Technology Solutions Conference School Security Technology Solutions Conference School Security.

Slides:



Advertisements
Similar presentations
Information Security The Responsibility of Security Lies on The Shoulders of Each and Every User……. R. LaRocca 1997 Robert LaRocca - Director Information.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Thank you to IT Training at Indiana University Computer Malware.
Woodland Hills School District Computer Network Acceptable Use Policy.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
Security+ Guide to Network Security Fundamentals
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Principles of Information Technology
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Incident Response Updated 03/20/2015
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Protecting ICT Systems
Chapter 11 Security and Privacy: Computers and the Internet.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11.
Using SWHS: The AUP [Acceptable Use Policy]
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Cyber crime & Security Prepared by : Rughani Zarana.
Honeypot and Intrusion Detection System
Troubleshooting Windows Vista Security Chapter 4.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Note1 (Admi1) Overview of administering security.
Module 6: Designing Security for Network Hosts
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Small Business Security Keith Slagle April 24, 2007.
Computer security By Isabelle Cooper.
Module 11: Designing Security for Network Perimeters.
Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
HalFILE 2.1 Network Protection & Disaster Recovery.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
NetTech Solutions Protecting the Computer Lesson 10.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
1 Why Use Technology?  Research  Independent Learning  Immediate Feedback  Organization.
Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.
Woodland Hills School District Computer Network Acceptable Use Policy.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Security Sample security policy Dr Alexei Vernitski.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Module 5: Designing Physical Security for Network Resources
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Lecture 14: Business Information Systems - ICT Security
Answer the questions to reveal the blocks and guess the picture.
Test 3 review FTP & Cybersecurity
6. Application Software Security
Woodland Hills School District
Presentation transcript:

Technology Solutions Conference School Security Technology Solutions Conference School Security

2 Network Security Prevention Recovery Forensics Security Audit New Trends Security Issues

3 Firewalls Servers Desktops Network Applications User Training Policies Basic Assumptions Prevention

4 Prevention - Firewalls What data do you want to protect? Known databases such as student and financial information Local databases kept on hard drives What is a firewall? Not a content filter Poor configurations and lack of patch maintenance very common Personal firewalls for your home

5 Prevention - Firewalls Intrusion Detection Software What is a DMZ? Web server dilemmas Placement of server Access for content management

6 Prevention - Servers Keep up with server maintenance and security patches Nimda took advantage of known holes Code Red, Polymorphic worms Subscribe to virus definitions and be sure to update Not all virus protection software is created equal

7 Security - Servers Remove all generic and guest defaults after install Web server hacked via generic login Check for inactive web modules They can be accessed and generic setups abused

8 Prevention - Desktops A: drive Vulnerable to infected floppy disks and other non-authorized files and applications C: drive Vulnerable to configuration changes, and access to restricted resources (students hid Internet access) FTP Vulnerable to downloads of infected files or other non-authorized files and applications

9 Security & Hackers Internal Attacks: Students and Staff Hackers External Attacks: Internet & Parasitic Attacks: Bandwith, Storage, Processing Common Security Issues

10 Internal Attacks: Student & Staff Hackers Denial of Service Web server attacks Unauthorized Intrusions Admin server accounts SASI Id’s Anonymous surfing Port 443

11 External Attacks: Internet & Spamming and Smurfing Rejected Viruses ILOVEYOU, Melissa, Anna K, Sircam Back Orifice Worms Code Red Nmda Polymorhic worms

12 Parasitic Attacks Bandwidth School T1 used fully 24 hours a day Wireless access, NYC Antenna & Liverpool Resource consumption.exe files music videos games

13 Common Security Issues Kids used to maintain parts of network – (ie web server) Virus subscription not purchased Security patches not up to date on servers and workstations Firewall: None, poorly configured, not up to date on patches

14 Common Security Issues Web server inside or outside Firewall Applications and/or servers not set up correctly (leaving Guest ID’s, Anonymous users, FTP) No disaster recovery and backups are not rigorous

15 Common Security Issues No restrictions on desktops for students Floppy access, FTP, loading software No policy for security: escalation, passwords, etc.

16 Prevention - Desktops Windows Explorer Students see all network resources Right Click Students can cut, paste, and delete important files including system configuration

17 Prevention - Network Require specific logons Lab aid giving generic logons so students could bypass system Pornography found on C: drive in teachers’ room Secure your remote access to network Maintenance done by third parties Virtual Private Networks (VPNs) Are your hubs and switches physically secure?

18 Prevention - Network Configure your routers with access lists Check hubs, switches and routers for web management modules and change default passwords

19 Prevention - Applications Microsoft Office – “save as” Can student see network drives? Microsoft Office and Encarta templates Students get Internet access and can download unauthorized Microsoft patches Downloads of plugins and other software Programming courses such as C++ and Visual Basic Have access to basic network functions

20 Prevention - Policies.exe files Slow Internet and/or network performance Overwhelmed hard drives and network servers Passwords No policy on changing Fewer passwords for ease of use purposes “Shoulder surfing”, yellow stickies, etc.

21 Prevention - Policies Loading software locally Technical issues – not in “Ghost image” Printing and application support issues Copyright issues Accidentally “blow out” system Docking home computers Students running “cracking” programs and access SASI passwords

22 Prevention - Policies Disks from home Technical vulnerabilities Copyright vulnerabilities Students doing maintenance May compromise security intentionally or unintentionally

23 Prevention - Policies Removal of access when someone leaves , Calendar, network logon, etc. Early notification of problems such as viruses What process in place to notify users of new viruses, etc. More than one person with key knowledge and access. Network backdoors setup Secret backups and password changes done before termination 18 months rebuilding system because of no documentation

24 Prevention – Policies Enforcement of policies If practice doesn’t follow policy than policies are not valid.

25 Recovery Save to the network Saving to the C: drive means no backups Verify that they are done Who is responsible? Who is their backup? External backups vs internal Proper tape rotation Off-site storage Periodic backup check before and emergency

26 Recovery Damaged servers RAID drives Maintenance contract or spare drives Mirrored or backup servers Hot site Routers, switches, hubs Maintenance contract of replacements

27 Recovery Applications media archived Escalation procedure to move to recovery quicker and to limit damages May need to isolate problem May need to change passwords

28 Forensics Log files: Intrusion detection logs Firewall logs Router logs Server logs Application logs

29 Forensics Unique log-ins Isolate systems Notify authorities Print screens (IM’ing, chat, , etc.) Terror threat to local HS Ballad of an terrorist Hard Dive recovery Anonymizer sites