure of this Case-study . I am fortunate to have interested with people ,who in their own capacities have encouraged and guided me. I would like to acknowledge their valued co- operation and express my sincere gratitude to them. For her unstinted and invaluable guidance, I wish to express my heartfelt gratitude to my guide Miss. Urvi Patel (lecturer) without whom this project could not have been realized. I sincerely thank her for advising me whenever the road map seemed blocked, inspire of her busy schedule. Finally, I would like to express my deepest gratitude towards the Head of Department and Mrs. C.S.Bari (lecturer) for having given me a platform and opportunity to work on this case-study.
  • 3. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI Table of Content 1. Introduction~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~2 2. Chapter 1~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~3 3. Chapter 2~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~4 4. Chapter 3~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 6 5. Chapter 4~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~7 6. Chapter 5~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~8 7. Chapter 6~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 9 8. Chapter 7`~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~11 9. Chapter 8~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~12 10. Chapter 9~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~13 11. Chapter 10~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~14 12. Conclusion`~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~16
  • 4. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI Introduction In this White Paper, we’ll prioritize our “Top 10” recommended security practices for building online trust both inside and outside your enterprise. While these guidelines are not comprehensive, they are focused on the most critical areas every enterprise needs to adopt -- from running SSL on servers to supplying client side SSL certificates to employees, to establishing solid policies and procedures for security and embracing paperless transactions Yet, while it has become more convenient to do business online, it has also become more difficult to ensure reliable and secure data exchange and communications. Continually evolving security threats and changing regulatory standards can make maintaining a trusted online environment a challenge for any size enterprise. In today’s global economy, businesses depend on the Internet like never before enterprises are increasingly conducting e-commerce transactions and opening up access to their network resources to vendors, business partners, customers and remote employees.
  • 5. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI CHAPTER 1 Without SSL encryption, the integrity of data is compromised Awareness and understanding of the benefits of SSL technology has expanded considerably over the past several years. More and more users are looking for the lock eavesdropping that might jeopardize the security or integrity of the data transmission. handshake, all data transmitted from one to the other is encrypted, preventing any installation of the certificate on the server. Once the browser and server perform their symbol indicating that a session is encrypted with SSL. Deploy SSL Server Certificates throughout your enterprise. SSL is the most widely deployed security protocol in the world. It should be deployed on any and all servers to protect any confidential and personal information that is passing from browser to server. Secure Sockets Layer (SSL) encryption is one of the leading technologies used today to secure web sites, intranets, extranets and other server-based applications. Without it, the integrity of data exchanged over public and private networks can be compromised, ultimately affecting business continuity and your bottom line. SSL safeguards network access, online communications and digital transactions by enabling a secure channel between your servers and your users. Millions of sites have installed the X.509 special server digital certificate that activates SSL browsers and servers so all that is needed from the enterprise perspective is the simple between browsers and servers. The support for SSL is already built into all modern webs.
  • 6. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI CHAPTER 2 Without robust physical and network security, sensitive corporate data is at risk of intrusion The use of firewalls, intrusion detection, and client PC virus software, server-based virus checking and keeping all systems up to date with security patches will prevent most types of threats from impacting operations, compromising sensitive data or threatening your business continuity. Firewalls are an essential part of network security. Firewalls restrict access from one network to another and inspect and restrict all traffic flowing through the network. Firewalls should restrict access from the Internet and from one internal network (e.g. application servers) to another network (e.g. database). It is necessary to carefully construct the IP address ranges and the ports to which the firewall will open access. In addition, it’s recommended to use multiple layers of firewalls for distinctly different functional portions of the network – one for the demilitarized zone (DMZ), a second for the web server, a third for the application server and perhaps a fourth for the database layers. To secure network access paths, start with the basics, such as locking computers that are not in use. Beyond the basics, more robust solutions include key card access, hardware tokens or biometric access to especially sensitive areas. Network security is about computer systems and network access control, as well as detection and response to unwanted incursions. The risks from poor security are tremendous: theft, interruptions of service, physical damage, compromised system integrity and unauthorized disclosure of proprietary corporate information. Intrusion detection systems watch for attacks, parse audit logs, alert administrators as attacks are happening, protect system files, expose a hacker’s techniques, illustrate which vulnerabilities need to be addressed and help to track down perpetrators of attacks.
  • 7. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI Another must-have is up-to-date virus and Trojan checking software on all client machines. There are thousands of viruses and each new one is more sophisticated and more damaging than its predecessor. A tremendous and costly amount of damage has been done by the last few worldwide email-based viruses. A particularly robust solution is the server-based virus software that runs on email transfer machines (such as Microsoft Exchange) to prevent infected messages from moving on to users or from leaving one client to infect others. Finally, the simplest but most powerful thing of all – ensure every security patch for all operating systems and applications is applied on all systems as soon as they come out. Hackers know well the vulnerabilities of Microsoft’s Internet Information System Web Servers and seek sites running them as easy targets. Patches that make IIS not vulnerable have been freely available for years and yet over 30 percent of IIS systems on the public web are not up to date. This one is worth repeating: apply all security patches immediately.
  • 8. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI Chapter 3 Building an effective in-house PKI system will take considerable time and expense. Opt for managed PKI services. Having security services fully managed will allow you to focus on applications needed to drive your business while a trusted third-party builds out the complex, secure and expensive public key infrastructure and manages it for you. Public Key Infrastructure (PKI) is a tool to enable online applications to be used in ways otherwise not possible. Without an efficient method for issuing, revoking and managing credentials, businesses would not be able to deploy a benefits system on an intranet and expect employees to use it exclusively for their benefits information, especially if a large percentage of employees are remote. Similarly, a sales force would not be able to fully utilize a CRM system –the crown jewel of the company – if access was not safe and secure. Businesses are clamping down on the uses of e-mail and many are banning instant messenger usage – all because these systems are not yet secure Early generation PKI was great in theory, but in practice it required a complex install of software and hardware, it required specialized IT talent and it required special security to protect systems. Needless to say, all of this also translated to tremendous financial cost. But, PKI has matured and sufficient innovation has occurred to the point where it can be an outsourced component of applications. A trusted third party – a certificate authority (CA) – can build, maintain, manage and keep secure the public key infrastructure an enterprise needs. The CA behind a fully managed service has expertise in authentication techniques and methodologies. The enterprise knows the business rules it wants to implement and the applications it needs to deploy to automate its business processes. The integration point is how the certificates are used in the applications to implement security. Many applications are already certificate-ready like browsers, email and VPNs and the trend are to do this more and more.
  • 9. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI Chapter 4 Free software will crack your password in 30 minutes Passwords are weak and getting weaker as computers get faster and stakes of cracking passwords get higher and more enticing to those “bad guys”. Cracking passwords is getting more fruitful as more mission-critical systems are networked. With free downloadable software anyone can crack a 6-character password in 30 minutes and an 8-character password in six hours. Passwords are weak and getting weaker, making your secure systems vulnerable. Dramatically decrease that vulnerability by enforcing strict password usage rules. Most organizations have needs in one or more of the following application areas that can be outsourced to a trusted third-party: secure access, secure messaging and paperless transactions. Secure access to corporate networks like the intranet and access to critical applications like CRM instant messenger provides a mechanism to securely identify the message sender and to protect the contents from eavesdropping. While a paperless transaction takes a paper-based process that requires intent to be demonstrated today with a “wet” signature and makes it totally digital to save time and cost of paper-based processes. You need to immediately set rules about how people construct passwords (use upper and lower case, always include at least one number and punctuation character, do not use names from your personal profile, make them at least 8 characters), and how often they change them. Most importantly, where you need to continue to use passwords, make sure all passwords disable after five failed attempts to thwart brute force cracking attempts. Get and run password crackers internally to root out weak passwords. Then, begin to shift over to low-cost, outsourced authentication and digital SSL certificate services to replace these passwords.
  • 10. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI Chapter 5 Email is leaking your business secrets Issue all employees digital client certificates for signed/encrypted email to protect corporate data and to increase confidence in the origination, authenticity and confidentiality of all corporate communications. Secure messaging (think e-mail for now but later, instant messaging, voice over IP and so on) is about making sure only the intended recipients of a message can read it. The more that email is used, the more important it becomes for company confidential information. This is especially true for email going outside the enterprise. Email moves across the public network from server to server in plain text. Servers along the way can and do save all messages they touch and have the right to do so. In most email systems, a sender has no control over who gets a forwarded email message and no audit trail showing this has happened. The key components of a fully managed security service are flexible authentication models (how do we know individuals are who they say they are?), an administration interface (who from the organization is authorized to make changes and control the process?) and an operational interface (where do the individual constituents of the organization come to get their credentials?).
  • 11. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI Chapter 6 Replace weak password entry-points and expensive time-synchronized tokens to secure systems with digital certificates which are much more secure than passwords, lower cost than secure tokens and yet, when fully managed, are easy to deploy. SSL supports authenticated identity on BOTH sides: server and client. When the server presents a certificate to the client it means that the server has been authenticated (the organization that has domain control acquired the certificate and has been validated) and the client (browser) verifies that the certificate domain and the server domain match. When the client presents a certificate to the server it means that the client has been authenticated. Client authentication involves verifying the identity of the human and that this human and the certificate are bound to the machine communicating with the server. These client SSL certificates reside in the browser and in this way replace password access to secure web sites. Traditional access control solutions are either ineffective or costly With a simple exchange of client certificates, any two employees can now sign and encrypt messages to each other. It can be proven that these messages have not been altered; their origin can be verified and no eavesdropper on any system in between can read the message. This should be required on company confidential email. Furthermore, organizations should also deploy a secure instant messaging product quickly and disallow use of non-secure IM. Instant messaging has become a common part of business and serves a very useful function; however, critical company information is being transmitted over IM systems and could be archived by uncredentialed parties. With a secure IM, that would no longer be an issue. Certificates are much more secure than passwords because one cannot socially engineer away another person’s certificate. Stealing their computer with the certificate on it doesn’t work because it still requires a password to activate the certificate. Because certificates are much more secure, more important applications can be made accessible like CRM systems and corporate intranets.
  • 12. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI Chapter SSL is vital for encryption when dealing with sensitive data. But SSL does not provide identity about the web site being visited – this is the “dirty little secret of Internet security.” To protect your business identity on your web site, use a trust mark or site seal which cannot be copied. For organizations, this will eliminate the possibility of their site being spoofed and for a customer it provides the confidence that they are on a legitimate web site. Unfortunately, many existing “identity” products (seals) do not provide protection – they can be click-copied. Visit any web page with a graphic icon or seal on it and right click to see the menu.
  • 13. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI 7 Your web site can be spoofed with a point and a click Chapter Many companies are or will soon be installing virtual private networks (VPNs) to allow secure access to critical systems for remote users. This is a great move but do not weaken this by allowing identification via password; instead require client certificates installed in the VPN for entry. Time-synchronized tokens are small devices that generate a number that the user needs to enter managed security service that issues and manages the lifecycle of client into a web page for secure access to a network or application. Unfortunately, they are expensive, people lose them, batteries fail and you can “loan” them to others easily. Implement a client -side certificates. Allowing modem access into the heart of secure networks is one of the most common sources of intrusion. There are hundreds of people with what are called war dialers who try to access corporate or government systems via modem banks. They are frequently successful. Project and protect your business identity through your web site using a trust mark establishes both identity and trust with site visitors. Instead, use a dynamically generated site seal that cannot be copied. For example, GeoTrust site seals are placed on web pages to identify that the site is legitimate, authentic and validated via an active call to a trusted third party. First, they consider the confirmation of site identity of the owner of highest importance. Second, it is designed to combat fraudulent usage. Third, it provides a “self-policing” capability that is unique to the web. If it determines that it cannot confirm the identity of the site owner from which it is launched, it causes the image to completely disappear. Finally, it links to a rich repository of validated information about the site and its owner to assist the user – and ultimately the site itself. This establishes trust with the merchant that will hopefully lead to numerous transactions.
  • 14. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI 8 Testing in production is tempting fate Chapter Create a demilitarized zone (DMZ) to cordon off risky network activities from your business- critical production network segments for all modem access, for simulating production or for allowing customers to do any kind of acceptance testing. Create a DMZ that has access to the Internet but limited access to internal networks. This is accomplished through careful setup of firewalls that cordon off the DMZ from the rest of the network while still allowing full Internet access. The firewalls protect the critical portions of the network from this DMZ. If customer acceptance testing is part of your business, only allow this kind of testing through the DMZ.
  • 15. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI 9 The weakest link in your security is your people Chapter Define your security protocol. This is perhaps the most overlooked, and the most dreaded of the 10 guidelines, yet it is the easiest and arguably the biggest impact item of all: write it down, communicate it and enforce it. Security is only as strong as your organization’s weakest link. Security is never entirely automatic, it involves people. People have the biggest impact on how successful an organization’s security strategy will be. The “bad guys” have found that social engineering is the easiest way to breach an organization’s security. Organizations can combat social engineering and simple errors best by having clearly written, clearly explained security policies that are enforced. Clearly document the appropriate processes and rules for accessing the facilities, accessing the networks, acceptable use of company systems and networks and acceptable use of company email and browsers. List standards that are supported and those that are not. Include operating systems that are allowed on the network and explain why others are not. Allowing a visitor to come in to your conference room where there is a network tap and plug in, is a very common way networks are penetrated as quickly as you can say “Trojan Horse”.
  • 16. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI 10 “Nobody knows if you’re a dog on the web” “Nobody knows you are a dog on the web” is a famous New Yorker cartoon that graces many web sites, presentations and even T-shirts. This points to the single biggest threat in using the web for critical transactions. The standard procedure to authenticate an individual is to query them about a set of shared secrets only you and the other person could know. The challenge with conducting business over the web is that the individuals are unknown to the business and therefore there are no shared secrets. Many organizations that require their customers to sign up, register or fill out applications are looking to eliminate manual paper processes and the manual approval process. In order to conduct online applications, organizations must be able to authenticate the consumer is who they say they are and have the ability to generate e-signatures. If the above mentioned 10 steps are not followed then following are effects mentioned: Start using well-tested, mature authentication technologies to establish identity of anonymous web- based individuals. Streamline your business through paperless transactions
  • 17. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI PROS CONS Application Independent Limited Application Support High Performance Poor Performance Scalable Fixed Good Security Bad Security Highly Protected No Protection Conclusion The Internet represents an opportunity for enterprises to extend their reach, integrate their
  • 18. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI community of employees, business partners and customers and to reduce costs by using inexpensive public networks. Inside and outside the enterprise, business is moving online, which means there’s an important need to establish secure communications and practices in both extranet and intranet applications. Every enterprise network needs protection of confidentiality of data, integrity of data and secure access to data for appropriate users. There are, of course, many different aspects of security in enterprise networks, and our “Top 10”recommendations represent just a few best practices in the areas of physical security, data security and network security. GeoTrust Solutions for Enterprise Security GeoTrust is committed to aggressively developing solutions that are progressive and innovative to help you secure your enterprise systems and maintain secure e-commerce transactions, trusted identities and fully managed trusted e-business environments. GeoTrust offers a comprehensive array of enterprise security solutions to secure online identities for people, devices and applications, including Enterprise SSL .™ Enterprise SSL is an ideal solution for any enterprise that needs to deploy and manage five or more SSL certificates. It includes powerful 1024-bit signed certificates and a centralized, web- based administrative portal for complete control over certificate lifecycle management. Client Certificates. True Credentials® is a fully- managed, web-based client certificate service that safeguards communication and data exchange between your enterprise and your employees, vendors, business partners and customers. It provides secure network access to credentialed users, enables secure messaging and S/MIME and supports digital signature applications. SSL Security for Mobile Environments. The Power Server ID™ SSL certificate provides the highest level of browser compatibility and web security for mobile and networked environments. An ideal solution for hosting companies and enterprises with a global e-business base, Power Server ID ensures that any customer can connect from any device, anywhere, anytime. Code Signing Certificates. Code Signing certificates are available for developers to ensure that code that is passed to platforms, particularly wireless platforms, is not tampered with in any way. Code Signing certificates assure developers of the code integrity, protects handheld users from viruses and enables enterprises to roll out secure applications faster.
  • 19. [Best Practices To Secure Your Enterprise] [2011-12] | N.B.MEHTA SCIENCE COLLEGE BORDI References GeoTrust Solutions for Enterprise Security Enterprise SSL