PPD & CLRC's response to the (IS) Security Threat Gareth Smith PPD/CG Christmas Lectures 2002.

Slides:



Advertisements
Similar presentations
The Approach to Security in CLRC Gareth Smith With acknowledgements to all the members of the CLRC Computer Network and Security Group, especially Trevor.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Computer Networks IGCSE ICT Section 4.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Fermi Computer Incident Response Team Computer Security Awareness Day March 8, 2005 Michael Diesburg.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Governance Jym Bates Head of Information Assurance.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Chapter 7: Using Windows Servers to Share Information.
Laptops and Computer Security Gareth Smith. Current Situation in PPD Standardised on Dells (D400, D600) Total bought to date by department: ~50. Loan.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
PPD Computing “Business Continuity” Windows and Mac Kevin Dunford May 17 th 2012.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Internet Security facilities for secure communication.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
PPD Computing “Business Continuity” David Kelsey 3 May 2012.
Kevin Dunford – Windows Support & Development What do I do.. Support, configuration, and development of - Windows servers, desktops, Laptops, printers,
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Simplifying the Configuration of Student Laptops — StirlingVPNSetup Simon Booth University of Stirling Laptop Forum 27th June 2006.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Mobile Computing for Mac Users By Alan Doo PPD Christmas Lectures 2009.
Introduction to Student Name Student Class.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
IT in Business Issues in Information Technology Lecture – 13.
Module 11: Designing Security for Network Perimeters.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Gareth Smith RAL PPD RAL PPD Site Report. Gareth Smith RAL PPD RAL Particle Physics Department Overview About 90 staff (plus ~25 visitors) Desktops mainly.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
Information Systems Unit 3.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Gareth Smith RAL PPD HEP Sysman. April 2003 Security Changes at RAL.
Security Issues Introduction.. Security All the connectivity schemes you will hear about have security implications. –4 computer security incidents in.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computer Security Sample security policy Dr Alexei Vernitski.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security Keeping you and your computer safe in the digital world.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Introduction to Systems Security
What is Information Security?
GDPR (General Data Protection Regulations) -What do we know about it?
Presentation transcript:

PPD & CLRC's response to the (IS) Security Threat Gareth Smith PPD/CG Christmas Lectures 2002

Christmas 2002PPD\Computing Group2 Anti-Virus - move to Sophos. Move from Network Associates to Price & Support issues As before: Managed from central console. Set to scan PCs at 05:00 each morning, and midday Wednesday. CG automatically notified ( ) if virus found.

Christmas 2002PPD\Computing Group3 Anti-Virus at Home “1 in 30 s has a virus” If you handle and do not have up-to-date anti-virus protection – you have an infected PC. Our Sophos Licence covers your home PC. CD in preparation Not as easy as some other A-V products to update at home.

Christmas 2002PPD\Computing Group4 Home Users To connect in (via dial-up or PPTP) you are required to have both an up-to-date anti-virus program and a personal firewall on your PC We have purchased copies of Zone Alarm personal firewall if you need them.

Christmas 2002PPD\Computing Group5 Firewall and Remote Users Ways into the lab from a remote system: Bastion Host Dial-in to RAL RAS service. Use the PPTP server. htm

Christmas 2002PPD\Computing Group6 Use of PPTP (Point to Point Tunnelling Protocol) RAL Remote network Internet firewall

Christmas 2002PPD\Computing Group7 Use of PPTP (Point to Point Tunnelling Protocol) RAL Remote network Internet firewall Pptp01.rl.ac.uk

Christmas 2002PPD\Computing Group8 Security Updates For windows systems Update Expert – for desktop Windows systems in PPD. Windows Update – for laptops. If you manage a system (e.g. a LINUX system) – you are required to ensure it is up-to-date with all relevant security patches.(E.g. use autoRPM.)

Christmas 2002PPD\Computing Group9

Christmas 2002PPD\Computing Group10 SPAM mail If (when ?) you receive SPAM mail, which may be offensive – don’t panic! Do NOT reply to it (even if it says “ send a mail to …. if you wish to be taken off this list”) Move to the ‘#SPAM’ folder. Beware of Hoax mails Do not believe anything that says “…. Pass this on to all your colleagues”. If in doubt ask CG or CLEO (ext 5730)

Christmas 2002PPD\Computing Group11

Christmas 2002PPD\Computing Group12 ‘Nigerian’ or ‘419’ Scam Letter, typically involving someone in an African country, asking with assistance to gain access to a sum of money. Do not reply – move mail to ‘Nigerian Scam’ folder. May send paper letters or , and may target church groups & charities. See

Christmas 2002PPD\Computing Group13 Your Responsibilities Awareness of security issues. Appropriate Use of CLRC resources. Correctly managed systems. CLRC Security Policy CLRC Codes of Conduct CLRC Incident procedures See the PPD introduction to this at: _Intro.html

Christmas 2002PPD\Computing Group14 Bureaucracy….. Data Protection Act Freedom of Information Act Regulation of Investigatory Powers (RIP) Act Anti-Terrorism, Crime & Security Act “As a matter of policy, CCLRC will comply with the provisions of the RIP Act. CCLRC will monitor the use of JANET and CCLRC internal telecommunications networks, both to provide assurance that CCLRC staff (and users of CCLRC facilities) are complying with the acceptable use policy and to ensure that there is no illegal use of these networks.”

Christmas 2002PPD\Computing Group15 Passwords Secure Not saved in an obvious place Of good enough quality (CLRC ‘rules’) Including passphrases used to protect certificates. Phasing out ‘clear text’ passwords over the network. Telnet into site will be blocked from 1 st Feb Anticipate FTP block.

Christmas 2002PPD\Computing Group16 When IT All Goes Wrong…. Ensure important files are saved on disks that are backed up. E.g. H: drive on Windows desktops Unix home file system, AFS home file system Etc. CG have (and are improving) disaster recovery plans