Information Security Session November 11, 2004 9/19/2018 Information Security Session November 11, 2004 Bill Eaheart Network Security Coordinator DePaul University NIDS with Snort
Information Security at DePaul Who we are Information Services - Business Continuity and Security Group (BCS) Web Site http://is.depaul.edu/security/information_security/ Email Addresses for BCS team Bill Eaheart - weaheart@depaul.edu Eric Pancer – epancer@security.depaul.edu Arlene Yetnikoff – ayetniko@depaul.edu Ed Gregory – egregory@depaul.edu Cheryl Barkby - cbarkby@depaul.edu Maybelline Davis - mdavis@depaul.edu Reporting security incidents security@depaul.edu abuse@depaul.edu 9/19/2018 Information Security
Today Provide practical information General guidelines for secure computing Question and Answer Presentation available on this web page: http://is.depaul.edu/security/information_security/presentations.asp 9/19/2018 Information Security
Securing Windows Systems Windows Update Virus and Spyware Protection Use a Host Based Firewall Account and Password Security File Sharing Peer-to-Peer File Sharing Emails and Downloads Physical Security Backups Microsoft Baseline Security Analyzer 9/19/2018 Information Security
Windows Update Microsoft provides security patches and updates Check for updates at least once per month Security fixes released on the second Tuesday of each month Manual Update Open Internet Explorer http://windowsupdate.microsoft.com Windows Automatic Updates makes this easy Start Control Panel Automatic Updates DePaul makes it even easier Software Update Services (SUS) server 9/19/2018 Information Security
Virus and Spyware Protection Malware (MALicious softWARE) – designed to make life unhappy (virus, trojan horse) Install Anti-virus software Regularly update anti-virus signatures Available products Commercial McAfee Antivirus - http://www.mcafee.com/us/ Norton Antivirus - http://www.symantec.com/ Commercial/Freeware Avast! - http://www.avast.com/ AVG – http://www.grisoft.com/us/us_index.php DePaul makes it even easier McAfee Anti-virus and McAfee ePolicy Orchestrator (ePO) Student download - http://netauth.depaul.edu/virusscan/ Spyware Gathers information without your knowledge Ad-aware - http://www.lavasoftusa.com/ Spybot Search and Destroy - http://www.safer-networking.org/ Spycop - http://www.spycop.com/ 9/19/2018 Information Security
Host Based Firewall Best PC firewalls Windows XP Commercial Products Track incoming and outgoing traffic Allow you to set up rules Windows XP Internet Connection Firewall (ICF) Inspects incoming traffic only Start Control Panel Network Connections Change Windows Firewall settings Commercial Products Sygate Personal Firewall ZoneAlarm Tiny Personal Firewall Norton Personal Firewall BlackIce PC Protection 9/19/2018 Information Security
Account and Password Security All accounts must have strong passwords Weak or no password accounts are an open invitation to hackers If possible do not run your computer as administrator Disable any unused accounts Strong passwords Special characters (*!$+) mixed with letters and numbers Mixed upper- and lower-case letters and Punctuation characters Nonsense words that are easy to pronounce but aren't in any dictionary Eight or more characters Use a password sentence or passphrase I need to visit the Kmart at 4:00 In2vtK@4: My #1 Password! Do not use either of these passwords 9/19/2018 Information Security
File Sharing Some advice – Do not use shared folders Unprotected shared folders or ones with weak passwords allow hackers to walk right into your computer On DePaul’s network used our Novell network If you must use shared folders - protect access Use a strong password Do not make a share writeable by others Do not share entire drives – C:\ Understand permissions to prevent a malicious user from damaging your data 9/19/2018 Information Security
Peer-to-Peer File Sharing Many peer-to-peer programs like KaZaZ, Limewire, Gnutella and others set up your computer to be a server Disable file sharing for popular programs University of Chicago – http://security.uchicago.edu/peer-to-peer/no_fileshare.shtml Organizatons watch for distribution of copyrighted material - Do not share copyrighted material Unwanted components could be installed, such as Spyware 9/19/2018 Information Security
Emails and Downloads Be suspicious of any attachments sent by email – even if you recognize the sender Never open files from people or sources you are unfamiliar with and did not expect to receive Attachments can contain viruses Scan any downloaded files with your anti-virus 9/19/2018 Information Security
Physical Security Work space Public computers Screen saver or lock the workstation Public computers If in an open area do not walk away from a machine you should log out or lock the machine Remember to log out of a computer when leaving for an extended period of time 9/19/2018 Information Security
Backups Back up all critical files Protects against hardware failure, viruses or compromised computer DePaul makes it easy Personal folder on the N:\ drive Backed up by Information Services Encrypt any sensitive data 9/19/2018 Information Security
Microsoft Security Analyzer Microsoft Baseline Security Analyzer http://www.microsoft.com/technet/security/tools/mbsahome.mspx Free, vulnerability assessment tool for the Microsoft platform Download Software Installation Wizard Scan your computer 9/19/2018 Information Security
The End! Thank you Any questions weaheart@depaul.edu 9/19/2018 Information Security