Northwestern University Information Technology UNITS Quarterly Meeting April 29, 2004 Network Security Roger Safian

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Mr C Johnston ICT Teacher
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Internet Savvy & Safety April 22, 2010 Roger Safian Senior Data Security Analyst.
Vulnerability Analysis Borrowed from the CLICS group.
UNITS meeting September 30, 2004 Network Security Roger Safian
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Northwestern University Information Technology UNITS meeting February 17, 2005 Network Security – Statistics and Trends Roger Safian
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
1 Computer Security: Protect your PC and Protect Yourself.
Quiz Review.
Incident Response Updated 03/20/2015
Internet safety By Lydia Snowden.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware: Defenses. Kinds of malware Viruses  Macro Viruses  Memory-resident viruses  File infector viruses  Boot Viruses  Trojan Horses  Hoaxes.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Using Windows Firewall and Windows Defender
Enforcing Concurrent Logon Policies with UserLock.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
MIS Week 6 Site:
Computer and Network Security Issues –the Security Officer’s Perspective Jeff Savoy, Information Security Officer.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
MIS Week 6 Site:
Small Business Security Keith Slagle April 24, 2007.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
Security Threats Caela Harris. What is a Virus A computer virus or a computer worm is a malicious software program that can self replicate on computer.
Agenda Last class: Computer Software Today: –Task Manager, Control Panel.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Computer Security Keeping you and your computer safe in the digital world.
Mobility With IP, implicit assumption that there is no mobility. Addresses -- network part, host part -- so routers determine how to get to correct network.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Internet Safety.
Three steps to prevent Malware infection
Malware and Computer Maintenance
ISYM 540 Current Topics in Information System Management
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Information Security 101 Richard Davis, Rob Laltrello.
Business Risks of Insecure Networks
Firewalls.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Things To Avoid: 1-Never your password to anyone.
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Call AVG Antivirus Support | Fix Your PC
Information Security Session October 24, 2005
Intro to Ethical Hacking
Intro to Ethical Hacking
Unit 4 IT Security Kerris Davies.
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Northwestern University Information Technology UNITS Quarterly Meeting April 29, 2004 Network Security Roger Safian

Northwestern University Information Technology Agenda Statistics Why these incidents occur –What can be done to prevent them Questions

Northwestern University Information Technology Statistics FY 2002/2003 –Virus = 1166 –Compromised = 727 –Total incidents = /1/02 – 8/31/03 FY 2003/2004 –Virus = 1436 –Compromised = 261 –Total incidents = /1/01 – 2/29/04

Northwestern University Information Technology Statistics – Take 2 Removing August (Blaster/Welchia) FY 2002/2003 –Virus = 336 –Compromised = 646 –Total incidents = /1/02 – 7/31/03 FY 2003/2004 –Virus = 1436 –Compromised = 261 –Total incidents = /1/01 – 2/29/04

Northwestern University Information Technology Statistics – Take 3 Same time frames FY 2002/2003 –Virus = 142 –Compromised = 342 –Total incidents = /1/02 – 2/28/03 FY 2003/2004 –Virus = 1436 –Compromised = 261 –Total incidents = /1/01 – 2/29/04

Northwestern University Information Technology Why these incidents occur? Weak Passwords –All machines and accounts need passwords –Use rules similar to the NetID rules Opening viral attachments –Don’t open unexpected attachments –Only open specific types of extensions –Make sure to look at the LAST extension

Northwestern University Information Technology Why these incidents occur? (2) Updates not applied –Ensure Windows update runs automatically –Don’t forget about layered products Network use –P2P –Be careful when clicking on links

Northwestern University Information Technology Why these incidents occur? (3) Out of date anti-viral software –Ensure you install the NU supplied software –Set to update automatically EVERY day Blended Threats –Multiple attack vectors directed at hosts Home Networks –Frequently attacked with little monitoring

Northwestern University Information Technology ISS Scans Internet Security Systems –Network scanner Produces HTML reports –Organized by severity Currently checks for ~1300 vulnerabilities

Northwestern University Information Technology ISS Scans (2) Caveats –Not 100% accurate A pretty decent indicator though –Doesn’t see through your firewall –Machine must be online –Only looks for vulnerabilities it knows about

Northwestern University Information Technology ISS Scans (3) Recommend getting report once per quarter –Or any time you are suspicious Or have significant changes Request from –Send IP addresses you wish scanned Can specify a range or subnet

Northwestern University Information Technology Questions? Contact Information – – (NOC 24x7)