SlideShare a Scribd company logo
1 of 68
Mission Critical Solutions
Introducing
Security Solutions
Presentation by
Hema Luqman
Naved Ahmed
Table of Content
The cyber world, a reflection of our physical world
 SDN – Introduction
 SDN – Ambition and Purpose
 SDN Services and Product Line
 Security Threats
 IT Security Critical Success Factors
 Proposed Services
The cyber
world
Reflection of
our physical
world
Is It ?
Where are we Today ?
Hello World
What Internet Assigned Numbers Authority (IANA) doing
The Regional Internet Registry system evolved over time, eventually dividing the world into five RIRs:
•African Network Information Center (AFRINIC)[1] for Africa
•American Registry for Internet Numbers (ARIN)[2] for the United States, Canada, several parts of the Caribbean region, and Antarctica.
•Asia-Pacific Network Information Centre (APNIC)[3] for Asia, Australia, New Zealand, and neighboring countries
•Latin America and Caribbean Network Information Centre (LACNIC)[4] for Latin America and parts of the Caribbean region
•Réseaux IP Européens Network Coordination Centre (RIPE NCC)[5] for Europe, Russia, the Middle East, and Central Asia
1 Minute of Internet
What is going on around us ?
Where are we heading?
Figures for Saudi Arabia
What is being said about Saudi Arabia
Behind the Scenario
Estimated Net Loss Due to Cybercrime
Cybercrime is a growth industry.
High return, Low risks
Likely annual cost to the global economy from
cybercrime is more than $400 billion.
Ranging from $375 billion to $575 billion.
This is the equivalent of the GDP of:-
$375bn – Singapore, South Africa
$575bn – Belgium, Argentina, Austria
Governments and companies still
underestimate the risk and the exponential
growth.
Internet economy annually generates between
$2 trillion and $3 trillion.
Therefore, cybercrime extracts between 15%
and 20% of the value created by the Internet.
Cyber Crime per GDP
Copy Right –Information Security Forum
As your workforce and customers embrace the cloud, mobility, social media and big data, your
organization’s attack surface expands significantly.
We all agree?
but we disagree?
We need full Proof System Architecture
But we have expert team and latest technology
We have Teams of Experts , Key Players,
Top Consultants, Latest Technology ,
World Class Data Centers, High end
Servers , etc. But the Threat is ongoing,
the breaches continue
CCTV Camera
CCTV Camera
LPR
RFID
ID verification Terminal
Base Station
VSAT
Server
Network
Monitoring
Vehicle screening
Integrated Security System
But situation behind the seen is different
Why are systems being compromised ?
So
A Saudi company with a grand
ambition
SDN - Introduction
• SDN is a Saudi LLC founded with a big ambition.
• We want to bring state of the arte IT and Power solutions to
the Kingdom by leveraging the strengths of our ecosystem.
• To date we have succeeded to create traction through:-
– strategic relationship to address the local and regional
market with value added solutions
– Created a SDN team that is a unique group of extremely
talented engineers, technicians, and project managers.
• Our service and product line is focused on Systems
Integration, Security, Power and Operations & Maintenances
• We are also exploring data management and analytics for a
2016/2017 launch.
• Human Centric ICT services and solutions
that enable end-to-end flow of transactions
and information.
• Creating value by enabling ecosystem
connectivity and collaboration possible
through connections and collaboration.
• Technology to meet business challenges and
resolve issues.
• Secure and trusted multi-surface and multi-
faceted connections.
contribute to the creation of a networked Saudi society that is
rewarding and secure, bringing about a prosperous future for
our nation that fulfils our nation’s dreams and aspiration.
Corporate Vision
Size, Type & Complexity
of Projects • Project Management
• Product & Service Line
Experts
• Build Brand
• Execute through subs
• Collaborate with Global names
• Professional Services
• Brand elements invested
• Based on fundamental & technical analysis
• Seamless mobilization of resources and
assets
• Trusted and valued Partner for customer’s expansion.
• Bring infrastructure solutions that benefit everyone to from a networked society.
• Leverage information and communications technology to create new possibilities for value generation.
Act as the Trusted advisor and enabler
SystemsIntegration
Planning and Structuring Product Innovation
TrustandIntegrity
Operation&Maintenance
Powersolutions
KYC – Understand Objectives and Needs – Assess & Align
SDN Product and Service Line
Network Infrastructure
Low Current
Data Centre
Mobility
Security Management
Information Security
Vulnerability Defense
Enterprise Services
On Site Operations
On Call Maintenance
Remote site Support
Power over IT
Solar Energy
Redundancy
System
Integration
Trust &
Integrity
Information
Management
Operation &
Maintenance
Power
solutions
Saudi Electrical Power Data
Network
SDN Product and Service Line
Our Ecosystem Partners and Customers
System Integration
Trust and Integrity
Operation & Maintenance
Power
• S2N Technology LLC
• Saudi Red Crescent
• Imarat Tabuk
• King Abdulaziz University
• King Fahad Medical City
• Ministry Of Interior (introduction stage )
• Ministry of Defense (under technical evaluation)
• Saudi Aramco (under technical evaluation)
• The Royal Court –(under negation )
• Ministry of Petroleum – (to be finalized in next budget )
• F-Net LLC
• KDN Cyber Security
Center
• SDN • Emara of Najran
• KFMC (bid evaluation, no.1)
• Dammam University
• KAIA
• Saudi Aramco (under technical evaluation)
• S-Energy -Korea
• Solar City- USA
Systems Integration
S2N services and solutions
S2N services and solutions
Mission Critical Customers
Constructing Tier III and Tier IV
Mission Critical Customers
Anti Hack Solution
* Patented NetSwitch from Taiwan
* A domestic patent application with NetSwitch
* A patent application about Netswitch relative with USA, Japan and China
* A patent announcement about NetSwitch in USA
* A domestic patent application about DualNET
* A domestic registration of utility model of NetSwitch
Acquisition of venture firm status
Selection of Technology Credit Guarantee Fund, blue-chip technology companies
Acquisition of approval of use DualNET from Ministry of Defense
Actuation of security certification from department of public peace in China
(6 security certifications including Netswitch Series )
Authenticated PoE EP Serise EMI/EMC
* Pass the TTA electronic characteristic test about DualSM-24M
Patented Certification
Information
Security
Consult
Network
Brand customizable
Terminal
Network
Redundancy
Ethernet
Solution
Terminal Network Redundancy
Provided non-stop operation environment using a backup
network equipment and electronic patch (Suggest a low
cost and high efficiency of differentiated network method)
Information Security
NetSwitch
Plus
DualNET
IPChanger
1) Products that add personal PC security S/W of NETSwitch product lines
2) Add features such as PC firewall/virus protection except IP Changer features
1) Network switching devices that operate by separating the internal network
2) HDD and external network HDD on a single PC Internal HDD data is fully security because
HDD operate separately Safe from hackings and viruses
3) Suitable for educational/research PC because of one of the two OS can be
used on a single PC
1) Send and receive network switching signal in Netswtich product line (Except Netswitch I)
2) Software that enables you to convert the IP environment without rebooting
Information Security
NetSwitch I
NetSwitch
II-M
NetSwitch
II-R
- NETSwitch for one user
- Essentially block the entry of the internal network from an external network
- Convert the IP environment without rebooting IP Changer S/W
- Physically separating the two networks and the PC is switched network to the IP changer S/W
- Other networks are cut off the electrical signal when using selected one of the networks.
In particular, the internal network is not accessible from the outside - Support 12 ports, 24 ports
- Built-in router to the Netswitch main functions - In the branch the internet is cable, internal
operations are performed in a dedicated line.
- Reducing leased line costs and achieve internal security in traffic distribution
- Built-in 12 ports 10/100BaseT Switching Hub
NETSwitch Series
Information Security – Existing Network
ISP , VPN
Internet Cloud
ISP
Our Gateway
Our Firewall
LAN Switches
Server
Database
Users
Information Security – Proposed Solution
ISP , VPN
Internet Cloud
ISP
Our Gateway
Our Firewall
Server
Database
Users
Information Security – Isolation Procedure
Problems
Problems of existing Network Isolation
Al through the physical isolation of the network is the safest
security solution; simply isolating the network may have the
following problems
1) Installation : Increase in the installation and management
expenses sue to redundant network cable between the internal
and external network equipment’s and user PC’s
2) Usability: When using one PC, inconvenience of the resetting
the IP address, PC rebooting and switching cables.
3) When using two PC, burden of purchasing an additional PC and
management expenses.
4) Space: excessive space is required for two PC and cabling.
Physical Separation
1. What is the physical network isolation?
• Physical isolation method fundamentally removes the
access part from the internal network from external
network by isolating the internal network that requires high
level of security from the external network, different from
the existing software base security .
• It is the most ideal security solution and from past 15 years
and still gone of its kind successfully working and still
growing strong
2. Need of Network Isolation ?
• Organization that are sensitive to the security worry about
the limit that the internal network and critical resource
cannot be completely protected when the internal and
external and external network are physically connected
even if the logical security solutions , such as the firewall,
IDS,VPN and Anti virus , are implemented.
• It is impossible to defend any hacking method or viruses
that are known yet .
If there is a way out, there must be way in.
IP Changer, “A” Game Changer
Advantage
Advantages of F-Net Network Isolation Security Products.
As the new network Isolation), NetSwitch Series and DualNET provide the following advantages to the user
and network administrator:
1) Physical Level Security : Highest Level of Network Security
2) Ensemble of Convenience and Efficiency : Network Switching required only simple user interaction
3) Reducing of system implementation cost : Network isolation and implementation cost us reduced by using single
PC and cabling
4) Reduction of Network Security Management Cost: Management cost is minimized through the use of Hardware-
based product.
5) Economical Line Speed upgrade: Traffic can be distributed through the isolation of the internal or external
network.
IP-Changer IPCHANGER
IPChanger is a program used in conjunction with NetSwitch II-
M (24- or 12-port) or NetSwitch IIR (12-port). To use internal
network and external network (Internet) in a very isolated
manner by implementing NetSwitch II series product,
IPChanger must be installed in each computer connected to
network. Internal network or external network can be
conveniently selected and switched using IPChanger.
IP changer supports latest operating system
environment with integrating of Arabic language It
allows you to selectively connect to either internal network or
external network (Internet) by clicking on the system tray icon
located in the lower left corner of the desktop after the
installation. IPChanger can be configured to meet various user
requirements, offers the following benefits, and advanced
Clients
Cyber Security Center
Cyber Security Centre
From Purpose to Solution Architecture
Power Oil District Heating, etc
National Security & People’s Living Stabilization
through stable demand and supply of energy
Real-time surveillance Emergency response
IT Infrastructure in Energy Sector
Vulnerability Analysis/assessment
Gas
Cyber Security Center
Governance Structure
▶ 28 Participating Institutions
- information furnishing
- joint measure
power(15) gas(4) oil(2) the others(7)
▶ Steering Committee : vice
minister of MKE + 11 CEOs
▶ Chief : policy director of MKE
▶ Secretariat : 2 officials of MKE
- in charge of Information Mg ’t Div.
Working committee
Steering committeechief
secretariat
▶ Operating Institution(KDN)
- Security Operation Team
- Computer Emergency Response Team
- Vulnerability Analysis/Assessment Team Operation T. CERT Analysis T.
Operating Institution
Organization
Operational System
Cyber attack (hacking / worm / virus)
early warning
information sharing person
in charge
security controlling
1. 24-hour surveillance
cooperation
emergency response
1. accident analysis
surveillance
blocking
restoration
analysis/assessment
1. vulnerability review
2. measure establishment
2. initial response
3. operation of Help Desk
2. restoration
3. proliferation prevention
NationalInfrastructure
Mission
ESM TMS
WMS
Major Systems
Enterprise Security Management (ESM)
• normalization and
unified management
of security events
• correlation analysis &
accident detection
based on real-time
• intuitional grasp and
situation analysis
based on 3D
visualization
Quick defense of cyber security symptoms
Threat Management System(TMS)
• detection, analysis
and block of harmful
traffic
• Forecast/warning of
cyber threat
• real-time statistics,
analysis and web
service
Forecast/warning & real-time information sharing to the participant
WEB Management System(WMS)
• periodic surveillance of
participant’s homepage
• 24 hours real-time
monitoring
• instant countermove to
forgery and altering of
homepage
Instant countermove to forgery and altering of homepage
Anti Hack Solution

More Related Content

What's hot

Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareSlash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareReal-Time Innovations (RTI)
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityRobb Boyd
 
Commissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial NetworksCommissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial NetworksCreekside Marketing Group, LLC
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New YearSavvius, Inc
 
Carlos Morales 2016v3_sinRef
Carlos Morales  2016v3_sinRefCarlos Morales  2016v3_sinRef
Carlos Morales 2016v3_sinRefcarlos morales
 
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsSpace Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsReal-Time Innovations (RTI)
 
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)Real-Time Innovations (RTI)
 
The Evolution of the Data Centre
The Evolution of the Data CentreThe Evolution of the Data Centre
The Evolution of the Data CentreCisco Canada
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsReal-Time Innovations (RTI)
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFFaleh M.
 
How to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsHow to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
Cisco orientation
Cisco orientationCisco orientation
Cisco orientationali raza
 
Tapsoft network solutions
Tapsoft network solutionsTapsoft network solutions
Tapsoft network solutionsSagarDabhade1
 

What's hot (20)

Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareSlash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
 
Commissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial NetworksCommissioning, Managing & Troubleshooting Industrial Networks
Commissioning, Managing & Troubleshooting Industrial Networks
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
Agile Network Agile Management
Agile Network Agile ManagementAgile Network Agile Management
Agile Network Agile Management
 
Carlos Morales 2016v3_sinRef
Carlos Morales  2016v3_sinRefCarlos Morales  2016v3_sinRef
Carlos Morales 2016v3_sinRef
 
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsSpace Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
Right FACE! -- Welcoming FACE to RTI for their June 2013 Meeting (PDF)
 
Armando_Flores_Jr_CV_11
Armando_Flores_Jr_CV_11Armando_Flores_Jr_CV_11
Armando_Flores_Jr_CV_11
 
The Evolution of the Data Centre
The Evolution of the Data CentreThe Evolution of the Data Centre
The Evolution of the Data Centre
 
Nuestar UltraDDI
Nuestar UltraDDINuestar UltraDDI
Nuestar UltraDDI
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
DNA: an overview
DNA: an overviewDNA: an overview
DNA: an overview
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
 
Murari kumar
Murari kumarMurari kumar
Murari kumar
 
How to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of ThingsHow to Architect Microgrids for the Industrial Internet of Things
How to Architect Microgrids for the Industrial Internet of Things
 
Cisco orientation
Cisco orientationCisco orientation
Cisco orientation
 
Tapsoft network solutions
Tapsoft network solutionsTapsoft network solutions
Tapsoft network solutions
 

Viewers also liked

Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Security in embedded systems
Security in embedded systemsSecurity in embedded systems
Security in embedded systemsRaghav S
 
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
 [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program... [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...DevDay.org
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning systemVIBHOR RATHI
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes pptdeepu427
 
SUPER CAPACITOR
SUPER CAPACITORSUPER CAPACITOR
SUPER CAPACITORjestin joy
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
The Big Bang Theory
The Big Bang TheoryThe Big Bang Theory
The Big Bang Theoryrose_aries15
 

Viewers also liked (10)

Hack for security
Hack for securityHack for security
Hack for security
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Security in embedded systems
Security in embedded systemsSecurity in embedded systems
Security in embedded systems
 
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
 [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program... [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
SUPER CAPACITOR
SUPER CAPACITORSUPER CAPACITOR
SUPER CAPACITOR
 
Dc motor
Dc motor Dc motor
Dc motor
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
The Big Bang Theory
The Big Bang TheoryThe Big Bang Theory
The Big Bang Theory
 

Similar to Anti Hack Solution

6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...Jürgen Ambrosi
 
Powernet Presentation
Powernet PresentationPowernet Presentation
Powernet PresentationPowernet
 
Powernet dossier
Powernet dossierPowernet dossier
Powernet dossierPowernet
 
SM Consulting Services_Presentation_for Social Media
SM Consulting Services_Presentation_for Social MediaSM Consulting Services_Presentation_for Social Media
SM Consulting Services_Presentation_for Social MediaSM Consulting Services Inc
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Cisco Enterprise Networks
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Deepak Shankar
 
Microlink Profile Credentials
Microlink Profile  CredentialsMicrolink Profile  Credentials
Microlink Profile Credentialsgajananp2008
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud EcosystemLumos Networks
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud EcosystemLumosNetworks
 
Fit for purpose? Physical infrastructure shouldn't hold back cloud innovation.
Fit for purpose? Physical infrastructure shouldn't hold back cloud innovation.Fit for purpose? Physical infrastructure shouldn't hold back cloud innovation.
Fit for purpose? Physical infrastructure shouldn't hold back cloud innovation.yourcloudinfrastructure
 
Astral Corporate Profile
Astral Corporate ProfileAstral Corporate Profile
Astral Corporate Profileandyfjim
 
Apresentação Webinar sobre soluções IoT para o Mercado de Energia!
Apresentação Webinar sobre soluções IoT para o Mercado de Energia!Apresentação Webinar sobre soluções IoT para o Mercado de Energia!
Apresentação Webinar sobre soluções IoT para o Mercado de Energia!Rodrigo Mordenti Tutilo
 
Next Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsNext Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsPT Datacomm Diangraha
 
CenturyDX-IT-Company
CenturyDX-IT-CompanyCenturyDX-IT-Company
CenturyDX-IT-CompanyMustafa Kuğu
 
SCC Capabilities and Credentials
SCC Capabilities and CredentialsSCC Capabilities and Credentials
SCC Capabilities and CredentialsDominic Davison
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1Chaing Ravuth
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA AutomationCisco Canada
 
AIS Company Overview
AIS Company OverviewAIS Company Overview
AIS Company OverviewAISDC
 

Similar to Anti Hack Solution (20)

6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
 
Powernet Presentation
Powernet PresentationPowernet Presentation
Powernet Presentation
 
Powernet dossier
Powernet dossierPowernet dossier
Powernet dossier
 
SM Consulting Services_Presentation_for Social Media
SM Consulting Services_Presentation_for Social MediaSM Consulting Services_Presentation_for Social Media
SM Consulting Services_Presentation_for Social Media
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
Microlink Profile Credentials
Microlink Profile  CredentialsMicrolink Profile  Credentials
Microlink Profile Credentials
 
Xaas infotech (2)
Xaas infotech (2)Xaas infotech (2)
Xaas infotech (2)
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
 
Fit for purpose? Physical infrastructure shouldn't hold back cloud innovation.
Fit for purpose? Physical infrastructure shouldn't hold back cloud innovation.Fit for purpose? Physical infrastructure shouldn't hold back cloud innovation.
Fit for purpose? Physical infrastructure shouldn't hold back cloud innovation.
 
Astral Corporate Profile
Astral Corporate ProfileAstral Corporate Profile
Astral Corporate Profile
 
Apresentação Webinar sobre soluções IoT para o Mercado de Energia!
Apresentação Webinar sobre soluções IoT para o Mercado de Energia!Apresentação Webinar sobre soluções IoT para o Mercado de Energia!
Apresentação Webinar sobre soluções IoT para o Mercado de Energia!
 
Next Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsNext Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of Things
 
CenturyDX-IT-Company
CenturyDX-IT-CompanyCenturyDX-IT-Company
CenturyDX-IT-Company
 
SCC Capabilities and Credentials
SCC Capabilities and CredentialsSCC Capabilities and Credentials
SCC Capabilities and Credentials
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1
 
E magic case study
E magic case studyE magic case study
E magic case study
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA Automation
 
AIS Company Overview
AIS Company OverviewAIS Company Overview
AIS Company Overview
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Anti Hack Solution

  • 1.
  • 4. Table of Content The cyber world, a reflection of our physical world  SDN – Introduction  SDN – Ambition and Purpose  SDN Services and Product Line  Security Threats  IT Security Critical Success Factors  Proposed Services
  • 5. The cyber world Reflection of our physical world Is It ?
  • 6. Where are we Today ? Hello World
  • 7. What Internet Assigned Numbers Authority (IANA) doing The Regional Internet Registry system evolved over time, eventually dividing the world into five RIRs: •African Network Information Center (AFRINIC)[1] for Africa •American Registry for Internet Numbers (ARIN)[2] for the United States, Canada, several parts of the Caribbean region, and Antarctica. •Asia-Pacific Network Information Centre (APNIC)[3] for Asia, Australia, New Zealand, and neighboring countries •Latin America and Caribbean Network Information Centre (LACNIC)[4] for Latin America and parts of the Caribbean region •Réseaux IP Européens Network Coordination Centre (RIPE NCC)[5] for Europe, Russia, the Middle East, and Central Asia
  • 8. 1 Minute of Internet
  • 9. What is going on around us ?
  • 10. Where are we heading?
  • 12. What is being said about Saudi Arabia
  • 14. Estimated Net Loss Due to Cybercrime Cybercrime is a growth industry. High return, Low risks Likely annual cost to the global economy from cybercrime is more than $400 billion. Ranging from $375 billion to $575 billion. This is the equivalent of the GDP of:- $375bn – Singapore, South Africa $575bn – Belgium, Argentina, Austria Governments and companies still underestimate the risk and the exponential growth. Internet economy annually generates between $2 trillion and $3 trillion. Therefore, cybercrime extracts between 15% and 20% of the value created by the Internet.
  • 16. Copy Right –Information Security Forum As your workforce and customers embrace the cloud, mobility, social media and big data, your organization’s attack surface expands significantly.
  • 17. We all agree? but we disagree?
  • 18. We need full Proof System Architecture
  • 19. But we have expert team and latest technology We have Teams of Experts , Key Players, Top Consultants, Latest Technology , World Class Data Centers, High end Servers , etc. But the Threat is ongoing, the breaches continue
  • 20. CCTV Camera CCTV Camera LPR RFID ID verification Terminal Base Station VSAT Server Network Monitoring Vehicle screening Integrated Security System
  • 21. But situation behind the seen is different
  • 22. Why are systems being compromised ?
  • 23. So
  • 24. A Saudi company with a grand ambition
  • 25. SDN - Introduction • SDN is a Saudi LLC founded with a big ambition. • We want to bring state of the arte IT and Power solutions to the Kingdom by leveraging the strengths of our ecosystem. • To date we have succeeded to create traction through:- – strategic relationship to address the local and regional market with value added solutions – Created a SDN team that is a unique group of extremely talented engineers, technicians, and project managers. • Our service and product line is focused on Systems Integration, Security, Power and Operations & Maintenances • We are also exploring data management and analytics for a 2016/2017 launch.
  • 26. • Human Centric ICT services and solutions that enable end-to-end flow of transactions and information. • Creating value by enabling ecosystem connectivity and collaboration possible through connections and collaboration. • Technology to meet business challenges and resolve issues. • Secure and trusted multi-surface and multi- faceted connections. contribute to the creation of a networked Saudi society that is rewarding and secure, bringing about a prosperous future for our nation that fulfils our nation’s dreams and aspiration. Corporate Vision Size, Type & Complexity of Projects • Project Management • Product & Service Line Experts • Build Brand • Execute through subs • Collaborate with Global names • Professional Services • Brand elements invested • Based on fundamental & technical analysis • Seamless mobilization of resources and assets • Trusted and valued Partner for customer’s expansion. • Bring infrastructure solutions that benefit everyone to from a networked society. • Leverage information and communications technology to create new possibilities for value generation. Act as the Trusted advisor and enabler
  • 27. SystemsIntegration Planning and Structuring Product Innovation TrustandIntegrity Operation&Maintenance Powersolutions KYC – Understand Objectives and Needs – Assess & Align SDN Product and Service Line Network Infrastructure Low Current Data Centre Mobility Security Management Information Security Vulnerability Defense Enterprise Services On Site Operations On Call Maintenance Remote site Support Power over IT Solar Energy Redundancy
  • 29. Our Ecosystem Partners and Customers System Integration Trust and Integrity Operation & Maintenance Power • S2N Technology LLC • Saudi Red Crescent • Imarat Tabuk • King Abdulaziz University • King Fahad Medical City • Ministry Of Interior (introduction stage ) • Ministry of Defense (under technical evaluation) • Saudi Aramco (under technical evaluation) • The Royal Court –(under negation ) • Ministry of Petroleum – (to be finalized in next budget ) • F-Net LLC • KDN Cyber Security Center • SDN • Emara of Najran • KFMC (bid evaluation, no.1) • Dammam University • KAIA • Saudi Aramco (under technical evaluation) • S-Energy -Korea • Solar City- USA
  • 31. S2N services and solutions
  • 32. S2N services and solutions
  • 34. Constructing Tier III and Tier IV
  • 37. * Patented NetSwitch from Taiwan * A domestic patent application with NetSwitch * A patent application about Netswitch relative with USA, Japan and China * A patent announcement about NetSwitch in USA * A domestic patent application about DualNET * A domestic registration of utility model of NetSwitch Acquisition of venture firm status Selection of Technology Credit Guarantee Fund, blue-chip technology companies Acquisition of approval of use DualNET from Ministry of Defense Actuation of security certification from department of public peace in China (6 security certifications including Netswitch Series ) Authenticated PoE EP Serise EMI/EMC * Pass the TTA electronic characteristic test about DualSM-24M Patented Certification
  • 39.
  • 40. Terminal Network Redundancy Provided non-stop operation environment using a backup network equipment and electronic patch (Suggest a low cost and high efficiency of differentiated network method)
  • 41. Information Security NetSwitch Plus DualNET IPChanger 1) Products that add personal PC security S/W of NETSwitch product lines 2) Add features such as PC firewall/virus protection except IP Changer features 1) Network switching devices that operate by separating the internal network 2) HDD and external network HDD on a single PC Internal HDD data is fully security because HDD operate separately Safe from hackings and viruses 3) Suitable for educational/research PC because of one of the two OS can be used on a single PC 1) Send and receive network switching signal in Netswtich product line (Except Netswitch I) 2) Software that enables you to convert the IP environment without rebooting
  • 42. Information Security NetSwitch I NetSwitch II-M NetSwitch II-R - NETSwitch for one user - Essentially block the entry of the internal network from an external network - Convert the IP environment without rebooting IP Changer S/W - Physically separating the two networks and the PC is switched network to the IP changer S/W - Other networks are cut off the electrical signal when using selected one of the networks. In particular, the internal network is not accessible from the outside - Support 12 ports, 24 ports - Built-in router to the Netswitch main functions - In the branch the internet is cable, internal operations are performed in a dedicated line. - Reducing leased line costs and achieve internal security in traffic distribution - Built-in 12 ports 10/100BaseT Switching Hub
  • 44. Information Security – Existing Network
  • 45. ISP , VPN Internet Cloud ISP Our Gateway Our Firewall LAN Switches Server Database Users
  • 46. Information Security – Proposed Solution
  • 47. ISP , VPN Internet Cloud ISP Our Gateway Our Firewall Server Database Users
  • 48. Information Security – Isolation Procedure
  • 49. Problems Problems of existing Network Isolation Al through the physical isolation of the network is the safest security solution; simply isolating the network may have the following problems 1) Installation : Increase in the installation and management expenses sue to redundant network cable between the internal and external network equipment’s and user PC’s 2) Usability: When using one PC, inconvenience of the resetting the IP address, PC rebooting and switching cables. 3) When using two PC, burden of purchasing an additional PC and management expenses. 4) Space: excessive space is required for two PC and cabling.
  • 50. Physical Separation 1. What is the physical network isolation? • Physical isolation method fundamentally removes the access part from the internal network from external network by isolating the internal network that requires high level of security from the external network, different from the existing software base security . • It is the most ideal security solution and from past 15 years and still gone of its kind successfully working and still growing strong 2. Need of Network Isolation ? • Organization that are sensitive to the security worry about the limit that the internal network and critical resource cannot be completely protected when the internal and external and external network are physically connected even if the logical security solutions , such as the firewall, IDS,VPN and Anti virus , are implemented. • It is impossible to defend any hacking method or viruses that are known yet . If there is a way out, there must be way in.
  • 51. IP Changer, “A” Game Changer
  • 52. Advantage Advantages of F-Net Network Isolation Security Products. As the new network Isolation), NetSwitch Series and DualNET provide the following advantages to the user and network administrator: 1) Physical Level Security : Highest Level of Network Security 2) Ensemble of Convenience and Efficiency : Network Switching required only simple user interaction 3) Reducing of system implementation cost : Network isolation and implementation cost us reduced by using single PC and cabling 4) Reduction of Network Security Management Cost: Management cost is minimized through the use of Hardware- based product. 5) Economical Line Speed upgrade: Traffic can be distributed through the isolation of the internal or external network.
  • 53. IP-Changer IPCHANGER IPChanger is a program used in conjunction with NetSwitch II- M (24- or 12-port) or NetSwitch IIR (12-port). To use internal network and external network (Internet) in a very isolated manner by implementing NetSwitch II series product, IPChanger must be installed in each computer connected to network. Internal network or external network can be conveniently selected and switched using IPChanger. IP changer supports latest operating system environment with integrating of Arabic language It allows you to selectively connect to either internal network or external network (Internet) by clicking on the system tray icon located in the lower left corner of the desktop after the installation. IPChanger can be configured to meet various user requirements, offers the following benefits, and advanced
  • 54.
  • 55.
  • 57.
  • 58.
  • 61. From Purpose to Solution Architecture Power Oil District Heating, etc National Security & People’s Living Stabilization through stable demand and supply of energy Real-time surveillance Emergency response IT Infrastructure in Energy Sector Vulnerability Analysis/assessment Gas Cyber Security Center
  • 62. Governance Structure ▶ 28 Participating Institutions - information furnishing - joint measure power(15) gas(4) oil(2) the others(7) ▶ Steering Committee : vice minister of MKE + 11 CEOs ▶ Chief : policy director of MKE ▶ Secretariat : 2 officials of MKE - in charge of Information Mg ’t Div. Working committee Steering committeechief secretariat ▶ Operating Institution(KDN) - Security Operation Team - Computer Emergency Response Team - Vulnerability Analysis/Assessment Team Operation T. CERT Analysis T. Operating Institution Organization
  • 63. Operational System Cyber attack (hacking / worm / virus) early warning information sharing person in charge security controlling 1. 24-hour surveillance cooperation emergency response 1. accident analysis surveillance blocking restoration analysis/assessment 1. vulnerability review 2. measure establishment 2. initial response 3. operation of Help Desk 2. restoration 3. proliferation prevention NationalInfrastructure Mission
  • 65. Enterprise Security Management (ESM) • normalization and unified management of security events • correlation analysis & accident detection based on real-time • intuitional grasp and situation analysis based on 3D visualization Quick defense of cyber security symptoms
  • 66. Threat Management System(TMS) • detection, analysis and block of harmful traffic • Forecast/warning of cyber threat • real-time statistics, analysis and web service Forecast/warning & real-time information sharing to the participant
  • 67. WEB Management System(WMS) • periodic surveillance of participant’s homepage • 24 hours real-time monitoring • instant countermove to forgery and altering of homepage Instant countermove to forgery and altering of homepage