Computer Security Essentials for Fermilab Sysadmins Irwin Gaines and Matt Crawford Computing Division.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Confidentiality and HIPAA
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
Basic Computer Security. Outline F Why Computer Security F Fermilab Strategy: –Integrated Computer Security –Defense in Depth F Your role and responsibilities.
Basic Computer Security. Outline F Why Computer Security F Fermilab Strategy: –Integrated Computer Security –Defense in Depth F Your role and responsibilities.
Security Essentials for Fermilab System Administrators.
Security Essentials for Desktop System Administrors.
IST346: Information Ethics. Ethics  Ethics are the principles of conduct that govern a group of people.  Ethics are not morals.  Morals are the proclamation.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Computer Security: Principles and Practice
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Session 3 – Information Security Policies
Fermi Computer Incident Response Team Computer Security Awareness Day March 8, 2005 Michael Diesburg.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Fermilab Computer Security Awareness Day November 2012 Basic Computer Security.
Research Ethics in Undergraduate Research Timothy Sparklin Administrator, Human and Animal Research Protections Office University of Maryland, Baltimore.
Protecting Personal Information at Fermilab: Advanced Course Irwin Gaines – Lab Privacy Committee Chair.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Essentials for Fermilab System Administrators.
Security Essentials for Desktop System Administrors.
Protecting Personal Information at Fermilab. What You Will Learn F Why must we protect personal information? F What are the laboratory policies governing.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Protecting Personal Information at Fermilab. Outline F Why must we protect personal information? F What is Protected Personally Identifiable Information.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Security Essentials for Desktop System Administrators.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Ethics and Privacy in Cyberspace Lesson 20. Privacy and Other Personal Rights Thomas J. Watson, Chairman of the Board for IBM, once stated: Today the.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Information Security Training for People who Supervise Computer Users.
Security Essentials for Desktop System Administrators.
Fermilab Computer Security & Strong Authentication Project Mark Kaletka Computing Division Operating Systems Support Department.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Security Essentials for Fermilab System Administrators 29-Sep-2009.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
THE NEW ANTI-BULLYING LAW PROCEDURES AND POLICY REQUIREMENTS.
What is Sexual Harassment? Deliberate and/or repeated sexual or sexual based behavior that is not welcome, not asked for, and not returned.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Security Essentials for Fermilab System Administrors.
Security Essentials for Desktop System Administrors.
Data Ethics Levette Williams Associate Superintendent Technology Services Brad Bryant, State Superintendent of Schools “We will lead the nation in improving.
Security Essentials for Desktop System Administrors.
Security Essentials for Fermilab System Administrators 08-Dec-2011.
Computer Security Awareness day November 12, 2013.
Data protection—training materials [Name and details of speaker]
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Security Essentials for Fermilab System Administrators 29-Sep-2009.
Security Essentials for Fermilab System Administrators Wayne Baisley Computer Security Awareness Day 10 November 2015.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Fermilab Computer Security Awareness Day. Why Computer Security  The Internet is a dangerous place We are constantly being scanned for weak or vulnerable.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Information Security Policy
Fusion Center ITS security and Privacy Operations Joe Thomas
Protecting Personal Information at Fermilab
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
IS4550 Security Policies and Implementation
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Presentation transcript:

Computer Security Essentials for Fermilab Sysadmins Irwin Gaines and Matt Crawford Computing Division

Outline F Introduction: why are we here, special role of system administrators F Computer Security Essentials: technical details F Fermilab security policy for sysadmins

“Open” Philosophy "Scientific thinking and invention flourish best where people are allowed to communicate as much as possible unhampered.” -- Enrico Fermi

“Open” Philosophy F Like an academic institution, we want to maintain an atmosphere which encourages free exchange of ideas; F Yet, we have an obligation to protect our data and systems; F We allow wide latitude within certain limits –Computer security should not prevent lab business –Ignoring computer security most certainly will! (hackers and regulators)

Critical role of sysadmins: F Sysadmins are on the “front line” of computer security: “Fermilab’s continuing policy has been to put its first line of defense at the individual responsible for the data and the local system manager.” F Three roles: –System managers; –examples for users; –vigilant observers of system (and sometimes user) behavior F Sysadmins are expected to communicate computer security guidelines and policies to the users of systems they administor;

Role of sysadmins F Manage your systems sensibly, remaining aware of computer security while conducting everyday business F Advise and help users F Keep your eyes open F Report potential incidents to FCIRT F Act on relevant bulletins

Technical Details F newbies newbies

Fermilab Computer Security Policy F Integrated Security Management (and GCSCs) F Critical systems vs. general security domain F Strong rules F Incidental computer use F Embarrassment to the laboratory (the.gov issue)

Integrated Security Management F Computer Security is not an add-on or something external, it is part and parcel of everything you do with computers (analogy with ES&H) F Not “one-size-fits-all”, but appropriate for the needs and vulnerabilities of each system F In most cases, it is simply common sense + a little information and care

GCSCs F BD Paul Czarapata F BSS Tom Ackenhusen F CD Matt Crawford F Dir Jud Parker F ES&H Matt Arena F LSS Kevin Williams F PPD Allen Forni F TD John Konc F FESS Ken Fidler F CDF Rob Harris F D0 Mike Diesburg

Critical Systems F Defined as “critical to the mission of the Laboratory”, i.e. disruption may have major impact on Laboratory operations; –Most things do not fall in this category; F Special (more stringent) rules & procedures apply; –Including periodic reviews; F You’ll know if you’re in this category;

General Systems F “Everything else”; F Emphasis on education, “best practices”; F Small set of strongly enforced rules; –Divisions/Sections may add to these;

Strong Rules F Incident Reporting F Unauthorized and malicious access and actions F Blatant disregard for laboratory computer security F Restricted central services F Possession of security (hacker) tools F System manager registration F Data Integrity and backup F Strong Authentication

Rules for General Systems F Mandatory incident reporting; –Report all suspicious activity: If urgent to FCC Helpdesk, x2345, 24x7; Or to system manager (if immediately available); Non-urgent to –Incidents investigated by Fermi Computer Incident Response Team (FCIRT); –Not to be discussed!

FCIRT F Investigate (“triage”) initial reports; F Coordinate investigation overall; F Work with local system managers; F Call in technical experts; F May take control of affected systems; F Maintain confidentiality;

Rules for General Systems F “Blatant disregard” of computer security; –First time warning, repeat offense disciplinary action; F Unauthorized or malicious actions; –Damage of data, unauthorized use of accounts, denial of service, etc., are forbidden; F Ethical behavior; –Same standards as for non-computer activities;

Rules for General Systems F Restricted central services; –May only be provided by Computing Division; F Security & cracker tools; –Possession (& use) must be authorized; F Strong Authentication (Kerberos) F System managers; –Must be registered with FCSC; –See:

Rules for General Systems F Backup Policy - Users –Users (data owners) responsible for determining: What data requires protection; How destroyed data would be recovered, if needed; Coordinating backup plan w/ sysadmins; –or doing their own backups;

Incidental Computer Usage F Fermilab permits some non business use of lab computers F Guidelines are at

Activities to Avoid F Large grey area, but certain activities are “over the line”; –Illegal; –Prohibited by Lab or DOE policy; –Embarrassment to the Laboratory; –Interfere w/ performance of job; –Consume excessive resources;

Appropriate Use F Many “computer security” complaints are not; F Material in a computer is like material in a desk; –Wrt to both privacy and appropriateness; F This is a line management, not computer security, concern (except in egregious cases);

Privacy of and Files F Fermilab normally respects the privacy of electronic files and ; F Employees and users are required to do likewise; F Certain exemptions for system managers and computer security response; F All others must have Director(ate) approval;

Privacy of and Files F May not use information in another person’s files seen incidental to any activity (legitimate or not) for any purpose w/o either explicit permission of the owner or a “reasonable belief the file was meant to be accessed by others.” –Whether or not group/world accessible; –“Group” files implicitly may be used by the group for the mission of the group;

Questions? Irwin Gaines x4022