Monitoring Your Network Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop discussion.

Slides:



Advertisements
Similar presentations
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Advertisements

AVG Internet Security 7.5 Product presentation.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
Chapter 15 Chapter 15: Network Monitoring and Tuning.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Windows Anti-virus and Security WNUG Meeting
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Automating Endpoint Security Policy Enforcement Computing and Networking Services University of Toronto.
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Task Scheduler Pro Managing scheduled tasks across the enterprise Joe Vachon Sales Engineer.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
CERN’s Computer Security Challenge
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Honeypot and Intrusion Detection System
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Vantage Report 3.0 Product Sales Guide
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Monitoring Your Network A College Approach Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Android Mobile Security Krystal Salerno. Introductions.
A powerful network monitoring system
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Chapter 2 Securing Network Server and User Workstations.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Retina Network Security Scanner
Synchronized Security Revolutionizing Advanced Threat Protection
Web-based Application Includes: –Integrated Web Server –Integrated Database.
NetTech Solutions Protecting the Computer Lesson 10.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Module 10: Windows Firewall and Caching Fundamentals.
1 Windows 2008 Server Manager. 2 Server Manager Gives ability to perform effectively server administration without needing to launch a multitude of tools.
James S. Rothfuss, Computer Protection Program COMPUTING SCIENCES NETS Network Equipment Tracking System.
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
BTC Network Systems A Division of Becerra Trading Company This Information is confidential and proprietary to BTC Network Systems BTC is an Information.
UTM Content Security Gateway
Proventia Network Intrusion Prevention System
Top 5 Open Source Firewall Software for Linux User
Securing the Network Perimeter with ISA 2004
NETWORK SECURITY LAB Lab 9. IDS and IPS.
ISMS Information Security Management System
Presentation transcript:

Monitoring Your Network Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop discussion are to be held in strictest confidence.

26th June 2003 Christopher Bamber 2 What We Can Use the Tools for Identifying unofficial services or servers Monitoring usage and traffic statistics Protecting your network from the world Troubleshooting your network Investigating a security incident Keeping logs of users activities for accountability

26th June 2003 Christopher Bamber 3 Who? What? Where? How? When? Who is accessing your network? – students, academics, staff, visitors or others What are they accessing your network for? – academic study, social use, business use, illegal use Where are they accessing your network from? – internal, external How are they accessing your network? – remote user, local Ethernet, WAN, dial-up, Wi-Fi, VPN When did they access your network? – today, yesterday, last week, last month…

26th June 2003 Christopher Bamber 4 A College Network

26th June 2003 Christopher Bamber 5 Software Tools WS_Ping_ProPack XploiterStat Lite Windows Event Viewer Sophos Anti-Virus for NT Sophos Anti-Virus ADMIN Tool Software Firewalls eTrust Intrusion Detection (Sessionwall) 3Com Network Supervisor GFI LANguard Network Security Scanner Network Probe

26th June 2003 Christopher Bamber 6 A Linux Soloution

26th June 2003 Christopher Bamber 7 Ws_Ping_ProPack This tool gives you basic windows interface into a few very handy utils:- Ping, Scan, TraceRoute, Whois, Lookup etc Doing regular scans of common ports on your network will help to discover unauthorised services or servers Very quick and simple, also cheap £30.00 for a licence

26th June 2003 Christopher Bamber 8 A Port Scan

26th June 2003 Christopher Bamber 9 XploiterStat Lite Port monitoring software, TCP and UDP Free, upgrade available at approx. £30.00 Produce text logs of active connections to your machine or servers Handy for putting a trace on a machine your concerned about

26th June 2003 Christopher Bamber 10 Windows Event Viewer Comes with MS Servers, Windows 2000 and XP,it’s FREE! Use it to look at your logs Make sure you have some logs Export your logs to examine them in Excel, it’s quicker

26th June 2003 Christopher Bamber 11 Sophos Anti-virus for NT It’s FREE!, site licensed to Oxford University Protect your workstations from viruses Use a protected install so users can’t remove it Make it mandatory for all computers connected to your network Keep it updated…

26th June 2003 Christopher Bamber 12 Sophos Anti-Virus ADMIN Tool It’s FREE! Allows you to install SAV onto your NT workstations remotely You need to have their admin shares(C$) available for the initial install Allows you to update and change the configuration of SAV Monitors the status and current rollout of the IDE files Allows you to force an update to the user workstation Quick and simple

26th June 2003 Christopher Bamber 13 Software Firewalls Some free, some not Elron Command View Firewall for NT SmoothWall – Free and Comercial versions FreeBSD Firewalls…

26th June 2003 Christopher Bamber 14 eTrust Intrusion Detection Providing real-time, non- intrusive detection, policy- based alerts, and automatic prevention Integrated anti-virus engine with automatic signature updates Dynamic URL blocking and logging Predefined policies for a wide range of attacks Comprehensive built-in reports

26th June 2003 Christopher Bamber 15 3Com Network Supervisor Network management utility for managing 3com hubs and switches It’s free, unless you want the advanced functions Auto Detects network structure, well almost

26th June 2003 Christopher Bamber 16 GFI LANguard Network Scanner Free version available Purchase for extra functions including patching capability Will scan a subnet at timed intervals Produces html reports: demo report demo report

26th June 2003 Christopher Bamber 17 Network Probe Free software probe Needs to be placed where it can sniff the network traffic Works on windows using a web interface

26th June 2003 Christopher Bamber 18 Hardware Tools Fibre & Copper Taps Network Analysers IDS Appliances Firewall Appliances

26th June 2003 Christopher Bamber 19 Software Sites WS_Ping_ProPack - XploiterStat Lite - Sophos Anti-Virus – MAILsweeper - Elron Firewall - eTrust - Transcend - Network Probe -

26th June 2003 Christopher Bamber 20 Documents to Read Oxford University's Computer Usage Rules and Etiquette Somerville Rules for Computer Use

26th June 2003 Christopher Bamber 21 Contact Information Christopher Bamber IT Systems Manager Somerville College, OX2 6HD Tel: