Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
110 views34 pages

Case Study On Halliburton's Firewall System

Halliburton uses Norton 360 as its firewall and antivirus system to protect its network and systems from various online security threats. Norton 360 provides comprehensive internet security through antivirus, antispyware, antiphishing and identity protection tools. It protects systems through features like automatic updates, online security, online transaction security, automatic backups and restores. The firewall and antivirus are fully configured to restrict access to certain websites and monitor network activity.

Uploaded by

Pranjal Gharat
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views34 pages

Case Study On Halliburton's Firewall System

Halliburton uses Norton 360 as its firewall and antivirus system to protect its network and systems from various online security threats. Norton 360 provides comprehensive internet security through antivirus, antispyware, antiphishing and identity protection tools. It protects systems through features like automatic updates, online security, online transaction security, automatic backups and restores. The firewall and antivirus are fully configured to restrict access to certain websites and monitor network activity.

Uploaded by

Pranjal Gharat
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 34

Case study

On

Halliburton’s Firewall system


Presented By

Akshay Anil Ganar (31)

Anand Digamber Gawade (32)

Pranjal Balkrishnar Gharat (33)


What is security?
• Security, for a computing system, means
that the information on the system is protected
from unauthorized disclosure

• There are many ways in which the security


of a computer system can be
violated.

• The National Institute of Standards and Technology mainly


oversees the issues of security and sets forth the rules and
regulations.
Security Threats
 Inside Attack:
This is because the insider has a better knowledge of your system’s
functioning & hence it is easier to attack. These may be either ex-employee
or unsatisfied employees.

 Attacks from outside :


The outsider who would attack your security may be either your
competitors or someone just making fun or trying out their luck or
experimenting by disturbing your systems without any special reasons.
Some apparently useful programs also contain features with hidden
malicious intent.

• Malwares: This is the most general name for any malicious software designed for
example to infiltrate, spy on or damage a computer .
• Trojans: These are programs which may pretend to do one thing, but in reality steal
information, alter it or cause other problems on a such as a computer.
• Spyware: This includes programs that surreptitiously monitor keystrokes, or other
activity on a computer system .
• Worm: These are programs which are able to replicate themselves over a computer
network, and also perform malicious acts.
• Bots: Bots are programs that take over and use the resources of a computer system
over a network without consent, and communicate those results to others who may
control the Bots.
How much each of these threats affects the system
Social networking

These sites can pose serious threats to organizations.


Social networking sites are breeding grounds for SPAM, scams, shareware and
a host of other attacks and these threats will continue to rise.
Social engineering
Social engineering is always a popular tool used by cyber criminals and
phishing is still a popular method for doing just that.
Denial-of service
Dos attacks are probably the nastiest and difficult to address. These are very
easy to launch, difficult to track and isn’t easy to refuse the requests of the
attacker, without also refusing legitimate requests for service.
There are toolkits available in the underground community that make this a
simple matter of running a program and telling it which host to blast with
request.
PROTECTION FROM THREATS
• Classify information based on its importance, assigning security clearances
to employees as needed.
• Install and use anti-virus software programs that scan PCs, computer
networks, CDROMs, tape drives, diskettes, and Internet material, and
destroy viruses when found.
• Update anti-virus programs on a regular basis.
• Forbid employees from putting programs on their office computers
without company approval.
• Monitor activities of employees who keep odd hours at the office. Make
certain that the company's hiring process includes extensive background
checks, especially in cases where the employee would be handling
sensitive information.
Firewall
• Founded in 1919, Halliburton is one of the world's largest providers of products
and services to the oil and gas industry. It employs more than 50,000 people in
nearly 70 countries.

• Halliburton Company provides various products and services to the energy


industry for the exploration, development, and production of oil and natural gas. It
operates in two segments, Completion and Production, and Drilling and Evaluation.
Its services include fluid services, drilling services, drill bits, wire line and
perforating services, testing and subsea services, software and asset solutions, and
consulting and data management services.
Halliburton consists of two operating divisions

Drilling and Evaluation : provides directional drilling services, drill bits and drilling fluid
systems; data-gathering services such as logging and logging-while-drilling that help
operators make initial evaluations of the formation.

Completion and Production : provides cementing services which give structural support for
the wellbore casing and isolate the producing zones; completion services including down
hole and surface equipment, expandable and well technologies, and reservoir testing
Problem Statement
Company wants specially preferred for security solutions that required high
processing speed as are the semi-trusted connections between peering
businesses.
 
Management teams that wants more centralized control and greater asset
visibility.
The employee’s are accessing social networking sites so company wants to
restrict that sites they should allow to access the necessary sites only.
Solution
They should use the good antivirus and firewall protection to achieve high
level of security.
The information that is transferred over the network should be protected
using better fire firewall configuration
Restrict user to access non commercial sites using firewall configuration
All the resources including software and hardware should be protected by
antivirus.
Security Settings
To monitor network activity in personal computer connected in network
Microsoft Provides Firewall
Start--->> Control Panel-->>security Center:
Windows Firewall

Configuration
Internet Settings to restrict user
access for particular websites
Norton 360
Halliburton use Norton 360 as Antivirus and Firewall Protection.

Norton 360, developed by Symantec, is marketed as an "all-in-one" security suite. The


package includes a personal firewall, phishing protection and the ability to detect and
remove malware. Separating this suite from Norton Internet Security is the inclusion of file
backup and PC maintenance capabilities.

Symantec announced Project Genesis on February 7, 2006. Genesis would differ from
Symantec's other consumer security products by incorporating file backup and PC
maintenance tools with antivirus capabilities and a firewall. Phishing protection and real-
time heuristics were also planned. Windows Vista compatibility was a major aspect of
Genesis.
Genesis was renamed Norton 360 on May 31, 2006. Its feature set was confirmed it would
have the same functionalities of Norton Internet Security with file backup, PC
maintenance, phishing protection, and real-time heuristics.
How it protects the system?
Norton 360 4.0 delivers comprehensive Internet protection against all types of online
threats combining antivirus, anti-spyware, anti-phishing and identity protection tools
in one handy application.
Online Security
Defends against most known online threats. Norton 360 makes use of Symantec’s
cutting-edge technology including sophisticated root kit detection features to
protect against spyware, viruses and many more.
Online Transaction Security
Norton 360 protects against online identity theft. It safeguards your PC by identifying
booby-trapped Web sites and automatically authenticates the most popular banking
and shopping sites. Symantec's advanced technology prevents phishing and email
scam attacks to help protect your personal/billing information.
Automatic definition updates
Norton 360 Live Update to keep the virus database up-to-date protecting against
the latest online threats. It comes with automatic virus definition updates and
feature updates to ensure your threat definitions stay current and that you are
protected at the best possible level.
Backup and Restore
To prevent your data from loss, Norton 360 version 4.0 performs automatic backups
and restores data on request. You can use Symantec online storage space of 2Gb that
comes free with your Norton 360 installation to upload your files.

Storing data off-line provides extra protection when your computer is stolen or
damaged. Optionally, you can buy Norton 360's additional online backup space for if
you need more room for your files.
Norton 360 Updates
Norton 360 will download and update any missing or outdated threat definitions
automatically.

You can arm yourself with optional components for Parental Control, Spam Control or
protection against information theft.

Parental Control and the anti-spam software called Spam Control, are free
downloads that can be obtained separately from the Symantec website.
Configuration of Norton 360
Norton Firewall setting
Fully configured Norton 360
Norton 360’s Key Features
• Norton 360 4.0 Performance
Norton 360 version 4.0 delivers significantly improved performance when
compared to its previous version. Boot time is shorter, application starts quicker
and most of the maintenance and/or tests are run in the background when the
PC is idle to avoid system slowdown.

Norton 360 combines Symantec’s proven internet security and PC tune-up


features with new anti-spyware and anti-phishing tools plus the and best-of-
breed automatic backup technologies.
SONAR
(Symantec Online Network for Advanced Response)

Unlike virus signatures, SONAR examines the behavior of applications to decide


whether they are malicious.

Various factors are considered before determining that a program is malicious, such as
if the program adds a shortcut on the desktop or creates a Windows Add/Remove
programs entry. Both of those factors would indicate the program is not malware. The
main use of SONAR is to enhance detection of zero day threats.

zero-day attacks are based on flaws that are unknown, or have not yet been patched
by the vendor, and they are particularly effective against signature-based antivirus
protection. SONAR uses an algorithm to evaluate hundreds of attributes relating to
software that is running on the computer, so it can spot malicious software, whether
it's already been identified by Symantec researchers or not.
Quick scan
Norton provides quick scan to system by which user can scan a particular file. It also include
fast scan which only scans infected files it also provide the option that disinfect the files.
Helps you improve and maintain PC and application performance
Identifies applications that may be impacting your PC’s performance, making it easier to
keep your computer running at its best.
Norton also rates the application while scanning them as per their health.
Secure web surfing
Norton checks the web sites and prompts that whether web site in secure or not. It shows
Red Cross mark for unsecured web sites and green checkmark for secure web sites.
It protects system from viruses and malwares.
 Online Backup up to 2GB

 Reduces PC start-up time

 Protects your PC, online activities and your identity

 Delivers up to the minute virus protection

 Defends your wireless network from intruders


Conclusion
 Using Norton 360 our organization gets high level of security.

 It has increased the performance of the system.

 If product is not updated for long period of time then it will


affect your system.
Thank you

You might also like