Security Essentials for Desktop System Administrors.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Northside I.S.D. Acceptable Use Policy
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Basic Computer Security. Outline F Why Computer Security F Fermilab Strategy: –Integrated Computer Security –Defense in Depth F Your role and responsibilities.
Security, Privacy, and Ethics Online Computer Crimes.
Basic Computer Security. Outline F Why Computer Security F Fermilab Strategy: –Integrated Computer Security –Defense in Depth F Your role and responsibilities.
Security Essentials for Fermilab System Administrators.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Security: Principles and Practice
VISD Acceptable Use Policy
INTERNET and CODE OF CONDUCT
Session 3 – Information Security Policies
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Incident Response Updated 03/20/2015
Fermi Computer Incident Response Team Computer Security Awareness Day March 8, 2005 Michael Diesburg.
Fermilab Computer Security Awareness Day November 2012 Basic Computer Security.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Information Systems Security Computer System Life Cycle Security.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Security Essentials for Fermilab System Administrators.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Security Essentials for Desktop System Administrors.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
FNAL System Patching Design Jack Schmidt, Al Lilianstrom, Andy Romero, Troy Dawson, Connie Sieh (Fermi National Accelerator Laboratory) Introduction FNAL.
Security Essentials for Desktop System Administrators.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Security Essentials for Desktop System Administrators.
Fermilab Computer Security & Strong Authentication Project Mark Kaletka Computing Division Operating Systems Support Department.
Strong Authentication Plan Why What When How it affects You.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Security Essentials for Fermilab System Administrators 29-Sep-2009.
Module 11: Designing Security for Network Perimeters.
Security Essentials for Fermilab System Administrors.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Security Essentials for Desktop System Administrors.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Proposed UW Minimum Computer Security Standards From C&C 28 Jan 2005 Draft.
Security Essentials for Desktop System Administrors.
Role Of Network IDS in Network Perimeter Defense.
Computer Security Essentials for Fermilab Sysadmins Irwin Gaines and Matt Crawford Computing Division.
Security Essentials for Fermilab System Administrators 08-Dec-2011.
Computer Security Awareness day November 12, 2013.
JOHN MARSHALL COMMUNITY SCHOOL Media Center Mrs. Shepard Updated 2/8/14.
Computer Security Sample security policy Dr Alexei Vernitski.
COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTER AND INTERNET SECURITY LESSON 9.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Security Essentials for Fermilab System Administrators 29-Sep-2009.
Security Essentials for Fermilab System Administrators Wayne Baisley Computer Security Awareness Day 10 November 2015.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Fermilab Computer Security Awareness Day. Why Computer Security  The Internet is a dangerous place We are constantly being scanned for weak or vulnerable.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Information Technology Acceptable Use An Overview
Securing Network Servers
Fusion Center ITS security and Privacy Operations Joe Thomas
Critical Security Controls
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Information Security Awareness
Presentation transcript:

Security Essentials for Desktop System Administrors

Outline F Why Computer Security F Fermilab Strategy: –Integrated Computer Security –Defense in Depth F Your role and special responsibilities as a user and system administrator F Other Computing Policy Issues –Data backup –Incidental use –Privacy –Offensive material –Licensing

Why Computer Security F The Internet is a dangerous place –We are constantly being scanned for weak or vulnerable systems; new unpatched systems will be exploited within minutes. F Fermilab is an attractive target –High network bandwidth is useful for attackers who take over lab computers –Publicity value of compromising a.gov site –Attackers may not realize we have no information useful to them

Why Computer Security - 2 F We need to protect –Our data –Our ability to use our computers (denial of service attacks) –Our reputation with DOE, Congress and the general public F Major sources of danger –Running malicious code on your machine due to system or application vulnerabilities or improper user actions –Carrying infected machines (laptops) in from off site

FNAL Strategy F Integrated Security Management F Defense in Depth –Perimeter Controls and auto blocking –Mail gateway virus scanning –Strong Authentication (Kerberos) –Critical System plans –Critical vulnerabilities –Prompt response to computer security incidents (FCIRT) –Intelligent and informed user community

Integrated Security Management F Computer Security is not an add-on or something external, it is part and parcel of everything you do with computers (analogy with ES&H) F Not “one-size-fits-all”, but appropriate for the needs and vulnerabilities of each system F In most cases, it is simply common sense + a little information and care F Each Division/Section or large experiment has a GCSC (General Computer Security Coordinator) who acts as liaison with the Computer Security Team in disseminating information and dealing with incident; see for an up to date list

Strong Authentication F Avoid disclosure of passwords on the network F No network services (logon or read/write ftp) visible on the general internet can be offered with out requiring Kerberos authentication (unless a formal exemption is applied for and granted) F Kerberos provides a single sign in, minimizing use of multiple passwords for different systems F Lab systems are constantly scanned for violations of this policy

Critical Systems F Defined as “critical to the mission of the Laboratory”, i.e. disruption may have major impact on Laboratory operations; –Most things do not fall in this category; F Special (more stringent) rules & procedures apply; –Including periodic reviews; F You’ll know if you’re in this category;

Critical Vulnerabilities and Vulnerability Scanning F Certain security vulnerabilities are declared critical when they are (or are about to) being actively exploited and represent a clear and present danger F Upon notification of a critical vulnerability, systems must be patched by a given date or they will be blocked from network access

Computer Security Incidents F Mandatory incident reporting; –Report all suspicious activity: If urgent to FCC Helpdesk, x2345, 24x7 Or to system manager (if immediately available) Non-urgent to –Incidents investigated by Fermi Computer Incident Response Team (FCIRT); –Not to be discussed!

FCIRT (Fermi Computer Security Incident Response Team) F Security experts drawn form throughout the lab F Investigate (“triage”) initial reports; F Coordinate investigation overall; F Work with local system managers; F Call in technical experts; F May take control of affected systems; F Maintain confidentiality;

Other Rules for General Systems F “Blatant disregard” of computer security; –First time warning, repeat offense disciplinary action; F Unauthorized or malicious actions; –Damage of data, unauthorized use of accounts, denial of service, etc., are forbidden; F Ethical behavior; –Same standards as for non-computer activities; F Restricted central services; –May only be provided by Computing Division; F Security & cracker tools; –Possession (& use) must be authorized;

Mandatory System Manager Registration F System managers must be registered with FCSC F See:

Your role as a user and system administrator F Sysadmins are on the “front line” of computer security: “Fermilab’s continuing policy has been to put its first line of defense at the individual responsible for the data and the local system manager.” F Three roles for a sys admin: –System manager (configure system, remove unneeded services, apply patches promptly); –examples for users; –vigilant observers of system (and sometimes user) behavior F Sysadmins are expected to communicate computer security guidelines and policies to the users of systems they administer; F Most important: know how to tell what services are running on your desktop, turn off those not needed, know where you are getting your patches from (FERMI domain, Patchlink, yum, Microsoft, …)

Role of sysadmins F Manage your systems sensibly, remaining aware of computer security while conducting everyday business F Advise and help users F Keep your eyes open F Report potential incidents to FCIRT F Act on relevant bulletins

Your role as a computer user F Guard against malicious code in –Don’t open attachments unless you are sure they are safe –Don’t trust who is from –Updated and enabled virus signatures F Guard against malicious code from web browsing F Obey Strong Authentication Policy (Kerberos) –Don’t run network services (login or read write ftp) unless they demand Kerberos authentication –Treat your kerberos password as a sacred object (never expose it over the network) F Promptly report potential computer security incidents –X2345 or –Follow FCIRT instructions during incidents (especially about keeping infected machines off the network and preserving the status of an infected machine for expert investigation)

Other Computing Policy Issues F Data backup F Incidental use F Privacy F Offensive material F Licensing

Data Backup Policy - Users –Users (data owners) responsible for determining: What data requires protection; How destroyed data would be recovered, if needed; Coordinating backup plan w/ sysadmins; –or doing their own backups; If the backup is done for you it might be worth occasionally checking that you can really retrieve the data

Incidental Computer Usage F Fermilab permits some non business use of lab computers F Guidelines are at e.htm e.htm

Activities to Avoid F Large grey area, but certain activities are “over the line”; –Illegal; –Prohibited by Lab or DOE policy; –Embarrassment to the Laboratory; –Interfere w/ performance of job; –Consume excessive resources;

Privacy of and Files F Fermilab normally respects the privacy of electronic files and ; F Employees and users are required to do likewise; F Certain exemptions for system managers and computer security response; F All others must have Director(ate) approval;

Privacy of and Files F May not use information in another person’s files seen incidental to any activity (legitimate or not) for any purpose w/o either explicit permission of the owner or a “reasonable belief the file was meant to be accessed by others.” –Whether or not group/world accessible; –“Group” files implicitly may be used by the group for the mission of the group;

Offensive Material on computers F Many “computer security” complaints are not; F Material in a computer is like material in a desk; –With respect to both privacy and appropriateness; F This is a line management, not computer security, concern (except in egregious cases).

Software Licensing F Fermilab is strongly committed to respecting intellectual property rights F Any use of unlicensed commercial software is a direct violation of lab policy

Questions? F F for questions about security policy F for reporting security incident F