INF526: Secure Systems Administration Team Status Exercise 1 Prof. Clifford Neuman Lecture 5 17 June 2016 OHE100C.

Slides:



Advertisements
Similar presentations
Instructions to do RTGS/ NEFT transactions through Internet Banking
Advertisements

XO Limited Telephone Banking Interactive Voice Response.
A business makes payments for what it buys, In return it receives payments for goods it sells or services it provides.
09/04/2015Unit 2 (b) Back-Office processes Unit 2 Assessment Criteria (b) 10 marks.
CUONG NGUYEN PRIYA PAKHANAVAR RUSSELL ROBINSON RPC Hotels.
1 Introduction General Accounting is responsible for managing the University’s general ledger accounting system. The General Accounting office’s main goal.
Checking Accounts Checking Accounts.
We make it easier for businesses of all sizes to safely accept checks transmodus offers clients automation utilizing our online processing platform for.
Cash Handling Policy and Procedures OP Policy All Mississippi State University units that handle cash must have both an awareness of and show a.
ECommerce Project. The Team Project Sponsors: –Shelagh Holm, Director of Administrative Information Systems –Ron Ritter, Assoc Director and Treasurer,
Payment Card Industry (PCI) Data Security Standard
The complete resource tool online for the conference, meeting and event industry.
Production Planning Processes EGN 5620 Enterprise Systems Configuration (Professional MSEM) Fall, 2012.
How to Set Effective Security Policies at Your Organization David Strom VAR Business Technology Editor June 20, 2002.
Read to Learn Discuss the different types of checking accounts and how they work. Discuss other services and offerings that banks provide checking account.
Examples of TPS 1 In this section, we examine the: components of a TPS the examples of real-time transaction processing batch transaction processing.
SE3183 Advance Web Programming Programming Session 2013/2014.
Near East University Department of Computer Engineering E-COMMERCE FOR LAPTOPS SELLING COMPANY Abdul Halim Abu Kuwaik
NUOL Internet Application Services Final Presentation 24 th of May, 2004.
Force Platform & Cloud Computing Presented By Kancharla Sreeveni Student id : Sales Force Team.
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
1 Electronic Transaction Management Lower Risks Higher Profits Improved Customer Services.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
CASH HANDLING POLICIES AND PROCEDURES TRAINING
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
INF526: Secure Systems Administration Composition of Systems And Security Domains Prof. Clifford Neuman Lecture 3 3 June 2016 OHE100C.
INF526: Secure Systems Administration Policy Driven Administration Principles of Protection Generation of Security Requirements Prof. Clifford Neuman Lecture.
What is Online banking Online banking refers to the process of banking carried out online using internet and computer terminal: It is one of the latest.
INF526: Secure Systems Administration Student Presentations And Review for Final Prof. Clifford Neuman Lecture July 2016 OHE100C.
ELECTRONIC PAYMENT SYSTEM
Cash Handling – It’s my job
Accounting Office Training
TREASURY ORGANIZATION AND STRUCTURE
Mobile Card Reader Process payments on the go!
Course Guide CT 1501.
Cash Handling – It’s my job
UML’s StateChart FSM, EFSM in UML Concurrent states Tool support.
The webinar will begin shortly
Simple ways to Identify, Prevent and Fix QuickBooks Corrupted File In fact, this software helps businesses in managing their finances. Even though QuickBooks.
Unit 27: Network Operating Systems
Membership/Post Processing - Process Membership
TREASURY ORGANIZATION AND STRUCTURE
DHCP, DNS, Client Connection, Assignment 1 1.3
Unit 7 NT1330 Client-Server Networking II Date: 7/26/2016
What is the Chapter Dashboard?
Chapter 27: System Security
Correcting Entries Training
Student Financials Cashiering.
Data Security in Local Networks using Distributed Firewalls
Settlements.
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Electronic Services from a School's Perspective PESC Annual Conference on Standards in Higher Education Judith Nemerovski Flink Director of Student Financial.
Course Guide CT 1501.
Wissam Maroun- CAMS Head Of Compliance- BBAC S.A.L
Correcting Entries Training
2008 Workshop AHEPA District 3 Website Presentation
Alternative Pathways to Learning
Membership/Post Processing - Process Membership
ECT455 Website Engineering
MyLegion.org Processing
ENDORSING, DEPOSITING & RECONCILING
Xanna Prentice, SNAP Technical Support Fresh Access Bucks
COMPLETE BUSINESS TEXTING SOLUTION
Ski Clubs and E-Commerce
Grid Computing Software Interface
Department of California
iLab Reseachers Training
Xanna Prentice, SNAP Technical Support Fresh Access Bucks
Presentation transcript:

INF526: Secure Systems Administration Team Status Exercise 1 Prof. Clifford Neuman Lecture 5 17 June 2016 OHE100C

Announcements Mid-term exam on Friday July 8 th –Material will be on the lectures and assigned readings (of which there have been few so far) –One hour, closed book (if I need you to refer to specific material I will include it on the exam) –Followed by a lecture Office Hours – Changes – –On campus – immediately following lecture – outside lecture hall –Friday 2PM-3PM at Professors ISI office or by phone (310) or by or teleconference. 1

Access to Server VMs Still working on securing access to VM’s in lab on campus –Hope to have that addressed by end of this coming week 2

Review of Group Progress Group One –Configuring Servers –Configuring access controls –Simple pen testing –Dynamic DNS set up –Main issue is access to static address for group members to use Is this necessary, is there a way around? Group Zero –Progress on web application – including added functionality –Network and host isolation components in progress –Application of minimization and MAC policies –Main issue is lack of a central machine on which to run VM We are still trying to address this – per earlier note Not clear if anyone was able to use VNC 3

Group Exercise For Next Week No major new tasks – continue work on the system as described Try some of the pen-test tools described this week against your own machines. 4

Group Report by Wednesday General Progress, as per your report this week. Specific new things to include in your report: –A red-team plan (pen-test) for the tests that you will run against your system once up and stable. 5

Banking (for reference) Your organization must: –Maintain a database of account holders –A database of account balances –Enable web access by customers who: Can update their personal information Check their account balance Transfer funds to another account (by number) View transactions on their account Submit an image of a check for deposit –(check should be viewable, but you do not need to scan it or process it) Access is needed –Via web from the open internet –Outbound confirming transactions –All other interactions may be limited by information flow policies to internal machines. 6

Retail (for reference) Your organization must: –Maintain a database of customers –A database of products and prices –A database of customer orders – and status –Support the update of prices in the system –Support inquires by customers of order status –Allow customers to place orders –Accept payment information from customers for submission to a credit card processor –Enable web access by customers who: Can place orders Check order status Cancel orders –Enable access by employees To set prices Perform customer service functions Access is needed –Via web from the open internet for customer facing functions –For employees 7

Criminal Enterprises (for reference) Chosen because of differences in the high level principles. –Not because I expect you to implement these kinds of systems in your future endeavors. –But you may be called upon to break some of these systems if later employed by government organizations. Your organization must: –Accept Bitcoin as payment (not really, but it must accept something that stands in for bitcoin) –Manage an inventory of stolen account identifiers with passwords –Control access to such information –Prevent collection of evidence or intelligence by third parties. –Note, do not deal in any illegal goods, but use dummy information to stand in for such goods. Also, do not use terms associated with such illegals goods or information in communications, make up new names for this dummy information. 8