Вы находитесь на странице: 1из 6

PLAN OF PRESENTATION

COMPANY PROFILE INFRASTRUCTURE OF COMMUNICATION HARDWARE AND SOFTWARE DETAILS NETWORK DETAILS AND DIAGRAM NETWORK ADMINISTRATION AND CONTROL NETWORK MANAGEMENT TOOLS CRITICAL ANALYSIS and Q & A SESSION

COMPANY PROFILE
Third Largest Islamic Bank of Pakistan incorporated on Monday 03, April 2000. 84 branches in 54 cities Shariah compliant services

1500 employees Internet Banking 24/7 MNET ATM service

INFRASTRUCTURE OF COMMUNICATION
LOCAL AREA NETWORK(LAN) with BUS topology WIDE AREA NETWORK WIRELESS AREA NETWORK

HARDWARE DETAILS USER LEVEL SERVERS


Intel dual core E5400 2.7Ghz with 250GB hard drive and 17.5 LCD. PIBL is using powerful and reliable servers such as 1. Dell Poweredge M1000e for core banking application 2. Sun x86 servers for databases 3. Call manager servers 4. Proxy servers

NETWORK

Following hardware is being used for reliable and secure transmission of transactions through out the network Switches A network switch is a computer networking device that

connects network segments. Currently using switches at three levels Firewalls A firewall block unauthorized access while permitting authorized communications. Routers A router is a device that interconnects two or more computer networks.

SOFTWARE DETAILS
Core Banking Software such as Symbols and IMAAL ATM software IRIS Call Manager Software In house developed software such as attendance, payroll and helpdesk software. CCTV software IOS (internetwork Operating System) is software used by routers Firewall and switches.

NETWORK DETAILS AND DIAGRAM

LAN

WA N

Fiber Optics Leased Line

NETWORK ADMINISTRATION AND CONTROL


Network administration includes performing the following task:

Designing and planning the network Setting up the network Maintaining the network

Expanding the network

Control Measures Physical Control Measures 1. Lock up the server room 2. Smart card, token, or biometric scan is required to unlock the doors. 3. A video surveillance camera, placed in a location 4. Air conditioning and Fire safety measures Logical Access Control Measures 1. Firewall 2. Encryption 3. Intruder Detection systems such as Honeypots and Honeynets 4. Proxy servers 5. DeMillitarized Zone (DMZ)

NETWORK MANAGEMENT TOOLS


1. 2. 3. 4. Response Time Reports Down time Report Network Monitors Online Monitoring

CRITICAL ANALYSIS and Q & A SESSION


Business continuity and Disaster Recovery plan should be properly planed and implemented by having timely back up of main server. Policies and procedures should be strictly followed as this will ensure firm control and minimize the risk of threats. Professional I.T personal should be employed. Hardware and software should be timely updated in order to cop with current available technology. Segregation of duties to maintain control and prevent any inside threat.

Strong Antivirus software should be used to prevent any type of malicious virus threat

QUESTIONS & ANSWERS

Вам также может понравиться