Office of the Vice President Copyright Notice Copyright Greg Hedrick, Matthew Wirges 2004. This work is the intellectual property of the author. Permission.

Slides:



Advertisements
Similar presentations
A Successful Help Desk Process for all IT Support
Advertisements

What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
A Web-based Bibliography Management Initiative: Collaborating for Classroom and Library Technology Integration Brian Nielsen, Academic Technologies Denise.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
Design & Development Scott Battaglia Application Developer Enterprise Systems and Services Rutgers, the State University of New Jersey
Copyright Sylvia Maxwell and Michael White, This work is the intellectual property of the author. Permission is granted for this material to be shared.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
SecurityCenter Reporting Nessus Scan Report. SecurityCenter Reports For customers who use Nessus for vulnerability scanning and then move to SecurityCenter,
Copyright Brian T. Huntley and Tim Antonowicz 2007 This work is the intellectual property of the authors. Permission is granted for this material to be.
Yale University Information Technology Services Administrative Systems Art Hunt 3/22/04 Software Service Level Agreement with Finance, Procurement and.
February 2006 copyright Michael Welch, Blinn College This work is the intellectual property of the author. Permission is granted for this material to be.
Delivering Windows OS Updates at Yale with SUS EDUCAUSE Security Professionals Workshop May 17, 2004 Washington DC Ken Hoover, Systems Programmer
Educause Security 2007ISC Information Security Copyright Joshua Beeman, This work is the intellectual property of the author. Permission is granted.
Migrating to uPortal 2 at UBC Paul Zablosky University of British Columbia Copyright Paul Zablosky This work is the intellectual property of the.
The Homegrown Single Sign On (SSO) Project at UM – St. Louis.
Procurement From the 20 th to the 21 st Century Copyright Byron Honoré This work is the intellectual property of the author. Permission is granted.
Foundations of Excellence: Support Services for Online Learning Midwest Regional Conference, 2005 Chicago, Illinois Presenters: Diane Dates Casey Jan Engle.
Maintaining and Updating Windows Server 2008
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
University of Washington CUMREC 2003 Uncompromised Web Applications: Variety Without Chaos University of Washington CUMREC 2003 Copyright University of.
How Collaboration Created an Online Help Desk and Knowledge Base for the Campus Community EDUCAUSE Mid-Atlantic Regional Conference 2008.
Unraveling Web Development PRESENTERS: Bob Nakles and Paras Kaul, George Mason University.
Mobile Computing and Security Authenticated Network Access (ANA) Jon Peters Associate Director Dave Packham Manager of Network Engineering NetCom University.
Moving Out of The Shadows: Shining a Light on Data David Rotman Director of Computer Services Mark Mazelin Web Development Coordinator Copyright David.
WebDev Depot: Your One-Stop Web Development Warehouse Copyright Nancy J. Mustachio This work is the intellectual property of the author. Permission.
University of California, Irvine Security Access Management at UC Irvine: Adding Decentralization and Ending Paper Mark Askren, Assistant Vice Chancellor.
Embedded Librarian Program: Librarians and Faculty Partnering to Serve Online Students NERCOMP Annual Conference Innovation and Reliability: Finding the.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Baylor University and Xythos EduCause Southwest 2007 Dr. Sandra Bennett Program Manager Online Teaching and Learning System Copyright Sandra Bennett 2007.
User Group 2015 Version 5 Features & Infrastructure Enhancements.
Graduate Admissions Imaging and Workflow at Arizona State University Wednesday, November 5, 2003 Copyright Roger Lurie, Arizona State University, 2003.
Stanford’s Patch Management Project   Ced Bennett May 17, 2004 Copyright Cedric Bennett This work is the intellectual property of the author. Permission.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, This work is the intellectual property of the authors. Permission.
Moving Your Paperwork Online University of California, Irvine presents PayQuest Copyright UC,Irvine This work is the.
Distributed Network Security Using Free Tools in University Environments Jeff Bollinger, CISSP, GSEC Doug Brown, CISSP, GSEC University of North Carolina.
Securing the High Ground – Strategies & Technologies for a Comprehensive Assessment Program Copyright Rod Henshaw & Teri Koch, This work is the intellectual.
Joel Bapaga on Web Design Strategies Technologies Commercial Value.
Building the Integrated Learning Center Having the right people at the table Chris Johnson, Senior Consultant for Learning Technologies University of Arizona.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
© 2010 VMware Inc. All rights reserved Patch Management Module 13.
Title: Developing a Multimedia Tutorial Style Guide to Expand Student Training Author: Suzie Medders, Student Training Coordinator Educational Technology.
Discussion Panelists: Justin C. Klein Keane Sr. Information Security Specialist University of Pennsylvania Jonathan Hanny Application Security Specialist.
Security Access Management at UCI – Slaying the Paper Forms Dragon Mark Askren, Assistant Vice Chancellor Valerie Jones, Project Lead Jennifer Lane, Help.
Copyright David A. Cox This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Effective Distribution of Academically Licensed Software ©2008 Brent West. This work is the intellectual property of the author. Permission is granted.
Cdigix at Yale Chuck Powell Director, Academic Media & Technology, ITS Yale University September 15, 2004 Copyright Charles Powell.
Skills for Success with Microsoft Office 2013 Volume 1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Kris Townsend, Catherine.
Integration is Critical for Success Curriculum Course Delivery Ongoing Support Instructor & Learner.
Portals and Web Standards Lessons Learned and Applied David Cook Copyright The University of Texas at Austin This work is the.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
WebISO, Single Sign-On & Authorization General Overview Shelley Henderson Project Manager, Grid Software USC Information Services Copyright.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
© 2009 Pittsburgh Supercomputing Center Server Virtualization and Security Kevin Sullivan Copyright Kevin Sullivan, Pittsburgh Supercomputing.
Chief Information Officer Effectiveness in Higher Education Wayne Brown, Ph.D. Copyright Wayne Brown This work is the intellectual property of the.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
Maintaining and Updating Windows Server 2008 Lesson 8.
Julian Hooker Assistant Managing Director Educause Southwest
Defining an IT Workflow, from Request to Support
Copyright Notice Copyright Bob Bailey This work is the intellectual property of the author. Permission is granted for this material to be shared.
Blaine A. Brownell, President,
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
Presentation transcript:

Office of the Vice President Copyright Notice Copyright Greg Hedrick, Matthew Wirges This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the authors. To disseminate otherwise or to republish requires written permission from the authors.

Office of the Vice President Vulnerability Scanning Cluster (VSC)

Office of the Vice PresidentIntroduction Greg Hedrick, CISSP Manager, Security Services Matt Wirges IT Security and Privacy Analyst

Office of the Vice President VSC Agenda  Motivations  Design and Implementation of the VSC  Problems Encountered  Current and Future Development  Summary  Resources  Questions

Office of the Vice President VSC Motivations  CERIAS Ability to review or perform vulnerability scans in incident response/analysis.  ITSP Centrally organize scanning reports. Increase computing power required for vulnerability scanning especially simultaneous scanning. Provide necessary bandwidth for scanning the entire campus, for example. Make it self-serve. Scan when necessary. No internal Security development skills.

Office of the Vice President VSC Design Three main components  Web Interface  Scanning Queue  Scanning Cluster

Office of the Vice President VSC Implementation  Web Interface  Scanning Queue  Scanning Cluster Nessus LVS Cluster configuration

Office of the Vice President VSC Implementation

Office of the Vice President VSC Implementation

Office of the Vice President VSC Implementation

Office of the Vice President

VSC Problems Encountered  Many problems encountered with testing version 1.0 and follow-up production version 1.1 Web Interface Scanning Queue Scanning Cluster

Office of the Vice President VSC Current and Future Work  Development towards VSC 2.0 Adds many new features Attempts to fix most of the problems encountered with initial releases  Redeployment of VSC production environment

Office of the Vice President VSC 2.0  Redesigned interface Better layout, smarter navigation More consistent widgets More efficient management of scanning policies and plugins Abandon Nessus report formats for customizable report generation Overhaul people management Abandon PHP OOP in favor of database interface libraries; result is a quicker application, but still easy to develop with

Office of the Vice President VSC 2.0  Redesigned queue PHP dropped in favor of a Perl daemon Nessus client abandoned in favor of Net::Nessus::ScanLite module Allows the queue to talk directly to the scanner server Results stored directly in database in custom tables to allow easy lookup of data Many cron-based tasks (plugin nightly updates) and resource consuming tasks from web interface moved to Perl daemon (i.e. DNS lookup, NetBIOS name querying)

Office of the Vice President VSC 2.0 CVS  Features already implemented Redesigned page layout; better presentation of menus Increased usability of management interfaces Expanded policy and scan-time configuration options for the Nessus scanner DNS and NetBIOS lookups for hosts Rewritten scan queue in Perl; added many enhancements to scheduling algorithm Policy weighting Scan priorities Hosts scanned in batches, rather than one at a time NetBIOS lookups (where applicable) at scan time to correlate scan results with DHCP hosts

Office of the Vice President VSC 2.0 Development  Features in development Enhanced scan reporting tool Customizable Differential Available in a variety of formats Ability to pause scans Better LDAP integration

Office of the Vice President VSC Summary  Benefits Free  More to do

Office of the Vice President VSC Resources  Vulnerability Scanning Cluster homepage: VSC 1.99 Preview Release CVS repository Help us out! Bug reports, feature requests, development contributions!  Linux Virtual Server software  Nessus Vulnerability Scanner

Office of the Vice President VSC Resources  VSC Development List Questions Bugs Development discussion  General Questions

Office of the Vice PresidentQuestions

VSC Current and Future work

Office of the Vice President VSC Current and Future work

Office of the Vice President