Data Security Powerpoint
Data Security Powerpoint
Done by:
Leanna Hoyte
Darrin Griffith
Lamar Jack
Description of
Company
• We generate revenue by
developing, licensing, and
supporting software,
hardware, and online
advertising.
Products we Offer
• Lost Device(s):
• Internal Threat:
The threat originates from within the organization itself and includes acts of espionage or various
methods of employee data theft.
Compromised employees or industrial spies may share sensitive data with outsiders, posing a serious
threat to data security.
07/17/2023
7
Microsoft Multi-Layered Data
Security Design
• Azure Firewall:
07/17/2023
9
Microsoft Data Security
Policy
Microsoft Defender for Cloud can detect and block phishing emails and
other social engineering attacks.
• Malware and viruses:
• Identity-based attacks:
07/17/2023
12
Two Technologies that can be
implemented to mitigate or
counteract at this layer
• Behavioral analysis:
• Machine learning:
• Password attacks:
Azure AD provides tools to monitor and control user access to resources to prevent
insider threats.
• Malware and phishing attacks:
Azure AD integrates with Microsoft Defender for Endpoint and Office 365 to protect
against malware and phishing attacks.
Two Technologies that can be
implemented to mitigate or
counteract at this layer
• Conditional Access:
• DDoS attacks:
Azure Firewall can help mitigate DDoS attacks by blocking malicious IP addresses and limiting traffic based on source IP address.
• Network-based attacks:
Azure Firewall can protect against network-based attacks and restrict traffic to specific ports and protocols to prevent
unauthorized access.
• Insider threats:
Azure Firewall can protect against insider threats by using network segmentation and access controls to restrict access
to resources.
Two Technologies that can be
implemented to mitigate or
counteract at this layer
• Threat Intelligence:
Azure Key Vault provides role-based access control and access policies to limit access to
secrets and ensure only authorized users can access them.
• Key compromise:
Azure Key Vault uses HSMs to protect against key theft and tampering.
• Insider threats:
Audit logging and monitoring can help identify and investigate potential insider threats.
Two Technologies that can be
implemented to mitigate or
counteract at this layer
• Eavesdropping
VPNs protect data from man-in-the-middle attacks by encrypting and securing it.
• Unauthorized access: