SlideShare a Scribd company logo
Module 4
Derick B. Peterson
Dr. Junior J. Gentles
Stratford University
Cyber Security Capstone (CIS 595)
May 3, 2015
With the rise of hackers infiltrating companies private information, security is the number
one priority in protecting personal and business private information, during this technology era
the usage of internet in the last 15 years has quadruple and cybercrime has also risen with the
steady flow of the usage of the internet. People not only use the internet to view videos or
entertainment they now used the network also is being used to pay bills such as mortgage
payments, paying credit card bills, and many other things. Not to mention when you make
purchase at these department stores you mainly use your credit card for purchases. Hackers has
become so skillful in obtaining private information that securing your information is an everyday
task.
The network infrastructure that I chose to for the banking security issue will be the
Barracuda NG Firewall provides a powerful and extremely reliable detection and classification
of more than 1,200 applications and sub-applications by combining Deep Packet Inspection
(DPI) and behavioral traffic analysis – no matter if the protocols are using advanced obfuscation,
port hopping techniques, or encryption. It allows the creation of dynamic application policies and
facilitates establishing and enforcing acceptable access and use policies for users and groups by
application, application category, location, and time of day. Administrators can now:
 Block unwanted applications for certain users or groups
 Control and throttle acceptable traffic
 Preserve bandwidth and speed-up business-critical applications to ensure business
continuity
 Enable or disable specific application sub-functions (e.g., Facebook Chat, YouTube
Postings, or MSN file transfers)
 Intercept SSL-encrypted application traffic
.
DeepApplication Context
The deep application context analysis allows for deeper inspection of the application data stream
by continually evaluating the actual intention of applications and the respective users. By this
means administrators can gain detailed insight into what a specific application was used for or if
a user was trying to circumvent the corporate application usage policy.
Personalized Application Control
On top of the 1,200+ applications that are delivered out of the box and constantly updated, the
Barracuda NG Firewall provides a way to easily create user-defined application definitions for
best-in-class application control customized and tailored to an organization’s specific needs.
Module 4 CIS 595
Module 4 CIS 595
http://www.businessweek.com/articles/2014-03-13/target-missd-alarms-in-epic-hack-credit-data
https://www.barracuda.com/products/firewall/features#SUB

More Related Content

PDF
Android security a survey of issues, malware penetration, and defenses
PDF
Secure Web Gateway Ds Lr[1]
PDF
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
PPT
Intranet Presentation
PDF
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
PPTX
Top 5 Cybersecurity Threats in Retail Industry
PPTX
Web application firewall solution market
PPT
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
Android security a survey of issues, malware penetration, and defenses
Secure Web Gateway Ds Lr[1]
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
Intranet Presentation
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
Top 5 Cybersecurity Threats in Retail Industry
Web application firewall solution market
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY

What's hot (20)

PDF
Top 5 Cybersecurity Risks in Banking
PDF
PDF
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
PDF
SAML Security Contacts
PDF
Malicious malware breaches - eScan
PPTX
The Mobile Lawyer: 2014
PPT
Security and information assurance
PPT
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
PPTX
Risks and Security of Internet and System
PDF
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
PPTX
CyberCrime attacks on Small Businesses
PPTX
Data security for healthcare industry
PDF
Supply chain-attack
PPTX
Combating cyber security through forensic investigation tools
PPT
this is test for today
PPTX
Data and Message Security
PDF
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
DOC
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
PPTX
Mobile database security threats
PDF
Smartphones' Security
Top 5 Cybersecurity Risks in Banking
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
SAML Security Contacts
Malicious malware breaches - eScan
The Mobile Lawyer: 2014
Security and information assurance
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Risks and Security of Internet and System
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
CyberCrime attacks on Small Businesses
Data security for healthcare industry
Supply chain-attack
Combating cyber security through forensic investigation tools
this is test for today
Data and Message Security
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
Mobile database security threats
Smartphones' Security
Ad

Similar to Module 4 CIS 595 (20)

PDF
Descripcion Tecnica del Barracuda NG Firewall
PPTX
Vfm palo alto next generation firewall
PDF
Key Policy Considerations When Implementing Next-Generation Firewalls
PDF
Barracuda web application_firewall_wp_advantage
PDF
PPT
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PPTX
Palo alto safe application enablement
PDF
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
PPTX
9780840024220 ppt ch05
PPTX
Next Generation Firewalls
PPTX
Cyber Attacks and Defences - JNTUH,Cyber Attacks and Defences
PPTX
Firewall and its purpose
PDF
Are you fighting_new_threats_with_old_weapons
PDF
Remote Workforces Secure by Barracuda
PDF
Trend micro deep security
PPTX
LIS3353 SP12 Week 9
PDF
Network Security Fundamentals
PDF
Firewall buyers-guide
PPTX
Analytical Driven Security - Chip Copper
PPT
Implementing an improved security for collin’s database and telecommuters
Descripcion Tecnica del Barracuda NG Firewall
Vfm palo alto next generation firewall
Key Policy Considerations When Implementing Next-Generation Firewalls
Barracuda web application_firewall_wp_advantage
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
Palo alto safe application enablement
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
9780840024220 ppt ch05
Next Generation Firewalls
Cyber Attacks and Defences - JNTUH,Cyber Attacks and Defences
Firewall and its purpose
Are you fighting_new_threats_with_old_weapons
Remote Workforces Secure by Barracuda
Trend micro deep security
LIS3353 SP12 Week 9
Network Security Fundamentals
Firewall buyers-guide
Analytical Driven Security - Chip Copper
Implementing an improved security for collin’s database and telecommuters
Ad

More from Derick Peterson (7)

DOCX
Derick's List of Corporate Companies
DOC
Database Security Project_17Sep2014 final edits
PPTX
Task 7 Interactive
PPTX
Corporate Ladder
PDF
CompTIA Security+ ce certificate
DOCX
Cultural and Social Engagement
DOCX
Derick's Introductory
Derick's List of Corporate Companies
Database Security Project_17Sep2014 final edits
Task 7 Interactive
Corporate Ladder
CompTIA Security+ ce certificate
Cultural and Social Engagement
Derick's Introductory

Module 4 CIS 595

  • 1. Module 4 Derick B. Peterson Dr. Junior J. Gentles Stratford University Cyber Security Capstone (CIS 595) May 3, 2015
  • 2. With the rise of hackers infiltrating companies private information, security is the number one priority in protecting personal and business private information, during this technology era the usage of internet in the last 15 years has quadruple and cybercrime has also risen with the steady flow of the usage of the internet. People not only use the internet to view videos or entertainment they now used the network also is being used to pay bills such as mortgage payments, paying credit card bills, and many other things. Not to mention when you make purchase at these department stores you mainly use your credit card for purchases. Hackers has become so skillful in obtaining private information that securing your information is an everyday task. The network infrastructure that I chose to for the banking security issue will be the Barracuda NG Firewall provides a powerful and extremely reliable detection and classification of more than 1,200 applications and sub-applications by combining Deep Packet Inspection (DPI) and behavioral traffic analysis – no matter if the protocols are using advanced obfuscation, port hopping techniques, or encryption. It allows the creation of dynamic application policies and facilitates establishing and enforcing acceptable access and use policies for users and groups by application, application category, location, and time of day. Administrators can now:  Block unwanted applications for certain users or groups  Control and throttle acceptable traffic  Preserve bandwidth and speed-up business-critical applications to ensure business continuity  Enable or disable specific application sub-functions (e.g., Facebook Chat, YouTube Postings, or MSN file transfers)  Intercept SSL-encrypted application traffic . DeepApplication Context The deep application context analysis allows for deeper inspection of the application data stream by continually evaluating the actual intention of applications and the respective users. By this means administrators can gain detailed insight into what a specific application was used for or if a user was trying to circumvent the corporate application usage policy. Personalized Application Control On top of the 1,200+ applications that are delivered out of the box and constantly updated, the Barracuda NG Firewall provides a way to easily create user-defined application definitions for best-in-class application control customized and tailored to an organization’s specific needs.