TSAG Meeting 3/14/02 Update on Current Technology Initiatives.

Slides:



Advertisements
Similar presentations
Security Update Server Registration, Active scanning and Windows patching.
Advertisements

Technology Update TSAG Meeting 8/8/02. Announcements: Account Cleanup  Number of Accounts: 41,338  Number of Faculty/Staff:~ 3,000  Number of Students:~30,000(~
Impact of the Recent UC Denver Remote Computing Audit May, 2010.
What’s New at NCS Fall, 2003 Gary Bernstein & the rest of the NCS gang.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Chapter 7 HARDENING SERVERS.
Technology Update TSAG Meeting 9/12/02. Announcements: Mandatory Password Changes Coming in October! (Postponed) End of BootP (November 1) DNS Cleanup.
Technology Update TSAG Meeting 6/13/02. Announcements: DNS Naming and Cleanup (coming!)  imap: , mail, mail1, mailsrv1  telnet, csun1: csun2, hp9k2,
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Technology Update TSAG Meeting 11/13/03. Rollout of Portal and SOLAR ( Portal and SOLAR are part of the.
Technology Update TSAG Meeting 3/13/03. Announcements: Disaster Recovery Test:[Bill]  (2/18-19) Networking Infrastructure: DNS, DHCP, Authentication.
CNIL Report April 4 th, CNIL Report (Apr 4 th, 2005) Two Major Goals: –Improvement of Instructional Services –Strengthening research IT infrastructure.
Technology Update TSAG Meeting 2/13/03. Announcements: Self-Service Account Utility Available Disaster Recovery Test:  (2/18-19)
Technology Update TSAG Meeting 11/14/02. Announcements: Spam Open Forum  Monday November 18, 2pm-3pm  OV Presentation Room Campus Operations Center:
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Update and Discussions on Technology Initiatives TSAG Meeting 4/11/02.
Technology Update TSAG Meeting 10/10/02. Announcements: DNS Cleanup Send periodic ICMP ping probes to all DNS entries (8/26- 9/13) Correlate data obtained.
Technology Update TSAG Meeting 7/11/02. Announcements: DNS Naming and Cleanup (coming!)  imap: , mail, mail1, mailsrv1  telnet, csun1: csun2, hp9k2,
SIMI: ISO Perspective Al ISO CSU Northridge
Payment Card Industry (PCI) Data Security Standard
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Understanding Active Directory
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Clinic Security and Policy Enforcement in Windows Server 2008.
BASIC NETWORK CONCEPTS (PART 6). Network Operating Systems NNow that you have a general idea of the network topologies, cable types, and network architectures,
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 7/15/04 PS Support Overview June Action Items TS.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Chapter 7: Using Windows Servers to Share Information.
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
By: Bill Stevenson Jose Plancarte Erik Magsino. Overview Messaging and collaboration server Send and Receive electronic mail and other forms of interactive.
Technology Update TSAG Meeting 3/11/04. Reminders CENIC (Corporation for Education Network Initiatives in California)  4CNET is being phased out. (our.
Building Secure, Flexible and Scalable Environments using LDAP - SANS Orlando Sacha Faust PricewaterhouseCoopers
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Virtual techdays INDIA │ august 2010 virtual techdays INDIA │ august 2010 Moving/Co-existing your messaging platform to the cloud with Exchange.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
TSAG Meeting 1/09/02 Update on Current Technology Initiatives Steven Fitzgerald.
Module 2: Overview of IIS 7.0 Application Server.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Technology Update TSAG Meeting 7/8/04. Announcements New Interim Director of User Support Services: Bill Hardy Outage on July 17 Udrive status Anyone.
Small Business Security Keith Slagle April 24, 2007.
Module 11: Designing Security for Network Perimeters.
Technology Update TSAG Meeting 12/12/02. Announcements: Campus Operations Center: Holiday Hours  Christmas: 12/22-1/1 8am-5pm Coverage  On Call Coverage:
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Security fundamentals Topic 10 Securing the network perimeter.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Technology Update TSAG Meeting 6/10/04. Old Voic System New Voic System installed on May 17 Remaining Issues:  Migrating calling trees  Some.
Windows 2000 Ronnie Park Jarod Nozawa Joe Stones Yassir Mhdhroui.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Module 1: Introduction to Windows 2000 and Networking.
1 CEG 2400 Fall 2012 Directory Services Directory Services eDirLDAP Active Directory.
Unified Address Book Security Implications. Unified Address Book Overview –What are we talking about –What is the Risk –What are we doing to minimize.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Chapter 7: Using Windows Servers
Secure Connected Infrastructure
Working at a Small-to-Medium Business or ISP – Chapter 8
File System Implementation
Open Source and the LDAP Enabled University
Presentation transcript:

TSAG Meeting 3/14/02 Update on Current Technology Initiatives

Overview Announcements: –Account Maintenance System (March 8, 2002) –SIMS/R Forms –Limiting SMTP Vulnerabilities (Proposed March 29, 2002) Directory Initiative Desktop and Server Security Issues (Caleb Fahey) Wireless Initiative (Will Trask) Network Access Control (Will Moran)

Directory Initiative Goals: To provide users with a single user-name and password for all IT resources –improve system security via strong authentication –reduce account management overhead –simplify end-user problems To allow IT units to specify who may access their resources (i.e., units specify authorization) To engineer a system that works with existing local IT system protocols and procedures

Technical Challenges To correlate existing database information into a single source To unify the various IT account systems To engineer a system that works with: Macs, Microsoft, Novell, and Unix systems

From Many To … /etc/passwd /etc/aliases SIMS/R PeopleSoft HR ECS A&F NDS Library Campus Phone Directory Majordomo ~dlt/aliases ~dlt/*.vbars password.account

In Production: CSUN1 Authentication findalias finduser Modem Pool Wireless Network Webmail Next up: Majordomo Authentication Vacation Authentication Mail Client: Find People Being Discussed/Planned: PeopleSoft Authentication A&F NDS tree Directory Aware Services Authentication, Authorization, & Information Lookup

Outlook: Find People

Top-Level DIT Layout O=CSUN ou=Authenticationou=Libraryou=ECS ou=Usersou=Groups

Approaches to Delegate Control Mirror –Unit copies all authentication objects –Unit augments objects with authorization information Referral (ldaps://hostname) –Unit relies on central infrastructure –Authentication and authorization information stored with single user object Alias –Each Unit user is an authorization object with a referral to authentication object –Works in theory!

Distributed, Replicated Architecture eDirectory (edir.csun.edu) iPlanet (idir.csun.edu) OpenLDAP (odir.csun.edu) ActiveDir. (adir.csun.edu) dir.csun.edu:636 ldaps.csun.edu:636 ldap.csun.edu:389 Encryption Modules Distribution LDAP Server

Desktop and Service Security Issues Goals: To educate the campus and the IT staffs on the needs for appropriate security controls To collaboratively define and implement these controls, which will result in –improved security for the campus computing infrastructure –reduced work load for the technical staffs –increased productivity of the end users To ensure that local autonomy/flexibility is retained via the local IT units

Standards Include? Administrator Access and Passwords Software requirements? –Secure Shell –Antivirus software Shutdown Policy Mail Server Standards? –Antivirus Filter –Authenticated SMTP –Directory Aware

Mail Servers SMTP Vulnerabilities (2/15) Inbound: 192 Outbound: 256x256 Identified Mail Servers (3/2) imap.csun.edu alpha.ecs.csun.edu ppm.csun.edu std-affairs.csun.edu jacek.csun.edu admsvcs.csun.edu jour.csun.edu sundial.csun.edu jour1.csun.edu codes.csun.edu sauron.csun.edu ncod.csun.edu akala.csun.edu sunspot.csun.edu galileo.csun.edu davinci.csun.edu SMTP Vulnerabilities (Proposed 3/29) Inbound: 16 Outbound: 16+1

Wireless Initiative Purpose: To provide flexible and secure access to the Internet via portable devices Services: –Web: http and https –Mail: smtp to smtp.csun.edu –SSH: to the world –Virtual Private Network (VPN) for the future! Status: –Pilot phase well underway –Campus wide test in April –Anticipated production services in the fall

Sierra Quad Oviatt Lawn Sequoia Hall Engineering Exchange Business/Education Student Services Wireless Zones Today

Wireless Zones in May University Hall Oviatt Library (4 th ) Sierra Hall Jerome Richfield Bookstore Athletics Fields And a whole lot more to follow!

Announcement List:

Network Access Control Reduce the amount of SPAM mail Reduce exposure to copyright infringement Reduce exposure to DOS attacks Increase bandwidth to campus community Increase the integrity of inter- and intra-campus network communications Increase productivity of all by not dealing with SPAM and other such attacks Not Again Zzzz

Approach Paradigms: –Allow all, deny exceptions –Deny all, allow exceptions Attack problem in levels First step: Focus on campus/internet boundary –Reduce the number of entry points to campus –Reduce the number of exit points to campus Move towards authenticated and encrypted protocols and applications, e.g., https, ssh

Tasks ACLs deployed for several colleges/units and for several protocols (snmp, smtp!) Provide information on (date?): –Deployed servers on campus –Required inbound ports for servers –Required outbound ports for servers Block all inbound traffic to non-servers (date?) Block all unwanted traffic to servers (date?) Recommend and then deploy SSH client (date?) ftp, ssh, http/s, irc/s