University of Maryland I.T. Security Gerry Sneeringer IT Security Officer

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

Incident Response Managing Security at Microsoft Published: April 2004.
4 Information Security.
Network Security and Audits LITN Fall Conference 2006 Presented by Katie Givens Mosaic.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
OBJECTIVES  Able to explain the roles of NIDS  To understand and able to explain the NIDS Sensor Placement.  Able to solve case studies related.
IS Network and Telecommunications Risks
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Drs.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Controls for Information Security
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
NETWORK SECURITY.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Security Guidelines and Management
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
PBA. Observations  Growth, projects, busy-ness –Doing an incredible amount of work  Great Quality of work  Concern about being perfect  Attitudes.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
 Southwest Florida Local Managed Services Company  Technicians throughout Florida, North Carolina, and New York  Knowledgeable Core Team  Certified.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Module 14: Configuring Server Security Compliance
Software Security Testing Vinay Srinivasan cell:
Chapter 6 of the Executive Guide manual Technology.
Computer and Network Security Issues –the Security Officer’s Perspective Jeff Savoy, Information Security Officer.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Grid-based Future Internet with Wireless sensor network By Mohammad Mehedi Hassan Student ID:
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Module 6: Designing Security for Network Hosts
Completing network setup. INTRODUCTION Course Overview Course Objectives.
Wireless Intrusion Prevention System
Chapter 2 Securing Network Server and User Workstations.
EECS 4482 Fall 2014 Session 8 Slides. IT Security Standards and Procedures An information security policy is at a corporate, high level and generally.
Module 11: Designing Security for Network Perimeters.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Introduction to Systems Security (January 12, 2015) © Abdou Illia – Spring 2015.
Security fundamentals Topic 10 Securing the network perimeter.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
Critical Security Controls
TECHNOLOGY GUIDE THREE
Secure Software Confidentiality Integrity Data Security Authentication
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
ISMS Information Security Management System
Introduction to Systems Security
Computer Technology Networks & Internet.
Online Learning.
Cyber security and Computer Misuse
In the attack index…what number is your Company?
LM 5. Wireless Network Security
Presentation transcript:

University of Maryland I.T. Security Gerry Sneeringer IT Security Officer

Slides Online

Information Technology Security Officer Develop University Security Architecture Lead Incident Handling Efforts Develop User Education Program.

University Environment Major administrative and business systems ($1 Billion enterprise) 30,000 research and administration computers (hundreds of system managers) 11,000 networked residential students 12,500 remote access users Wireless access.

Vulnerabilities Discovery of new weaknesses in common software Poorly maintained computers Human Nature –Poor Passwords –Accepting strange attachments –Operating dangerous software.

Current Threats Computer Viruses/Worms Script Kiddies Media Pirates Denial of Service.

Security Architecture Three Objectives –PROTECT –DETECT –INFORM.

PROTECT Deployment of Multiple Layers of Firewall –Campus Borders –Individual Networks –Individual Computers Distribution of Anti-Virus Software –On all computers –On campus mail server Virtual Private Networks.

DETECT Deployment of several layers of Intrusion Detection Systems –Watch traffic entering/exiting University –Watch traffic between segments within University –Host based software to detect unauthorized changes.

DETECT - II Systemic use of vulnerability scanning software. Monitor bandwidth trends.

INFORM User Education Programs –Project NEThics ( –Forums for System Administrators –Forums for computer users –Web Pages.

Additional URLs Intrusion Detection System: – Vulnerability Scanning –