1 The 2006 ResNet Security Survey ResNet Applied Research Group David Futey Kevin Guidry December 15, 2006.

Slides:



Advertisements
Similar presentations
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Advertisements

5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
Guide to Network Defense and Countermeasures Second Edition
1 SANS Technology Institute - Candidate for Master of Science Degree 1 SIEM Based Intrusion Detection Jim Beechey March 2010 GSEC Gold, GCIA Gold, GCIH,
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
COMPUTER SKILLS FOR HISTORY TEACHERS * Pressing F1 = HELP *
Chapter 7 HARDENING SERVERS.
University of California, Davis1 Draft Wireless Network Policy Administrative Computing Coordinating Council September 10, 2001.
Electrical Engineering Department Software Systems Lab TECHNION - ISRAEL INSTITUTE OF TECHNOLOGY Meeting recorder Application based on Software Agents.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Chris Sfanos Program Manager Forefront Client Security Microsoft Session Code: SW17.
Lesson 19: Configuring Windows Firewall
Payment Card Industry (PCI) Data Security Standard
Advanced Internet Bandwidth and Security Strategies Fred Miller Illinois Wesleyan University.
IT Security Research Briefing: EDUCAUSE Center for Applied Research (ECAR) and ResNet Applied Research Group Moderated by: Rodney Petersen Featured Speakers:
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Charles Benjamin.
Delivery at the University of Guelph. Background flow has dramatically increased in the past few years (~2,000,000 msgs/week) This increase.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Client – Server Architecture A Basic Introduction Kathleen R. Murray, Ph.D. May 2002.
FTP. SMS based FTP Introduction Existing System Proposed Solution Block Diagram Hardware and Software Features Benefits Future Scope Conclusion.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
CERN’s Computer Security Challenge
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Windows 7 Firewall.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 11: Remote Access Fundamentals
Module 8: Configuring Network Access Protection
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
The 2005 ResNet Survey Strategic Comprehensive Relevant David Futey, Stanford University Kevin Guidry, ResNet Applied Research Group October 3, 2005 ©
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Configuring Network Access Protection
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Lesson 11: Configuring and Maintaining Network Security
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Module 7: Implementing Security Using Group Policy.
Discussion What information did you hear today that point to areas of success and accomplishments? Were there survey results that suggest areas where more.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Managing Applications, Services, Folders, and Libraries Lesson 4.
NetTech Solutions Protecting the Computer Lesson 10.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
NETWORKING & SYSTEM UPDATES
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Client – Server Architecture A Basic Introduction 1.
Role Of Network IDS in Network Perimeter Defense.
Module 8 Implementing Security Using Group Policy.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
©Richard L. Goldman Public Key Policies for Windows 2000 ©Richard Goldman December 5, 2001.
Group Policy in Windows Vista. Group Policy Administration Group Policy with Windows Vista QoS Policies What Will We Cover?
Cryptography and Network Security
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Guest Wireless Service Overview Andrew Rader November, 2013.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Module Overview Installing and Configuring a Network Policy Server
THE STEPS TO MANAGE THE GRID
Firewalls.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Securing Windows 7 Lesson 10.
Presentation transcript:

1 The 2006 ResNet Security Survey ResNet Applied Research Group David Futey Kevin Guidry December 15, 2006

2 Introduction Background References ResNet Applied Research Group (RARG) 2006 ResNet Survey development Placing the survey results in context 2006 ResNet Security Survey overview

3 Background Continuing evaluation of security Security Vulnerability Survey Assess readiness for Fall respondents 2005 ResNet Survey Security component 224 respondents 2006 Security Survey 101 respondents

4 References RARG research Get Connected: An Approach to ResNet Services EDUCAUSE Quarterly, No. 4, ResNet Survey Results: A Baseline Analysis EDUCAUSE Center for Applied Research, bulletin Issue 20,

5 ResNet Applied Research Group History Formed August 2004 Volunteer group within ResNet organization Present & Past (*) Members Carol Anderer, University of Delaware *Kevin Bullard, UNC-Greensboro David Futey, ResNet Applied Research Group *Jan Gerenstein, Northern Illinois University Kevin Guidry, Sewanee: University of the South Clifton Pee, Azusa Pacific University Erica Spencer, Baylor University

6 Assistance Question creation and review Pilot survey Support received from: ResNet Listserv members Security Task Force: Effective Practices Group Internet2/SALSA-NetAuth 2006 Survey Development

7 Survey Results in Context

8 Top “Current” Challenges from 2005 ResNet Survey Question 77

9 Top “Future” Challenges from 2005 ResNet Survey Question 78

10 Network Registration Tools 2004 ResNet Vulnerability Survey 85% use a tool to register student computers 2005 ResNet Survey 74% use a tool to register student computers 2006 ResNet Security Survey 83% use a tool to register student computers

11 Student Machine Vulnerability Evaluation 2004 ResNet Vulnerability Survey 69% use a tool to evaluate student's computer 2005 ResNet Survey 71% use a tool to evaluate student computers 2006 ResNet Security Survey 60% use a tool to passively evaluate student computers 42% use a tool to actively evaluate student computers

12 QOS 2005 ResNet Survey Practicing packetshaping or Quality Of Service (Y=84%) 2006 ResNet Security Survey Practicing packetshaping or Quality Of Service (Y=86%)

13 Key Points of 2006 ResNet Security Survey

14 Who is responsible for setting and enforcing policies? Questions 6-7 (2006) Number of respondents

15 How is policy decided? A vast majority of respondents (94%) indicated that their institution blocks, filters, or otherwise restricts network services for security purposes. (Q.8, N=101) (85% in 2005 ResNet Survey) A majority of respondents, (78%) either entirely or in part, base their decision to filter, block, or restrict on published best practices from professional security groups. (Q.14, N=95) Service License Agreements and Internal IT Security Expertise were the other predominate factors, besides the published best practices, that impacted the decision to block, filter, or restrict. (Q.14a)

16 Policy enacted.. In the event of an unexpected security incident, Central IT (50%), Security (25%), and Networking (18%) had authority to request immediate action.(Q.13, N=95) Central IT (52%), Networking (18%), and Security (17%) are primarily responsible for determining what services, ports or protocols are blocked, filtered, or restricted.(Q.12, N=95)

17 What services are blocked? Sampling from Question 9-11 Questions 9-11 looked at what services were blocked if the traffic was inbound to the ResNet network, outbound from the ResNet network, or remained internal to the ResNet Network. Please review the questions for specifics. Non-established services coming into the ResNet network are blocked (Q.9, 48%, N=90) Services with high percentages of not being blocked include FTP, Instant messaging, IRC, VoIP, IPSec, gaming, and console gaming. SMTP and Windows File and Print Sharing had high percentages of 'Always' being blocked, inbound and outbound

18 Does your institution require protective software be installed and is that software provided by the institution? Questions 22 & 23 (2006) Number of respondents, N=101

19 Wireless A majority of respondents, 74%, do not allow students to install personally-owned access points. (Q.31, N=98) (60% in 2005 ResNet Survey) Wireless installations in residences are (Q.32, N=97) : Not provided (37%) (46% in 2005 ResNet Survey) Part of overall institution wireless network (47%) Separate from institution wireless network (13%) SSID naming convention and 802.1x were primary security measures used for institutionally managed wireless Nearly (1/5) of respondents provided no security measures

20 Let's Hear From You Suggestions, questions, and comments can be directed to the RARG at: