Laptops and Computer Security Gareth Smith. Current Situation in PPD Standardised on Dells (D400, D600) Total bought to date by department: ~50. Loan.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

The Approach to Security in CLRC Gareth Smith With acknowledgements to all the members of the CLRC Computer Network and Security Group, especially Trevor.
RAL Particle Physics Dept. Site Report. Gareth Smith RAL PPD About 2 staff mainly on windows and general infrastructure About 1.5 staff on departmental.
Introduction to Physics IT Support. To learn about IT Support available with the Department of Physics, and across the University. To find out a little.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Welcome Overview of this Session Introduction The Migration –Active Directory (replacing Novell) – & Calendar – from iPlanet to Outlook –Network.
CT NIKHEF Nov MS NIKHEF (ET special) CT system support.
6/4/2015H. Schwendicke1 Reinhard Baltrusch, Helga Schwendicke, Gunter Trowitzsch Total Virus Defense Licensing Installation Updates Lovesan/
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Welcome to Computing in Geoscience! A Brief Introduction to Computing at the University of Leicester. Andrew Myers. Please.
1 SLAC Windows Migration Bob Cowles Presented for the SLAC Windows Migration Project HEPNT, Fermilab October 24, 2002.
One World Real Estate Company Technology Plan. New Computers For the Office Eight 13 inch MacBook Pros and three 27 inch iMac desktop computers Macs are.
Installing software on personal computer
Computer Security Update Bob Cowles, SLAC stanford.edu Presented at HEPiX - TRIUMF 23 Oct 2003 Work supported by U. S. Department of Energy.
Managing a computerised PO Operating environment 1.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Gareth Smith RAL PPD HEP Sysman. April 2003 RAL Particle Physics Department Site Report.
Client Management. Introduction In a typical organization there are a lot of client machines used for day to day operations Client management is a necessary.
1 NTC TCS Training Dallas 2010 TaxWise Online (TWO) Practical Notes and TWO Wireless.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
UCL Site Report Ben Waugh HepSysMan, 22 May 2007.
Chapter 7: Using Windows Servers to Share Information.
Managing Computerised Offices Operating environment
Get the best performance out of your PC By Matthew Pinch.
PPD & CLRC's response to the (IS) Security Threat Gareth Smith PPD/CG Christmas Lectures 2002.
Configuring Windows XP-Based Laptops for Guest Access to Bloomsburg University’s Wireless Network Intended for University staff, and guests planning to.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
CERN’s Computer Security Challenge
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
© British Telecommunications plc BT Managed Services Innovate
How CERN reacted to the Blaster and Sobig virus attack Christian Boissat, Alberto Pace, Andreas Wagner.
CERN IT Department CH-1211 Genève 23 Switzerland t Experience with Windows Vista at CERN Rafal Otto Internet Services Group IT Department.
Cloning NT Using DriveImage Chris Brew Particle Physics Department Rutherford Appleton Laboratory rl.ac.uk.
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
PPD Computing “Business Continuity” David Kelsey 3 May 2012.
Software Software consists of the instructions issued to the computer to perform specific tasks. –The software on a computer system refers to the programs.
Kevin Dunford – Windows Support & Development What do I do.. Support, configuration, and development of - Windows servers, desktops, Laptops, printers,
Simplifying the Configuration of Student Laptops — StirlingVPNSetup Simon Booth University of Stirling Laptop Forum 27th June 2006.
WINDOWS XP END OF LIFE (EOL) Microsoft support officially ends April 8, 2014 No more OS updates after EOL date Security Risk running unpatched Operating.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Status of Windows 2000 deployment at CERN Alberto Pace, for the IT/IS group - April 2002
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Cloning Windows NT Systems Mainly based on experiences at RAL and Oxford.
TAX-AIDE Security 2013 Regional Meetings1. TAX-AIDE Security ● This year in the AARP Foundation Tax-Aide program there were: Two(2)confirmed laptops reported.
Epworth Villa Tony Gaeddert Network Administrator Men’s Coffee August 5, 2002 Computers and Technologies.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
MOE – Experience 1.What do you get 2.It just works 3.Same look and feel across the university 4.Your documents and desktop available.
Wolfgang von Rüden, CERN IT, August Computer Security: A permanent and costly battle Update for the CERN Management Board 26 August 2003 Wolfgang.
Gareth Smith RAL PPD RAL PPD Site Report. Gareth Smith RAL PPD RAL Particle Physics Department Overview About 90 staff (plus ~25 visitors) Desktops mainly.
NetTech Solutions Protecting the Computer Lesson 10.
NASRULLAH KHAN.  Lecturer : Nasrullah   Website :
PPD/CG Christmas Lectures Windows - Support Gareth Smith PPD Xmas Lectures 17 th December 2007.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.

“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
CACI Proprietary Information | Date 1 PD² v4.2 Increment 2 SR13 and FPDS Engine v3.5 Database Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Colorado State University Library University Technology Fee Update.
CERN Windows Roadmap Tim Bell 8th June 2011.
Information Security Session October 24, 2005
Part 3.
Bethesda Cybersecurity Club
Presentation transcript:

Laptops and Computer Security Gareth Smith

Current Situation in PPD Standardised on Dells (D400, D600) Total bought to date by department: ~50. Loan Pool: –Dell CPx (old and heavy) –7 * Dell C400 (lightweight) –booking system on web (includes projectors). –Pool usage not rising as individuals acquire own laptops. New systems with Windows XP. Will update clone image (for pool) to XP as well. No plans to upgrade all Windows 2000 to XP.

Dell Models Encourage purchase of the same types of laptop –Benefits of standardisation Swap batteries Familiarity with how to contact Dell etc. Can clone systems Two Models –Latitude D400 Lightewight. 12” screen; 1.7Kg. –Latitude D600 Larger. 14” screen; 2.12Kg.

Desktop Replacement Some users only use a laptop. –Importance of DSE issues….. Laptops bought on Group Budgets. CG will contribute to cost if ‘desktop replacement’. –CG provide Monitor/Keyboard/Mouse/Office Licence plus £700 towards cost. –Group buys laptop with docking station.

Visitors Laptops If in conference rooms – receive address on ‘visitors’ network (i.e. outside firewall). If in PPD receive an address in the PPD range. –Would like to improve this…. Need visitors laptops patched and with up-to- date date anti-virus. Likewise, need to ensure that our laptops are up-to-date before taken elsewhere.

Laptops Security Current arrangements are that users must: –Regularly update Sophos anti-virus. (Over network and by upgrading from a CD at roughly 2-monthly intervals.) –Apply patches (via Windows Update).

Laptops Security (2) Move to put laptops into the ‘PPD’ Windows domain. –Can use existing centralised mechanisms to update: Microsoft Patches Sophos. –Will investigate automatic updates from a ‘Systems Updated Services (SUS)’ server.

2003 Security Issues A busy year: Virus/Worms on Windows (especially ‘Blaster’). Sophisticated ‘rootkit’ attack on LINUX. Rise in quantity of SPAM Attempts to trick users into giving bank details etc. –…………

Slammer Impact

CERN results and effort involved ActionPreventiveRepair Apply patch to 5000 machines via NICE0.1 Security4.0 Network group6.0 User Support3.5 Coordination0.5 Local support4.0 Total0.118 NB: Does not include effort in other Divisions The hotfix webpage was visited 12’200 times in August The emergency measures page 2600 times in second half of August Infected Systems: Blaster/Welchia (~300), Sobig (12) (At end of August in FTE weeks)

Conclusions (From Bob Cowles’ talk) [Unchanged from last year] Poor administration is still a major problem Firewalls cannot substitute for patches Multiple levels of virus/worm protection are necessary Clue is more important than open source

Fighting SPAM Large increase in SPAM over year (>50% of all mail) CCLRC does bounce some mail that is most clearly SPAM. SPAM is tagged with a code giving a ‘likelihood’ of SPAM. Can set-up your own filter. See CLEO pages at:

Fighting SPAM

Security Responsibilities. CG apply anti-virus updates and patches on machines for which we are responsible.. –Also checking logs; disabling redundant users; checking backups; following up security advisories; ….. Both of these mechanism need to be applied to laptops & home PCs. –E.g. provision of Sophos for home systems with CDs Prepared by PC Support, we make available bi-monthly. Managers of machines CG does not support must carry out these tasks themselves. The old PC in the corner of the lab is not free. It too must be patched and checked.

Problem on HEPNTS8. Significant Outage of two days on 10/11 November. Cause not completely understood. –Corruption of system disk on file server. Remedial efforts: –Reduce chance of re-occurrence: Will not break/re-make mirror. –Reduce time to recover if this were to happen again. Small change to backup scheme. Make online copy of (current) users areas. Windows XP desktops configured slightly differently (Exceed configuration cached locally).