Presentation is loading. Please wait.

Presentation is loading. Please wait.

Northwestern University Information Technology UNITS Quarterly Meeting April 29, 2004 Network Security Roger Safian

Similar presentations


Presentation on theme: "Northwestern University Information Technology UNITS Quarterly Meeting April 29, 2004 Network Security Roger Safian"— Presentation transcript:

1 Northwestern University Information Technology UNITS Quarterly Meeting April 29, 2004 Network Security Roger Safian r-safian@northwestern.edu

2 Northwestern University Information Technology Agenda Statistics Why these incidents occur –What can be done to prevent them Questions

3 Northwestern University Information Technology Statistics FY 2002/2003 –Virus = 1166 –Compromised = 727 –Total incidents = 3042 9/1/02 – 8/31/03 FY 2003/2004 –Virus = 1436 –Compromised = 261 –Total incidents = 2220 9/1/01 – 2/29/04

4 Northwestern University Information Technology Statistics – Take 2 Removing August (Blaster/Welchia) FY 2002/2003 –Virus = 336 –Compromised = 646 –Total incidents = 2037 9/1/02 – 7/31/03 FY 2003/2004 –Virus = 1436 –Compromised = 261 –Total incidents = 2220 9/1/01 – 2/29/04

5 Northwestern University Information Technology Statistics – Take 3 Same time frames FY 2002/2003 –Virus = 142 –Compromised = 342 –Total incidents = 1102 9/1/02 – 2/28/03 FY 2003/2004 –Virus = 1436 –Compromised = 261 –Total incidents = 2220 9/1/01 – 2/29/04

6 Northwestern University Information Technology Why these incidents occur? Weak Passwords –All machines and accounts need passwords –Use rules similar to the NetID rules Opening viral attachments –Don’t open unexpected attachments –Only open specific types of extensions –Make sure to look at the LAST extension

7 Northwestern University Information Technology Why these incidents occur? (2) Updates not applied –Ensure Windows update runs automatically –Don’t forget about layered products Network use –P2P –Be careful when clicking on links

8 Northwestern University Information Technology Why these incidents occur? (3) Out of date anti-viral software –Ensure you install the NU supplied software –Set to update automatically EVERY day Blended Threats –Multiple attack vectors directed at hosts Home Networks –Frequently attacked with little monitoring

9 Northwestern University Information Technology ISS Scans Internet Security Systems –Network scanner Produces HTML reports –Organized by severity Currently checks for ~1300 vulnerabilities

10 Northwestern University Information Technology ISS Scans (2) Caveats –Not 100% accurate A pretty decent indicator though –Doesn’t see through your firewall –Machine must be online –Only looks for vulnerabilities it knows about

11 Northwestern University Information Technology ISS Scans (3) Recommend getting report once per quarter –Or any time you are suspicious Or have significant changes Request from security@northwestern.edusecurity@northwestern.edu –Send IP addresses you wish scanned Can specify a range or subnet

12 Northwestern University Information Technology Questions? Contact Information –1-847-491-4058 –1-847-467-6662 (NOC 24x7) –security@northwestern.edusecurity@northwestern.edu –r-safian@northwestern.edur-safian@northwestern.edu


Download ppt "Northwestern University Information Technology UNITS Quarterly Meeting April 29, 2004 Network Security Roger Safian"

Similar presentations


Ads by Google