WINS Monthly Meeting 2/6/2004 WINS Monthly Meeting 2/6/2004.

Slides:



Advertisements
Similar presentations
Spring 2014 RMS/EOC Proctor Caching Training. Agenda 2 Proctor caching overview Downloading & installing Cache test content.
Advertisements

Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Introduction to Security Computer Networks Computer Networks Term B10.
Presented by Serge Kpan LTEC Network Systems Administration 1.
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao
EEC-484/584 Computer Networks Discussion Session for HTTP and DNS Wenbing Zhao
Nasca Internet Networking and Security viruses.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Enterprise Network Security Accessing the WAN Lecture week 4.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Squid Proxy CentOS 6.4 Prepared by : Mr. Sopheap Position : IT Support Location : Deam Computer Date : 24/July/2013.
Norman SecureSurf Protect your users when surfing the Internet.
Current Network Schema Router Internet Switch PC.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
2012 4th International Conference on Cyber Conflict C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) 2012 © NATO CCD COE Publications, Tallinn 朱祐呈.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
--Harish Reddy Vemula Distributed Denial of Service.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Cisco 3 - Switch Perrine. J Page 111/6/2015 Chapter 5 At which layer of the 3-layer design component would users with common interests be grouped? 1.Access.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
The Intranet.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
1 Part VII Component-level Performance Models for the Web © 1998 Menascé & Almeida. All Rights Reserved.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
WINS Monthly Meeting 10/1/2004 WINS Monthly Meeting 10/1/2004.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /03/2009 www2.widener.edu/wins
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /05/2008 www2.widener.edu/wins
WINS Monthly Meeting 5/7/2004 WINS Monthly Meeting 5/7/2004.
WINS Monthly Meeting www2.widener.edu/wins 11/4/2005 WINS Monthly Meeting www2.widener.edu/wins 11/4/2005 www2.widener.edu/wins.
WINS Monthly Meeting www2.widener.edu/wins WINS Support (610) /02/2008 www2.widener.edu/wins
WINS Monthly Meeting 4 /2/2004 WINS Monthly Meeting 4 /2/2004.
WINS Monthly Meeting www2.widener.edu/wins 03/02/2007 www2.widener.edu/wins
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
WINS Monthly Meeting 02/07/2003 WINS Monthly Meeting 02/07/2003.
Deployable Filtering Architectures Against Denial-of-Service Attacks Department of Computer Science University College London Telephone: +44 (0)
Wyoming Technology Readiness February Agenda Wyoming Training - Feb Technology Readiness  Schedule of events  Components and System Requirements.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Proctor Caching and System Check September 4, 2014 Becky Hoeft Conference Number: (877) Conference Pin:
Proctor Caching Overview. 2 Proctor Caching Diagram.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Denial of Service attack in IPv6 networks and Counter measurements
Bentley Systems, Incorporated
The Intranet.
RCS v7 Infection Vectors
Network Security Marshall Leitem 11/30/04
WINS Monthly Meeting www2. widener. edu/wins internet2
Firewalls.
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
Lab 7 – Defeating MALWARE
Communications & Computer Networks Resource Notes - Introduction
Presentation transcript:

WINS Monthly Meeting 2/6/2004 WINS Monthly Meeting 2/6/2004

Agenda IntroductionsIntroductions Mydoom VirusMydoom Virus Content Filter Redirect IssueContent Filter Redirect Issue Statscout MonitorStatscout Monitor DCCC ProjectDCCC Project Spring BreakSpring Break Question & AnswersQuestion & Answers

Introductions NameName TitleTitle LocationLocation

Mydoom Virus is a mass-mailing worm that arrives as an attachment with the file extension.bat,.cmd,.exe,.pif,.scr, is a mass-mailing worm that arrives as an attachment with the file extension.bat,.cmd,.exe,.pif,.scr, or.zip. When a computer is infected, the worm sets up a backdoor into the system by opening TCP ports 3127 through 3198, which can potentially allow an attacker to connect to the computer and use it as a proxy to gain access to its network resources. In addition, the backdoor can download and execute arbitrary files. There is a 25% chance that a computer infected by the worm will perform a Denial of Service (DoS) on February 1, 2004 starting at 16:09:18 UTC, which is also the same as 08:09:18 PST, based on the machine's local system date/time. If the worm does start the DoS attack, it will not mass mail itself. It also has a trigger date to stop spreading/DoS-attacking on February 12, While the worm will stop on February 12, 2004, the backdoor component will continue to function after this date. When a computer is infected, the worm sets up a backdoor into the system by opening TCP ports 3127 through 3198, which can potentially allow an attacker to connect to the computer and use it as a proxy to gain access to its network resources. In addition, the backdoor can download and execute arbitrary files. There is a 25% chance that a computer infected by the worm will perform a Denial of Service (DoS) on February 1, 2004 starting at 16:09:18 UTC, which is also the same as 08:09:18 PST, based on the machine's local system date/time. If the worm does start the DoS attack, it will not mass mail itself. It also has a trigger date to stop spreading/DoS-attacking on February 12, While the worm will stop on February 12, 2004, the backdoor component will continue to function after this date.

Content Filter Redirect Portal – Google, Yahoo, AOLPortal – Google, Yahoo, AOL Cached ImagesCached Images Porn availablePorn available Solution issuesSolution issues Suggestions?Suggestions?

Statscout Monitor Statscout's vastly scalable network performance monitoring software and optional high performance LAN analyzer software, produce informative, easy-to-read, real-time and historical reports on bandwidth utilization, response time congestion and error conditions. Statscout's approach to network performance management delivers a comprehensive view of how the entire network is performing, and provides the ability to track down and fix network problems.Statscout's vastly scalable network performance monitoring software and optional high performance LAN analyzer software, produce informative, easy-to-read, real-time and historical reports on bandwidth utilization, response time congestion and error conditions. Statscout's approach to network performance management delivers a comprehensive view of how the entire network is performing, and provides the ability to track down and fix network problems. Statscout generally appeals to government departments, corporate enterprises or educational facilities with 500 to 100,000 network nodes and a distributed network infrastructure, seeking a high return on investment from a network monitoring solution.Statscout generally appeals to government departments, corporate enterprises or educational facilities with 500 to 100,000 network nodes and a distributed network infrastructure, seeking a high return on investment from a network monitoring solution.

DCCC Project Academic Network Internet ProblemsAcademic Network Internet Problems Currently T-1 ISP with VoicenetCurrently T-1 ISP with Voicenet Download speeds 2 to 3 KBpsDownload speeds 2 to 3 KBps Widener ISP solutionWidener ISP solution Download speeds 250 to 300 KBps, testedDownload speeds 250 to 300 KBps, tested Voicenet will handle specified URL’sVoicenet will handle specified URL’s Widener will carry rest of trafficWidener will carry rest of traffic Admin Network will continue with VoicenetAdmin Network will continue with Voicenet

Widener Spring Break One week a year of downtimeOne week a year of downtime Starts 9 pm on Feb 27 thStarts 9 pm on Feb 27 th Ends 9 pm on Mar 8 thEnds 9 pm on Mar 8 th Cisco Routers Upgrade Sat Feb 28 th 8 am – 12 amCisco Routers Upgrade Sat Feb 28 th 8 am – 12 am Shasta Upgrade Mon Mar 1 st 5 am – 7 amShasta Upgrade Mon Mar 1 st 5 am – 7 am ACN UPS Upgrade Mon Mar 1 st 11:30 PM – 3:30 amACN UPS Upgrade Mon Mar 1 st 11:30 PM – 3:30 am Only downtime for WINS 5 am on Mon Mar 1 stOnly downtime for WINS 5 am on Mon Mar 1 st

Questions & Answers Next Meeting Friday Mar 5th!Next Meeting Friday Mar 5th!