Wednesday, August 5, 2015

EVALUATE SECURITY SOFTWARE AND EQUIPMENT


SECURITY POLICY
Security is defined as a state that is free from threats and risks that can not be accepted. Security is an ongoing process. It involves activities that must be carried out periodically from time to time to ensure the safety because of threats and vulnerabilities are constantly changing.
ICT security is meant a state in which all things prepare and provide services based on ICT systems run continuously without interruptions that could affect safety. ICT security is closely related to the protection of ICT assets.


There are four (4) basic components
ICT security, namely:

a. Protecting official secrets and official information from unauthorized access government legitimate
b. Ensure that any information is accurate and complete
c. Ensure the availability of information when required by user
d. Ensures access to only authorized users or receipt of information from a legitimate source.


For companies / institutions d.l.l:

1. Confidentiality - Information can not be disclosed indiscriminately or allowed to be accessed without authorization.
2. Integrity - Data and information to be accurate, complete and updated. It can only be changed by an authorized.
3. Non-Repudiation - Sources of data and information to be legitimate sources and can not be denied.
4. Legality - Data and information must be guaranteed authenticity.
5. Availability - Data and information to be accessed at any time.








Security solutions and their placement in special network.






1. The most common place to enter a firewall or VPN device which is right behind the entrance router that connects to the Internet. Usually, if both are used, it is used in Selari. I also have seen the circumstances in which the second firewall has been added where the arrows 'B' is pointing. There are also tools that contains both the firewall and VPN in the same box.

2. The invasion pengesanan System (IDS) may actually be placed in the eye. One of the most important is where 'A' arrow pointing. It later allowed the detection invasion that debuted get through at no VPN or firewall you. Another location is to put it between the router and Internet gateway, to the detection potential invasion before they come into your circuit. If you put one in there, do not ignore IDS inside, with which outsiders would not be able to mengesan any invasion that might come from other Courant Courant-VPN you, because traffic is still inside the tunnel troubled at the time. You may also have IDS is based host-who, of course, will be installed on each host tattoo shown in the picture.

3. It is also important to grab the attention that many modern routers have firewall functions, and some firewalls may also act as a router. In addition, both of them, plus a VPN devices, providing logging may be fed to the IDS. So, the picture presented is very simple view circuit. However, it provides a solution that may be used.

4. To determine what is best for your circuit, you need to have a safety circuit negotiator working with your circuit engineer to come up with the best combination of products and perkhidmatan. You need to balance safety sentiasa, processing and boarding in any decision of the management of risk





Product safety information


1.Product safety maklumatantimalware
2.Security Applications
3.confirmation
4.E-mail
5.Identity and Access Management
6.Intrusion Detection / Prevention
7.Mobile Data Security
8.Network Access Control
9.Firewall network
10.Secure Remote Access
11.Security Information Management
12.Unified Threat Management
13.Vulnerability management
14.wireless Security
15.Emerging Technologies




For users of Hiren's Boot CD, you can continue to step number 3. Follow these steps:

1. DOWNLOAD SOFTWARE.
2. Close all your programs.
3. Extract the downloaded file and search-setup.exe file MBAM.
4. Double Click MBAM-setup.exe file to install the application.
5. Then click Next to finish, do not need to change any setting. As a last resort, be sure to select the checkbox on the option Update Malwarebytes 'Anti-Malware and Launch Malwarebytes' Anti-Malware, then
6. Click Finish
7. END