University of Cincinnati Staying Ahead of the Security Curve with Finite Resources Presented by Diana Noelcke Associate Director, Enterprise Communication.

Slides:



Advertisements
Similar presentations
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
Advertisements

Disaster Recovery Planning Because It’s Time! Copyright Columbia University and Bentley College, This work is the intellectual property of the author.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Educause Security 2007ISC Information Security Copyright Joshua Beeman, This work is the intellectual property of the author. Permission is granted.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Information Security Policies Larry Conrad September 29, 2009.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
The Journey Toward 24/7 IT Monitoring University of North Carolina at Greensboro Design and Build of Network Operations Center Copyright Thomas M. Sheriff,
UWM CIO Office A Collaborative Process for IT Training and Development Copyright UW-Milwaukee, This work is the intellectual property of the author.
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
INDIANAUNIVERSITYINDIANAUNIVERSITY Automated Network Isolation at Indiana University David A. Greenberg Information Technology Security and Policy Office.
1 EDUCAUSE 2002 IT Support Community Training Model University of Colorado at Boulder.
West Virginia University Office of Information Technology Support Services One Stop Shopping For IT Support Services Sid Morrison Director, OIT Support.
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Classroom Technologies Re-organization Copyright Kathy Bohnstedt, This work is the intellectual property of the author. Permission is granted for.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Stanford’s Patch Management Project   Ced Bennett May 17, 2004 Copyright Cedric Bennett This work is the intellectual property of the author. Permission.
Rutgers IT Complex Michael R Mundrane 4 December 2001 Rutgers University Computing Services.
Herding CATS: the Community of Academic Technology Staff Lou Zweier, Director CSU Center for Distributed Learning The California State University NLII,
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Rhode Island Network for Educational Technology, Inc Update Sharon Hussey Executive Director Copyright Sharon L. Hussey, This work is the intellectual.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
NERCOMP 2002 Networks, Town and Gown: Collaborating with the Community Pat Cronin & Bill Davis Bridgewater State College Bridgewater, Massachusetts Copyright.
Honeypot and Intrusion Detection System
Introduction of Internet security Sui Wang IS300.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Securing Wired Local Area Networks(LANs)
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
CU – Boulder Security Incidents Jon Giltner. Our Challenge.
Topic 5: Basic Security.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Information Security: Current Threats Marc Scarborough Information Security Officer
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Securing Interconnect Networks By: Bryan Roberts.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Securing Information Systems
Educause/Internet 2 Computer and Network Security Task Force
Adapting Enterprise Security to a University Environment
Securing Information Systems
Security in Networking
Presentation transcript:

University of Cincinnati Staying Ahead of the Security Curve with Finite Resources Presented by Diana Noelcke Associate Director, Enterprise Communication Systems and Jim Downing Information Security Officer

“Some memories last forever”

The Way We Were ► 3 Different networks ► 2 ATM networks (Asynchronous Transfer Mode) ► 1 managed by an outside company ► 1 managed by UCit staff ► 1 Fddi network (Fiber Distributed Data Interface) ► Assigning IP’s per machine, maneuvering subnets around, IP conflicts ► Reactive versus pro-active in troubleshooting network problems ► Inaccurate documentation

Vision ► To design a one vendor/topology solution ► All network connectivity consistent throughout the campus ► To become pro-active versus reactive ► To support the university network totally from within ► Move into the future with the network design plus position the university for emerging technologies

Vision realized ► After 12 months of planning, community endorsements and 8 months of converting 73 buildings and 264 closets the University now has the second largest network in the Greater Cincinnati area, second only to P&G. ► One vendor solution ► Implemented network Security solutions ► Positioned for future technologies (VOIP, Multicast, QoS) ► Stability, Reliability, and Uptime ► Manageability ► Fiber plant, telecommunication closets fully documented

UCnet ► 21,000 data connections ► 800+ Network Devices ► 200+ Wireless access points ► Security devices, ► PIX Perimeter firewall, ► IDS (Intrusion Detection System) ► VPN (Virtual Private Network) ► DMZ (Buffer zone between UCnet and Internet) ► 2 nd Tier firewalls

Lessons Learned ► It’s very important that policies are written first. Policies are nothing without stated consequences and enforcement of them. ► If you don’t already have a defense in place, you won’t have any time to react. ► Plan for communicating to all users and at various levels ► Executive level, IT governance committees ► IT administrators, System administrators, Business managers ► Website

Lessons Learned ► Accurate documentation is very important ► Training of staff is essential prior to implementation ► Educating the end user is key to battling security with finite resources, since security starts at the desktop ► Define network monitoring tools needed prior to implementation

Top Security Threats and Challenges ► Wireless network deployment ► Hackers, internal and external ► Viruses, worms and other malicious code ► New students bringing computers on campus ► Employees and management not taking security policies seriously ► Getting our users to use the 2 nd Tier firewall features

UCnet Security Features ► Private Addressing ► NAT (Network Address Translation) ► Cisco PIX Firewalls ► DMZ (Buffer Zone between Internet & UCNET) ► VPN (Virtual Private Network) Access ► IDS (Intrusion Detection System)

Targets of Opportunity ► Personal Identifiable Information and Personal Health Information ► Identity Theft ► Student Records ► Patient Records ► Financial Records ► Credit card numbers ► Bank account ► Retirement ► Research Data & Other Intellectual Property

UC Computer Incidents Primary Cost Categories ► Employee time for investigation, repair, and restoration ► Loss of data Secondary Cost Categories ► Legal liability against University ► Diminished reputation ► Psychological impact (I.e., feeling violated)

Academic Incidents ► Moonlight Maze- Russian hacked Sun operating systems and gained access to U.S. university network servers to hide their tracks. ► Distributed Denial of Service (DDoS)- attacks on dot com sites; university sites implicated. ► RIAA- Illegal distribution of Copyrighted material. ► Nimda- Worm attack 1 week after September 11, 2001 Slowed Internet 86,000 Hosts infected 43% USA sites UCNet kept on-line

Recent - Academic Incidents ► Blaster- worm compromised windows operating system, flooded network. ► Welchia- similar to Blaster worm, ICMP scans and floods network. ► Sobig- self-replicating worm via .

Layered - Approach ► Policies ► University wide ► Departmental, Unit or College ► Network Architecture Layers ► Internet Perimeter connection ► Network Subnet Switch/Router ► Desktop machine, File Servers or UCit customer ► Abuse Reporting ► Helpdesk Tier 1 ► Network Operations Center Tier 2 ► Network Engineering Tier 3

IT Policies ► University Wide (General) ► Policy on the Use of Information Technology ► Perimeter Firewall Policy ► Information Technology Management ► Student Code of Conduct ► ► Residential Hall ► ► UCit- Organizational Computer policies ►

Policies Unit Policies ► UC College of Nursing ► ► Clermont College ► ► UC Dept. of Geography JCGIS - SA ►

Network Security Layers ► Perimeter Pix Firewall, Cisco Intrusion Detection, VPN ► Distribution Layer Cisco IOS firewall feature & IDS blades ► Access Layer Departmental servers and desktops

Abuse Reporting ► UCit HelpDesk – Tier 1 Support, document and resolve minor security breaches ► Network Operations Center –Tier 2 Monitor and analyze security data collection ► Network Engineering – Tier 3 Resolve major abuse issues

Overcoming Finite Resources ► Have written, acceptable and enforceable policies in place ► When you can’t hire new staff ► Educate and train your current staff along with your users ► Take a Tiered approach to support your network ► When you don’t have trained staff ► Use outside contacts with local and governmental agencies ► Partner with your Network/Security Vendor ► What are our next steps ► Ongoing research and testing of new security products ► Data mining, review and refresh our IDS architecture Copyright Diana Noelcke, Jim Downing, 2003 This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.