security overview

Document Sample
security overview Powered By Docstoc
					CJIN Network Security



AO
  C              S HP
      Overview



DO
  C              D CI
CJIN Network        DOJ


        SHP   AOC

  DOC
What is a Firewall?
       Firewall Strategy

●   A firewall is more than a single
    component, it is a strategy for
    protecting CJIN’s resources.
●   A firewall acts as the gatekeeper
    between networks.
●   Firewalls eliminate the need to
    individually secure all the computing
    devices within an internal network.
     Firewall Objectives

• Only allow traffic determined to be safe

• Limit exposure from weaknesses in internal
  software and software configuration

• Provide minimal information about the
  internal network

• Track firewall access activity and provide an
  alert for any suspicious activity
What is Encryption?
    CJIN Network
        This is
      confidential.
    Τηισ ισ
    Χονφιδεν
    τιαλ.
      Encryption Strategy

●   Provide confidentiality of
    communications

●   Ensure integrity of information

●   Enhance Authentication

●   Provide for non-repudiation of sender
    or receiver
        Secret Key Encryption

                               Not a
 This is a                    secure
                                line                     This is a
 secret message
                                                         secret message




1. Bob types message to Jane and       1. Jane receives Bobs secret
encrypts the message with secret       message and is later told by Bob
key and sends it.                      the secret key to unlock the
                                       message
3. Somehow he lets her know
what his secret key is.                2. She decrypts and reads the
                                       message
           Public Key Encryption
     Bob                                                    Jane
  Jane,                      Not a
                                                       Jane,
    This is a secret        secure
                                                         This is a secret
   message                    line
                                                        message
               - Bob                                                - Bob



  Jane’s public key               Jane’s private key


1. Bob writes the message and           1. Jane receives the message
encrypts it using Jane’s public         and decodes it with her private
key which is known to everyone          key, which only she knows.
2. Bob sends the message over           2. The secrecy of the private
the internet to Jane                    key is crucial
    Confidence in the Network
       Security Strategies
●   Reasons:
    ◆ Following private industry standards
    ◆ Plan is scalable and flexible

    ◆ Security experts with international
      experience
Security is not about
    technology.
              Strategy Pieces
                             Security
Independent                 Oversight
  Auditor                   Committee




                                 Trained,
                                expert staff
CJIN Security Oversight
      Committee
●   Appointed by the CJIN Board
●   Comprised of stakeholders
●   Understands the business needs of
    CJIN
●   Sets rules for CJIN network security
●   Dynamic, permanent committee
●   Continuing group knowledge
 As technology changes,
  CJIN Network Security
business rules will continue
        to protect.
 CJIN Governing Board
                                           CJIN Governing Board




Security Oversight Committee
●   reports to CJIN Governing Board   ●   reports breaches
●   proposes policy                   ●   reports responses
●   states business rules
CJIN Network
Security                         n cy
                            ge                 y
strategies can            A
                                   Ag
                                        e nc

be re-used                         cy
                                 n
by other           nc
                      y   A ge
                                            cy
                ge                        n
agencies.     A                    A ge
NCIIN Network            Agency



      Agency    Agency


  Agency

               Agency
              Strategy Pieces
                             Security
Independent                 Oversight
  Auditor                   Committee




                                 Trained,
                                expert staff
CJIN Network Security




       The End

				
DOCUMENT INFO
Shared By:
Stats:
views:38
posted:5/31/2011
language:English
pages:19
Description: Secruty Overview
AKMAL ANSARI AKMAL ANSARI CHAMAN BAHAR MASALA http://akmalcbm.co.in
About I'M TECHNOLOGY ENTHUSIAST FRM MY CHILDHOOD.