1 / 17

Kegel Network Security

Kegel Network Security. Presented by: Walter Ramirez Kyla Williamson Brent Sims. Outline. Company Background Threats Recommendations. Company Background. 4 Divisions Manufacturing Bowling Technologies Kegel Training Center Fizzion. Threats. Physical Security

mills
Download Presentation

Kegel Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Kegel Network Security Presented by: Walter Ramirez Kyla Williamson Brent Sims

  2. Outline Company Background Threats Recommendations

  3. Company Background 4 Divisions Manufacturing Bowling Technologies Kegel Training Center Fizzion

  4. Threats Physical Security Authentication Internet Access & Usage Backup Systems and Data Recovery Virus, spyware, adware, spam Authorization

  5. Recommendations Physical Security • Sensitiveareas and Access level • Internalmonitoring and Whoisresponsible • Specifyhowanemployeeshouldbeidentified • Specifythefrequency of change of accesscode

  6. Recommendations • Authentication • Addguidelinesfor cracking password • Reinforcementaboutsharingpasswordsand unauthorizedaccesssituations • Documentedpermissionfor VPN • Checkall software and hardware by CSO

  7. Recommendations • Internet Access & Usage • Highlightwhichtypes of web sites are prohibited • Highlightthemethodsfor internet monitoring

  8. Recommendations Backup Systems and Data Recovery • No formal backup procedure • Recommended that one be in writing

  9. Recommendations Anti-Virus, anti-spyware, anti-adware, anti spam software

  10. Recommendations Authorization • Authorization based on different levels of access • An encryption policy is mentioned but not fully documented.

  11. Conclusion Keep it Safe! Presented by: Walter Ramirez Kyla Williamson Brent Sims

  12. Conclusion Keep it Safe! Presented by: Walter Ramirez Kyla Williamson Brent Sims

  13. References Andress, M. (2001, Nov 19) Effective security starts with policies, InfoWorld. Retrieved February 21, 2009, from Academic Search Premier. Avolio, F. M. (2000, March 20). Best practices in network security, Network Computing. Retrieved February 23, 2009 from http://www.networkcomputing.com/1105/1105f2.html. Connolly, P. J. (2000, July 10). Security starts from within, InfoWorld. Retrieved from Academic Search Premier February 21, 2009. Dunbar, M. (2001, November). Sound policy equals strong security, Credit Union Magazine. Retrieved February 21, 2009, from Business Source Premier.

  14. References Ellis, C. (2003, February). '7 Steps' for network security, Communications News. Retrieved February 23, 2009, from http://findarticles.com/p/articles/mi_m0CMN/is_2_40/ai_9 7724647. Forcht, K. and Ayers, W. (2000/2001, Winter) Developing a computer security policy for organizational use and implementation, Journal of Computer Information Systems. Retrieved February 12, 2007, from http://search.ebscohost.com. Gartenberg, M. (2002, June 24). Being tough, gentle with data security, Computerworld. Retrieved February 25, 2009, from Academic Search Premier.

  15. References Hulme, G. (2000, October 16). Beware of the threat from within, InformationWeek. Retrieved February 22, 2009, from http://search.ebscohost.com. Hulme, G. (2001, Sept 3). Management takes notice,Information Week. Retrieved July 2, 2002, from http://search.ebscohost.com. Jacobs, J. A., Pearl, M. C., & Irvine, S. (2001, March). Protecting online privacy to avoid liability. Association Management. Retrieved February 25, 2009, from http://search.ebscohost.com. Kegel Training Center. (n.d.) Retrieved March 31, 2009 from, http://www.kegeltrainingcenter.com/default.asp.

  16. References Konicki, S., Scott, K., Garvey, M., Gilbert, A., Greenemeier L., & Rendleman, J. (2001, October 15). IT on high alert. InformationWeek. Retrieved Feb 25, 2009, from Academic Search Premier. Luzadder, D., Bryce, R., Gohring, N., Ploskina, B., Scanlon, B., Smetannikov, M., & Spangler, T. (2001, October 22). Feeling insecure, Interactive Week. Retrieved February 22, 2009, from Academic Search Premier. Palmer, M. (2001,May/June) Information security framework; Best practices for security policy on the e-commerce age, Information Systems Security. Retrieved February 22, 2009, from Academic Source Premier.

  17. References Smith, G. (2009, January 30). Keeping watch, Utility week. Retrieved February 23, 2009, from LexisNexis. Woods, C. (2000 February, 11). Get data safety policies on paper, American Banker. Retrieved February 22, 2009, from Business Source Premier. Yasin, R. (2001, January 8). Policy management hits the web, InternetWeek. Retrieved July 2, 2002, from Academic Search Premier.

More Related