1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Thank you to IT Training at Indiana University Computer Malware.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
LittleOrange Internet Security an Endpoint Security Appliance.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
eScan Total Security Suite with Cloud Security
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Program Objective Security Basics
SEC835 Database and Web application security Information Security Architecture.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
CERN’s Computer Security Challenge
Proposed mid-term Security Strategies for CERN Prepared by ad-hoc working group members: Lionel Cons, Francois Fluckiger, Denise Heagerty, Jan Iven, Jean-Michel.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Managing Information System Security: Principles GP Dhillon Associate Professor Virginia Commonwealth University.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Awicaksi E-Commerce Security & Payment System E-Commerce.
Topic 5: Basic Security.
What is Spam? d min.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Computer Skills and Applications Computer Security.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, EU-FP6 Project ISS e G Integrated Site Security for.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, EU-FP6 Project ISS e G Integrated Site Security for.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
IT Security  .
Unit 4 IT Security.
Integrated Site Security for Grids
Protect Your Computer Against Harmful Attacks!
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
HOW DO I KEEP MY COMPUTER SAFE?
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007

2 Overview Evolution of incidents at CERN Security goals for CERN Causes of security break-ins Integrated site security project ISSeG: Integrated Site Security for Grids

3 Evolution of incidents since May 2000

4 Security Goals for CERN Keep the site working effectively and able to assure the organisation's mandate Prevent/Limit the impact of incidents based on their risks. Specifically: Pro-actively alert/protect against common and likely attacks Rapidly isolate systems placing the site at risk For services, ensure that security incidents do not adversely affect the service definition levels (availability, privacy,...) Balance the cost of an incident against the cost of the ability to prevent it Ensure the ability to record, measure and control risks (human, financial, image,...)

5 Causes of break-ins (1) Known security holes Unpatched systems and applications are a constant target Additional code often lacks automated updates (e.g. web plug-ins) 0 Day exploits: security holes without patches Firewall, application and account access controls give some protection Users are key targets for exploits (social engineering) Weak/missing/default passwords Care is needed when installing additional (commercial) applications which may have known default passwords Insufficient file protections Popular for transiting illegal data or as a stepping stone for further break-ins Insufficiently protected web pages can be abused for unwanted advertising Web based mail archives need sufficient protections

6 Causes of break-ins (2) Files on the Internet hiding trojan code Popular files are targets, e.g. music, video, games, software Hiding trojans in ‘free’ security tools is a known devious trick Capturing passwords Compromised systems at remote sites are used to capture passwords Keyboard loggers are popular in new viruses Tricking users is (too) often successful To visit rogue web sites, open attachments, execute code … Web based forums and Instant Messaging are growing targets Often combined with 0day exploits Phishing attacks to steal passwords, identity, bank and credit card details

7 Additional Concerns… 0day exploits are increasing Little/no time for preventative action Botnets are evolving Will become harder to detect Social engineering is getting harder to detect Tricks are sophisticated and targeted Databases are a key target Identity and information theft is profitable Web applications are a key target P2P technologies are hard to control Used for voice, video, software updates…. Difficult to distinguish P2P traffic from suspicious network activity

8 Integrated Site Security Project: Motivation Incidents were increasing Recovery is expensive: loss of service, diverted resources, … Major incidents had impacted normal working Network and other services had been unavailable Control systems needed additional protection Moving to ‘commodity’ solutions but security is lacking Grid computing extends security implications Sites are interconnected and incidents can easily spread Technical solutions provide only partial protection Policies and procedures need to defined/updated/enforced People need training and clear responsibilities This led to the Integrated Site Security concept Combining technical, administrative and educational security solutions

9 Strategic Directions Identified Centralise management of resources adapt security levels based on groups of devices or users must be flexible enough to meet needs and avoid exceptions Integrate identity and resource management link formal registrations with account controls Enhance network connectivity management database-driven with links to devices and people Integrate and evolve security mechanisms and tools adapt to new threats and technologies (e.g. 10Gbps links) Integrate security training, best practices and administrative procedures ensure security training and clear responsibilities balance academic freedom with its risks and costs

10 : Integrated Site Security for Grids Managers  Project co-funded by the European Commission  Extends and disseminates ISS expertise:  Recommendations  Methodologies  Training Material  Targets Grid sites ISS: Integrated Site Security