What do you know about your network Or maybe you don’t know who’s really there.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

The Approach to Security in CLRC Gareth Smith With acknowledgements to all the members of the CLRC Computer Network and Security Group, especially Trevor.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Routing Basics By Craig Lindstrom. Overview Routing Process Routing Process Default Routing Default Routing Static Routing Static Routing Dynamic Routing.
Network Security In Education A Balancing Act Doug Klein CTO Vernier Networks, Inc.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
1 The Spread of the Sapphire/Slammer Worm D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver Presented by Stefan Birrer.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Desktop Security: Worms and Viruses Brian Arkills, C&C NDC-Sysmgt.
Internet Review Academic Talent Search. All About Networking DevicesDevices Packet TransferPacket Transfer HardwareHardware SoftwareSoftware Wiring/CablingWiring/Cabling.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Unit 2 - Hardware Computer Security.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
70-411: Administering Windows Server 2012
Honeypot and Intrusion Detection System
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
Orphaned Servers and Broken Processes 2007 Security Professionals Conference April 12, 2007.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Security at NCAR David Mitchell February 20th, 2007.
Senior Project Ideas: Blind Communication & Internet Measurements Mehmet H. Gunes.
CPT 123 Internet Skills Class Notes Internet Security Session A.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
LECTURE ON IP Addressing. What is Networking? –by ‘computer network’ we mean the interconnection between different computers. Why Networking? –to share.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
Small Business Security Keith Slagle April 24, 2007.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Ten Common Computer Problems That Can Easily Be Fixed By: Sam Merrifield.
Operating Systems Proj.. Background A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections.
Agenda Last class: Network Protocols Today: Wireless Technology –How do computers talk to each other… with no wire connecting them?
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
A guide to file sharing on Windows XP Peer to Peer File Sharing.
Don’t let them catch your computer!!!!!
IP Addressing.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Don’t talk to people that you don’t know online. What would you do if someone that you don’t know threatens you? Call the police or tell a parent!! Be.
Joe Knight’s Company VPN Policy. What is VPN? Virtual Private Network (VPN) will allow you all as users to remote into the network from home or anywhere.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Dynamic Domain Name System
Internet Protocol Address
TECHNOLOGY GUIDE THREE
Academic Talent Search
Unit 5: Providing Network Services
Introduction to Networking
Introducing To Networking
Firewalls.
Unit 27: Network Operating Systems
Information Security Session October 24, 2005
Firewalls Routers, Switches, Hubs VPNs
Windows Firewall Adem Enes POLAT
Read this to find out how the internet works!
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

What do you know about your network Or maybe you don’t know who’s really there

October 2004 By Dennis Peasley CISSPDigital Government Who Controls Your Security Priority Vendors and Magazines control what people are talking about when it comes to Information Security Vendors and Magazines control what people are talking about when it comes to Information Security Each one is trying to sell you something Each one is trying to sell you something Each one selling a technology or service Each one selling a technology or service

October 2004 By Dennis Peasley CISSPDigital Government What is important to you Every device on your network can be a vulnerability Every device on your network can be a vulnerability Every Device is active Every Device is active In most cases, every device can talk to every other device. At least locally In most cases, every device can talk to every other device. At least locally What devices are on your network? What devices are on your network?

October 2004 By Dennis Peasley CISSPDigital Government IP, Internet Protocol Because we all use the Internet Protocol now, everything is connected Because we all use the Internet Protocol now, everything is connected The Sapphire Worm was the fastest computer worm in history. As it began spreading throughout the Internet, it doubled in size every 8.5 seconds. It infected more than 90 percent of vulnerable hosts within 10 minutes. The Sapphire Worm was the fastest computer worm in history. As it began spreading throughout the Internet, it doubled in size every 8.5 seconds. It infected more than 90 percent of vulnerable hosts within 10 minutes.

October 2004 By Dennis Peasley CISSPDigital Government The Key to Vulnerabilities No Operator inter-action needed No Operator inter-action needed As fast as the network allows As fast as the network allows Who is on your network Who is on your network

October 2004 By Dennis Peasley CISSPDigital Government Who’s on your network Plenty of Dynamically Provided Addresses Plenty of Dynamically Provided Addresses No requirements needed to get an address No requirements needed to get an address No membership or authorization needed No membership or authorization needed Microsoft Domains are not a block Microsoft Domains are not a block

October 2004 By Dennis Peasley CISSPDigital Government Who is on Your Network? In 2003 Herman Miller Inc. won the RSA conference, Best Security Practice of the year, for preventing a computer without up-to-date Anti-Virus remotely accessing the network. In 2003 Herman Miller Inc. won the RSA conference, Best Security Practice of the year, for preventing a computer without up-to-date Anti-Virus remotely accessing the network. We have been infected with each of the major Worms since then. We have been infected with each of the major Worms since then. What’s up with That? What’s up with That?

October 2004 By Dennis Peasley CISSPDigital Government Worms and Virus August 2003 –Blaster August 2003 –Blaster May Sasser emerged May Sasser emerged Each of these worms found hosts on our network that we did not know existed. Each of these worms found hosts on our network that we did not know existed. We began a one year search for computers we did not know were on our network. We began a one year search for computers we did not know were on our network.

October 2004 By Dennis Peasley CISSPDigital Government Check with the vendors Most major vendors said they could find every computer on our network. Most major vendors said they could find every computer on our network. The key is how fast. The key is how fast. Many laptops, many computers turned On and Off Many laptops, many computers turned On and Off How big is your address range How big is your address range We use 10.x.x.x - 16,777,214 possible host addresses We use 10.x.x.x - 16,777,214 possible host addresses

October 2004 By Dennis Peasley CISSPDigital Government Too many places to scan All of these addresses are not live All of these addresses are not live But who do we believe when we decide not to check them But who do we believe when we decide not to check them Gota check’em all Gota check’em all

October 2004 By Dennis Peasley CISSPDigital Government Who talks to Who Routers talk to all of them Routers talk to all of them They can tell you of every one who talks to anyone else on the network They can tell you of every one who talks to anyone else on the network Ask the routers who’s there Ask the routers who’s there They know every computer that talks on the network They know every computer that talks on the network With this information you can find your network occupants With this information you can find your network occupants

October 2004 By Dennis Peasley CISSPDigital Government Find Them – Scan Them We scanned each host looking for Windows but no Anti-Virus program We scanned each host looking for Windows but no Anti-Virus program We found computers that we couldn’t talk to. We did not have rights. We found computers that we couldn’t talk to. We did not have rights. Policies? Do your Windows System administrators have the right to access all client computers. Policies? Do your Windows System administrators have the right to access all client computers. What happens when you find the computers that will be there. What happens when you find the computers that will be there.

October 2004 By Dennis Peasley CISSPDigital Government Each Network has these Unknown Hosts These hosts are: These hosts are: Unmanaged Unmanaged Unpatched? Unpatched? Not backed up Not backed up Running unknown software Running unknown software Running unknown services Running unknown services Waiting to be used by the next worm Waiting to be used by the next worm Where are the real risk’s Where are the real risk’s

October 2004 By Dennis Peasley CISSPDigital Government Vendor’s and Magazine’s There are many risk’s running a modern technology ecology. There are many risk’s running a modern technology ecology. The risks will never go away. The risks will never go away. Set the priorities Set the priorities Where will you focus your teams Where will you focus your teams

October 2004 By Dennis Peasley CISSPDigital Government Security is like Quality Security must be built in Security must be built in Security must be part of all management Security must be part of all management Security must have measurable goals Security must have measurable goals Operations teams are not usually measured by quality or security Operations teams are not usually measured by quality or security Separation of duties makes sense Separation of duties makes sense Security should be equal to operations, development and Infrastructure Security should be equal to operations, development and Infrastructure OR outside of IT OR outside of IT