Security Infrastructure Panel: Implications for Network Engineering  Dave Dittrich, U. Washington  Gary Dobbins, Notre Dame  Gerry Sneeringer, U. Md.

Slides:



Advertisements
Similar presentations
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Protection of Information Assets I. Joko Dewanto 1.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Separate Domains of IT Infrastructure
1 © 2003 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID THE NETWORK SECURITY CHALLENGE Jack Suess CIO University of Maryland Baltimore.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
Firewalls & VPNs Terry Gray UW Computing & Communications 13 September 2000.
IT Security Policies and Campus Networks Translating security policy to practical campus networking Sara McAneney IT Security Officer Trinity College Dublin.
1 Firewalls and VPNs at Stanford: August 22, 2003 Steve Tingley & Sunia Yang Networking Systems.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Security in the post-Internet era: the needs of the many the needs of the few Terry Gray University of Washington Fall Internet2 Meeting 16 October 2003.
Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
University of Maryland I.T. Security Gerry Sneeringer IT Security Officer
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Network Security and Personally Managed Computers Jordan K. Wiens Copyright Jordan K. Wiens 2004.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Network Perimeter Security Yu Wang. Main Topics Border Router Firewall IPS/IDS VLAN SPAM AAA Q/A.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
VoIP Security Assessment Service Mark D. Collier Chief Technology Officer
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Audit Challenges and Best Practices in a Research University Environment NSAA Annual Conference Jeffrey Huskamp Vice President and CIO.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
UNL Network Security Zac Reimer Network Security Analyst UNL Information Services
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Joseph Ferracin Director IT Security Solutions Managing Security.
PROCESS OF CONDUCTING A DOS/IDS INCIDENT ANALYSIS
Howard Pincham, MCITP, CISSP Database and Compliance Engineer Hyland Software, Inc.
Configuring Electronic Health Records Privacy and Security in the US Lecture f This material (Comp11_Unit7f) was developed by Oregon Health & Science University,
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Madison Security Systems. Computer Viruses Types of Viruses  Nuisance Viruses  Data-Destructive Viruses  Espionage Viruses  Hardware-Destructive.
Northland Security Systems. Computer Viruses Types of Viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
U of Maryland, Baltimore County Risk Analysis of Critical Process –Financial Aid Adapted STAR model –Focus on process and information flow –Reduced analysis.
Security at NCAR David Mitchell February 20th, 2007.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
VolNet2 Bill White Network Services. September 20, 2004OIT Fall Staff Meeting Why Volnet2? Based on the Security Assessment findings Insecure protocols.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Note1 (Admi1) Overview of administering security.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Network Security. Announcements Review Assignment - Assessment 3 (due Tuesday, before class) Assessment 3 – Next Thursday Reminders: Network Design Project.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
High-Performance Applications in a Secure Environment Michael Tepedino.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Information Security: Current Threats Marc Scarborough Information Security Officer
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
 Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive viruses.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Network security Vlasov Illia
Chapter 1 Introduction to Networking
Strategy for Complex Networking, IT, & Telecommunication Decisions
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Working at a Small-to-Medium Business or ISP – Chapter 8
Server Concepts Dr. Charles W. Kann.
Identity & Access Management
Implementing Client Security on Windows 2000 and Windows XP Level 150
6. Application Software Security
Presentation transcript:

Security Infrastructure Panel: Implications for Network Engineering  Dave Dittrich, U. Washington  Gary Dobbins, Notre Dame  Gerry Sneeringer, U. Md - College Park  Jack Suess, U. Md. - Baltimore County

Institutional Differences  Big difference in size  Big difference in complexity  Big difference in degree of centralization  Less difference in staffing

Security Concerns  Securing Windows, DoS attacks - wash  User practices, policy formation, policy adherence, vendor products, and security products that scale - ND  Access controls/IDS at Gigabit speed, coordinating decentralized admins, Resnet - UMCP  Increasing security requirements (HIPAA/GLB), disaster recovery and contingency planning, host security - UMBC

Border Security  All but UW use ACL’s, UW is open  UMBC implementing border firewalls  ND and UMCP are researching firewall Is there value in border firewalls?

Interior Network Security  Interior firewall for sensitive areas  UW uses logical firewall  Snort IDS used by all but UW  Security VLAN’s being implemented by UMBC  VPN available by all Should security model be 1-size fits all? Who is responsible for interior security?

Wireless Security  All run open wireless networks  All encourage VPN  UW prototyping UW-only  UMCP implementing Veneer  UMBC moving to limit unauth wireless How are campuses architecting wireless? Is authentication critical?

Host Application Security  Cooperation among security, networks, and sysadmins is critical  Host firewalls being used by all  All encourage encryption to varying degrees  Virus scanning is done to some degree by all How do you get cooperation among groups? How do you encourage encryption? How do you encourage Host firewalls?

Recent Security Problem and Cause Discuss a recent or upcoming security problem  Windows - poor user passwords  SQL Slammer  Hacks for spamming, students paid to spam  Sendmail buffer overflow Does security staff handle RIAA or Spam complaints? How is policy developed?

Questions and URL’s Campus Security URL’s   Itsecurity.umd.edu   QUESTIONS???