SFT Group Meeting April 28th , 2006

Slides:



Advertisements
Similar presentations
The Approach to Security in CLRC Gareth Smith With acknowledgements to all the members of the CLRC Computer Network and Security Group, especially Trevor.
Advertisements

1 Creating a Data Backup Oakland University University Relations Updated - June 2006.
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
Perimeter Church Perimeter Network Introduction 2005.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Providing secure open- access networks Oliver Gorwits Oxford University Computing Services.
NAT: Network Address Translation local network (e.g., home network) /24 rest of Internet Datagrams.
Lesson 19: Configuring Windows Firewall
Department of Information Engineering 1 What is port number? OK, you know that in order to connect to Internet, each computer must have a unique address.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Welcome Back Reminders for the School Year.
CS 5565 Network Architecture and Protocols
CS 3214 Computer Systems Godmar Back Lecture 24 Supplementary Material.
NETWORK SECURITY PRESENTed By SADASIVARAO.G. ABSTRACT:  Network security is a complicated subject, historically only tackled by well-trained and experienced.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
CERN’s Computer Security Challenge
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
SFT Group Meeting Feb 3 rd, 2006  SFT Group News John Harvey  News from PH management Michael Doser  Report from DTF Forum Andreas Pfeiffer  Main goals.
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
PPD Computing “Business Continuity” David Kelsey 3 May 2012.
Supercomputing Communications Data NCAR Scientific Computing Division NETS 12/10/ Network Engineering & Telecommunications Section Update Jim Van.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
1 PH/SFT Group Meeting John Harvey September 8 th, 2004.
Proxy Servers.
How To Configure Thunderbird For Your Webspace Account.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
SFT Group Meeting 2 nd September News (10') John Harvey 2. Summer Student reports Denis FAVRE-MIVILLE (15') Johannes Feist (15') Tomas Kubes (15')
Administering Group Policy Chapter Eleven. Exam Objectives in this Chapter  Plan a Group Policy strategy using Resultant Set of Policy Planning mode.
Installing a Network Printer. Network printers work much like any other printer except the data flow is through a network. This means the printer must.
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
NetTech Solutions Protecting the Computer Lesson 10.
Module 10: Windows Firewall and Caching Fundamentals.
1 Network Address Translation. 2 Network Address Translation (NAT) Extension of original addressing scheme Motivated by exhaustion of IP address space.
SFT Group Meeting November 26 th, SFT S o F T w a r e D e v e l o p m e n t f o r E x p e r i m e n t s Agenda News John Harvey Report from DTF.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Computer Security Sample security policy Dr Alexei Vernitski.
Kittiphan Techakittiroj (25/06/59 19:10 น. 25/06/59 19:10 น. 25/06/59 19:10 น.) Network Address Translation Kittiphan Techakittiroj
Common System Exploits Tom Chothia Computer Security, Lecture 17.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Information Technology Acceptable Use An Overview
Supplementary Material
Network Address Translation
Supplementary Material
ILD phone meeting September 5, 2017 K. Kawagoe (PSB chair)
Backdoor Attacks.
Instructor Materials Chapter 9: Testing and Troubleshooting
5f. GSICS Wiki Overview and NOAA GSICS THREDDS Service Overview
SFT Group Meeting 28th January 2005
Christof Hanke, HEPIX Spring Meeting 2008, CERN
Chapter 2: Basic Switching Concepts and Configuration
Firewall Exercise.
Chapter 4 Core TCP/IP Protocols
I. Basic Network Concepts
Firewalls Routers, Switches, Hubs VPNs
– Chapter 3 – Device Security (B)
Press ESC for Startup Options © Microsoft Corporation.
Firewalls Jiang Long Spring 2002.
How to install HP printer using IP address? How to install HP printer using IP address? Call
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
By Seferash B Asfa Wossen Strayer University 3rd December 2003
Division of Engineering Computing Services
Presentation transcript:

SFT Group Meeting April 28th , 2006 SFT Group News John Harvey Inside-outside story about grid middleware Predrag Buncic Report from HEPIX meeting Rome, 3-7 April Rene Brun  AOB

Staff Movements Predrag Buncic started April 1st Leandro Franco started April 1st 2006 Marie-Curie EST fellow working on PROOF Torbjorn Sjostrand rejoined SFT April 1st to resume work on Pythia 8

CHEP06 Papers Posters Please have them proof-read by someone else I assume that authorship has been agreed with project leaders Posters Can be reused to replace those in Bat 32 and Bat 2 See Nathalie for assistance

MAPS SFT has completed the 2006 MAPS exercise on time Many thanks to everyone involved Feedback from PH to HR - ‘Schedule should allow more time’ Please come and discuss with me if you have comments or questions concerning any aspect of the process

Hardware Purchases New printer : HP Business Inkjet 2300 - B32-RB20-COL draft quality ppm : 22(colour) - 26 (b/w) best quality (4800 x 1200 dpi ) ppm : 2 (colour) - 4 (b/w) Reminder: Please remember to set a banner page when using B32-RB20-HP 2 X 500 GB disks purchased for Xserve G5 intended to implement a backup service for those with Macs New Mac Mini : 1.5 GHz Intel Core Solo To be installed in 32/1-A24 - for making presentations Lighting to be updated in 32/1-A24 Room will be unavailable for ~1 week

New SFT Home Webpage Current page designed for internal use (mainly links) New page designed to explain to others what we do

Future Events CERN School of Computing 21 Aug - 1st September, Helsinki Deadline for applications is May 15th Tracks : Grid, Software, Physics Computing Please see me ASAP if you wish to attend Please let me know well in advance if you wish to attend a conference

Summer Students Name Firstname DOB Nat. Supervisor Contract start Contract end DEMARET Matthieu 12/6/1983 FR COUET 06.06.2006 01.09.2006 DIERCKX Hans 8/27/1983 BE GRICHINE 11.07.2006 15.09.2006 GONZALEZ David 2/24/1982 ES ANTCHEVA 06.06.2006 01.09.2006 HAERTL Daniel 12/11/1982 DE MONETA 18.07.2006 15.09.2006 HAHTO Antti 3/18/1982 FI ROISER 06.06.2006 11.08.2006 KRUSE Daniele 6/21/1981 IT POKORSKI 06.06.2006 01.09.2006 REID Giles 3/31/1985 NZ FOLGER 20.06.2006 08.09.2006 Please check now to assign a desk and make sure there is a computer available NB Four students start on June 6th

Noise Problem …. …has (hopefully) been solved. Problem caused by work outside Bat 100 workshops This has been finished. Thanks to Claude Detraz (PH/DSO) for intervening on our behalf

Firewall Closure Plan In order to better protect devices connected to the CERN network from the regular attacks initiated from off-site, direct connections to TCP and UDP ports of all devices will be blocked in the CERN firewall by default. Specific exceptions will need to be approved before server ports can be directly exposed to the Internet.

Firewall Port Closures April Decnet/IP, Gopher, PAW, CVS, OracleTNSlistener, … Possibly restrictions on outgoing DNS May 8th TCP and UDP ports 800-1023 May 16 re-structure SSH server entries no functionality change removes the IP address range requirement May 23 CVS (except known/registered CVS servers), OracleTNSlistener

Firewall Port Closures June 6 close IMAP and POP (insecure)- see my mail of April 27th Use (secure) IMAPS and POPS protocol instead June-November close remaining ports (not yet fully defined) assumes availability of registration tools high risk ports first, GridFTP, MySQL, VNC, web(TCP/8080) others by port ranges More details (incl. port numbers) on the schedule is available at: http://cern.ch/security/firewall