University of Maryland I.T. Security Gerry Sneeringer IT Security Officer
Slides Online
Information Technology Security Officer Develop University Security Architecture Lead Incident Handling Efforts Develop User Education Program.
University Environment Major administrative and business systems ($1 Billion enterprise) 30,000 research and administration computers (hundreds of system managers) 11,000 networked residential students 12,500 remote access users Wireless access.
Vulnerabilities Discovery of new weaknesses in common software Poorly maintained computers Human Nature –Poor Passwords –Accepting strange attachments –Operating dangerous software.
Current Threats Computer Viruses/Worms Script Kiddies Media Pirates Denial of Service.
Security Architecture Three Objectives –PROTECT –DETECT –INFORM.
PROTECT Deployment of Multiple Layers of Firewall –Campus Borders –Individual Networks –Individual Computers Distribution of Anti-Virus Software –On all computers –On campus mail server Virtual Private Networks.
DETECT Deployment of several layers of Intrusion Detection Systems –Watch traffic entering/exiting University –Watch traffic between segments within University –Host based software to detect unauthorized changes.
DETECT - II Systemic use of vulnerability scanning software. Monitor bandwidth trends.
INFORM User Education Programs –Project NEThics ( –Forums for System Administrators –Forums for computer users –Web Pages.
Additional URLs Intrusion Detection System: – Vulnerability Scanning –