Information Assurance Program Manager U.S. Army Europe and Seventh Army Information Assurance in Large-Scale Practice International Scientific NATO PfP/PWP.

Slides:



Advertisements
Similar presentations
Incident Response Managing Security at Microsoft Published: April 2004.
Advertisements

FIREWALLS Chapter 11.
Information Assurance Efforts at the Defense Information Systems Agency & in the DoD Richard Hale Information Assurance Engineering Defense Information.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Chapter 12 Network Security.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
The Way Ahead for Information Systems Security: What You Don’t Know Can Hurt You Christopher Baum Research Vice President Global Government NYSCIO Conference.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Information Security in Real Business
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Stephen S. Yau CSE , Fall Security Strategies.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Network security policy: best practices
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Network and WiFi By: Clara-Hannah S., Amelia H., and Margot d’I.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Securing Microsoft® Exchange Server 2010
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Module 14: Configuring Server Security Compliance
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Auditing Information Systems (AIS)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
IS Network and Telecommunications Risks Chapter Six.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Small Business Security Keith Slagle April 24, 2007.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Module 11: Designing Security for Network Perimeters.
HP World September 2002 Scott S. Blake, CISSP Vice President, Information Security BindView Corporation Vulnerability Assessment and Action.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
5/18/2006 Department of Technology Services Security Architecture.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
IS3220 Information Technology Infrastructure Security
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Managed IT Services JND Consulting Group LLC
Cybersecurity - What’s Next? June 2017
Team 1 – Incident Response
Critical Security Controls
Security Standard: “reasonable security”
Firewalls.
Security in Networking
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
Chapter 9 E-Commerce Security and Fraud Protection
Presentation transcript:

Information Assurance Program Manager U.S. Army Europe and Seventh Army Information Assurance in Large-Scale Practice International Scientific NATO PfP/PWP Conference on Security and Protection Of Information 10 May 2001 Efficiency Security Morale Threat w/ Global Reach

Information Assurance Program Manager U.S. Army Europe and Seventh Army Agenda Network Setting Current Network Defenses Challenges Road Ahead Conclusions

Information Assurance Program Manager U.S. Army Europe and Seventh Army UK(2) Balkans(6) Setting: USAREUR NIPRnet ca. 50,000 systems in 2,000 LAN over 200 public websites 35 Gateways to... - Department of Defense networks - the Internet Wide Area Network managed and secured by 5 th Signal Command Regional Campus Area Networks serviced by six Signal Bns Local Area Networks often operated by individual military units Non-classified Internet Protocol Routed Network (NIPRnet)

Information Assurance Program Manager U.S. Army Europe and Seventh Army Setting: Security Implications Internet Connectivity +Essential for logistics (commercial purchases) +Desirable for soldier morale and welfare –Exposes network to exploitation, viruses, and hackers Decentralized management (LAN) +Services are tailored to individual unit needs +Commanders balance their mission and risk –Consistent compliance with security policies is hard to ensure –Network is as secure as the weakest link Threat w/ Global Reach

Information Assurance Program Manager U.S. Army Europe and Seventh Army Knowledgeablepeople Bite-sized Policies - keep up with dynamic environment - established by a Council of Colonels - guide network, server, and user-level actions IA Vulnerability Alerts (IAVA) - warn of weaknesses is operating systems - mandate acknowledgement and compliance with fixes IA Training Program (IATP) - Two-four weeks of network, security fundamentals - Systems Administrators, others w/ elevated rights Computer User Testing and Agreement - Must pass to have /network account - A security awareness tool Data Network Protection 1 – Policy and Program Common Security Standards

Information Assurance Program Manager U.S. Army Europe and Seventh Army UK(2) Balkans(6) Data Network Protection 2 - Perimeter at the 35 Gateways... Security Routers block: - known hacker tools - unused/unauthorized services - selected geographic regions - previous sources of probes Intrusion Detection Systems: - monitored 24hrs/7days - DETECT dangerous activity Regional Computer Emergency Response Team-Europe (RCERT): - REACT to isolate / mitigate damage - teamwork with units, CID, CI Some Hacker Threat Blocked Some Minimize Exposure

Information Assurance Program Manager U.S. Army Europe and Seventh Army Further Reduce Exposure Gateway Critical Servers Client PC Customer Routers & Firewalls Data Network Protection 3 – Campus & Local Area Network Tools FocusedProtection Tailored Access Control Lists Strict Configuration Management - secure baselines provided by RCERT - compliance with all IA Vulnerability Alerts Firewalls and Virtual Private Networks: - RCERT assists planning and initial installation and configuration Host-based Intrusion Detection Regular Anti-virus and Vulnerability Scans Basics: Certification and accreditation; strong passwords; up-to-date anti-virus; no back-door connections; only approved software, etc.

Information Assurance Program Manager U.S. Army Europe and Seventh Army Network Protection Challenges Configuration Control Hard to do Units are inconsistent in meeting standards Hackers exploiting known vulnerabilities with identified fixes Application of IA Tools Limited progress below the network perimeter Most units have not yet made plans to add them Not enough experts if all units requested them now Not enough personnel resources for all IT/IA tasks; Inadequate inspections and checks on units; Anticipated network growth demands even more of decentralized security capability

Information Assurance Program Manager U.S. Army Europe and Seventh Army Road Ahead: Simplified Configuration Compliance Make secure baselines easier to apply Provide matrices of known vulnerabilities by operating system and application – together with sources of fixes and ways to verify Develop automated tools to assist units to securely configure new systems and check their own compliance with our standards OS App Win2kWin NTSolaris Work Station Exch Server Web Server Load Test

Information Assurance Program Manager U.S. Army Europe and Seventh Army 22 Network Service Centers - focus on Local Area Networks - help units apply security tools, identify vulnerabilities 6 Network Ops & Security Centers - manage Campus Area Networks - support warfighting headquarters - visibility into network security status - enforce security compliance Full-time IA specialists in most centers, bringing security together with Network Management and Info Dissemination Management Information Dissemination Management Information Assurance Network Management Road Ahead: Regional Network Operations

Information Assurance Program Manager U.S. Army Europe and Seventh Army Conclusions For network security – just like combat – large organizations require decentralized decisions and actions, but common vision and standards: –Network security specialists available in all areas of the organization –Security standards that are simple to meet (not to be confused with simple standards) –Checks to enforce common standards Network Security must be embedded in network operations