WINS Monthly Meeting 5/7/2004 WINS Monthly Meeting 5/7/2004.

Slides:



Advertisements
Similar presentations
By Hiranmayi Pai Neeraj Jain
Advertisements

Benefits of CA Technology & HVB Bank Romania Study Case Bucharest, May 31, 2005.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
How PNNL Manages Windows Desktops 1 Will Jorgensen.
Fortinet Single Sign On
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
hotEx RADIUS Manager Installation
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
OpStor - A multi vendor storage resource management and capacity forecasting software.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
EDUCAUSE Security 2006 Internet John Brown University.
Desktop Security: Worms and Viruses Brian Arkills, C&C NDC-Sysmgt.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
W HAT DOES EXPLOIT MEAN ? A ND THE S ASSER WORM Seminar on Software Engineering, Short Presentation Christian Gruber.
September 29, 2009Computer Security Awareness Day1 Fermilab.
Honeypot and Intrusion Detection System
ITServices Virtualization Terry Black January 2013.
NuolSec VIspace Vientiane, Laos.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Retina Network Security Scanner
WINS Monthly Meeting WINS Support (610) /06/2011
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
NetTech Solutions Protecting the Computer Lesson 10.
WINS Monthly Meeting 10/1/2004 WINS Monthly Meeting 10/1/2004.
WINS Monthly Meeting www2.widener.edu/wins 4/1/2005 WINS Monthly Meeting www2.widener.edu/wins 4/1/2005 www2.widener.edu/wins.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /03/2009 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /05/2008 www2.widener.edu/wins
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
WINS Monthly Meeting www2.widener.edu/wins 11/4/2005 WINS Monthly Meeting www2.widener.edu/wins 11/4/2005 www2.widener.edu/wins.
0wning the koobface botnet. intro web 2.0 botnet spreads through social networks –facebook –myspace –twitter, etc.
WINS Monthly Meeting www2.widener.edu/wins 5/5/2006 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins 10/7/2005 WINS Monthly Meeting www2.widener.edu/wins 10/7/2005 www2.widener.edu/wins.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /07/2008 www2.widener.edu/wins
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /04/2011 www2.widener.edu/wins
Backup Exec System Recovery. 2 Outline Introduction Challenges Solution Implementation Results Recommendations Q & A.
WINS Monthly Meeting www2.widener.edu/wins 2/4/2005 WINS Monthly Meeting www2.widener.edu/wins 2/4/2005 www2.widener.edu/wins.
Computer virus Done: Aaesha Mohammed ID: H
WINS Monthly Meeting www2.widener.edu/wins 10/05/2006 www2.widener.edu/wins
WINS Monthly Meeting 02/04/2011
WINS Monthly Meeting 4 /2/2004 WINS Monthly Meeting 4 /2/2004.
WINS Monthly Meeting www2.widener.edu/wins 03/02/2007 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /06/2009 www2.widener.edu/wins
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
© 2006, iPolicy Networks, Inc. All rights reserved. Security Technology Correlation Proneet Biswas Sr. Security Architect iPolicy Networks
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
WINS Monthly Meeting 02/07/2003 WINS Monthly Meeting 02/07/2003.
Uncommon Disasters Require both offsite backup and DR plan  Theft  Fire  Flood  Earthquake  Tornado  Terrorist Attack Examples: Katrina, Southern.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Working at a Small-to-Medium Business or ISP – Chapter 8
Virus Protection Update
WINS Monthly Meeting www2. widener. edu/wins internet2
WINS Monthly Meeting www2. widener. edu/wins internet2
Technology Update TSAG Meeting 5/11/04.
WINS Monthly Meeting www2. widener. edu/wins widener
Information Security Session October 24, 2005
Time Gathering Systems Secure Data Collection for IBM System i Server
Configuration Of A Pull Network.
WINS Monthly Meeting www. widener. edu/wins internet2
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

WINS Monthly Meeting 5/7/2004 WINS Monthly Meeting 5/7/2004

Agenda Introductions Introductions Sasser Worm Sasser Worm SANS SANS SAN Presentation SAN Presentation Fortinet Garnet Valley Update Fortinet Garnet Valley Update Summer Activities Summer Activities Question & Answers Question & Answers

Introductions Name Name Title Title Location Location

Sasser Worm This self-executing worm spreads by exploiting a Microsoft Windows vulnerability [MS vulnerability (CAN )] This self-executing worm spreads by exploiting a Microsoft Windows vulnerability [MS vulnerability (CAN )] The worm spreads with the file name: avserve.exe. Unlike many recent worms, this virus does not spread via . No user intervention is required to become infected or propagate the virus further. The worm works by instructing vulnerable systems to download and execute the viral code. The worm spreads with the file name: avserve.exe. Unlike many recent worms, this virus does not spread via . No user intervention is required to become infected or propagate the virus further. The worm works by instructing vulnerable systems to download and execute the viral code. For manual protection, it may be advisable to block TCP ports 139, 445, 5554, and 9996 at network gateways. Patches highlighted in Microsoft Security Bulletin MS address the issue exploited by Sasser. For manual protection, it may be advisable to block TCP ports 139, 445, 5554, and 9996 at network gateways. Patches highlighted in Microsoft Security Bulletin MS address the issue exploited by Sasser.

SANS Disaster Recovery Disaster Recovery Server Back-up Server Back-up 30 servers and 500 GIG per district? 30 servers and 500 GIG per district? What can we afford? What can we afford? DAS – NAS – Fiber CH SAN – IP SAN DAS – NAS – Fiber CH SAN – IP SAN How to best use the district fiber backbone? How to best use the district fiber backbone?

SAN Presentation DCIU working with Dell Brent Bailey DCIU working with Dell Brent Bailey Brent will meet with me to discuss Brent will meet with me to discuss Tim Slattery of CNI introduced : Tim Slattery of CNI introduced : Lefthand Networks IP SAN Solution Lefthand Networks IP SAN Solution ePlus - Nick D'Archangelo Presents ePlus - Nick D'Archangelo Presents

Fortinet Garnet Valley Update Cutover unsuccessful due to port tagging config Cutover unsuccessful due to port tagging config Lab testing at Widener with Fortinet Lab testing at Widener with Fortinet Properly configured Fortigate to resolve tagging Properly configured Fortigate to resolve tagging Resolved Transparent Mode IP management Resolved Transparent Mode IP management Resolved Spanning Tree issues Resolved Spanning Tree issues Ready to return the week of the May 11 th Ready to return the week of the May 11 th Stay tuned!! Stay tuned!!

Summer Activities Nortel 8600 Upgrade Nortel 8600 Upgrade 64 M on CPU replaced with 256 M SIMM 64 M on CPU replaced with 256 M SIMM Software upgrade to (now 3.2.1) Software upgrade to (now 3.2.1) Shasta 3 rd Generation Testing Shasta 3 rd Generation Testing DCIU Sidewinder FW install ( today ) DCIU Sidewinder FW install ( today )

Questions & Answers Next Meeting Friday June 4th! Next Meeting Friday June 4th!