Download presentation
Presentation is loading. Please wait.
1
UCCSC 8/3/04 Pursuit of IT Security Lessons Learned Huapei Chen -- Director of IT, EECS Alex Brown – Project Lead, EECS Department of Electrical Engineering and Computer Sciences Univ. of CA Berkeley
2
Pursuit of IT Security Lessons Learned It all started a hot summer day in August, 2003…
3
What We Had… Blaster Disaster 2 out of 5 Windows systems in EECS were rebuilt (compromised or unpatched). Estimate 2000-3000 FTE hours lost (not counting data loss). 65% of grad student laptops were compromised (largest representation of un/mismanaged mobile systems). User awareness was at all time high AFTER the incident, but misconfigured systems still appear on the net daily
4
What We Had… EECS IT Risk Assessment A month-long, department wide activity, encompassing all aspects of IT services, such as: – Infrastructure – Application – Operations – People Does not fare well against corporate environment. Serious lacking in user awareness, IT policy and enforcement, and “standards” for computing devices. Starting point of the year-long EECS IT security project.
5
What We Had…
6
Virus/Spam Too many to mention: – bagle (32+ variants.a through.ah) – mydoom (13+ variants.a through.m) – netsky (.a through.ac) – soBig, klez, etc. Many virus are transmitted via email. 55+% of all incoming EECS email are “spam”.
7
What We Had… It’s a Jungle Out There…
8
What We Have? Active Instructional courses and labs Demanding administrative services Dominant researches: a) Wireless b) Motes c) HoneyPots d) HPC and large computation intensive simulations e) Nano research f) Microfabrication g) Optical/QoS related networking research Delicate balance between the needs for stable, 24x7 production services and flexibility and robustness. Historically, cutting edge research environment defies convention and resists “centralization” or “standardization” of IT.
9
What We Have? “Centralized” Infrastructure services: – Networking (wired and wireless) – IP based services – User Account management – Department wide applications – Instructional “Federalized” tier-1 and tier 2 services: – User level support – Desktop and server management – Application development – Research specific support Highlight Communications Dissemination of information Difficulty in harboring support and understanding Not streamlined
10
What We Have? Various federal and state level laws. – SB-1386 – DMCA UCB Minimum Security Standard. – Patch management – Personal firewall UCB Data Management, Usage, and Protection Policy. – Classification of all data – Mandatory protection of certain types of systems. Community buy-in Change in culture Encouragement and enforcement of “right” behavior Expensive!!
11
What We Have? Many monkeys on our backs…
12
Realistically… IRIS (EECS IT organization) reports to a faculty committee led by one Vice Chair. – Committee meets twice a year – One person makes the high-level operational decision – Takes a long time to build consensus when dealing with substancial policy changes EECS has 110+ faculty == 110+ CIOs Many IRIS operations are supported via fee-for-service model. What is the right model for us?
13
Realistically… Too many chiefs, not enough indians.
14
Control as Little as Possible
15
Imposing Order Original reaction in the wake of Blaster – Strong Perimeter Firewall – Mandatory central management of all systems – Limitations on allowed platforms, services, and applications.
16
Reassessment Perimeter firewall did not fly Does central control make sense? – A historically decentralized culture – Wildly diverse computing needs – Limited resources for a task that does not scale How to improve on the decentralized model?
17
Mandating the Right Things Policies – Campus plus departmental policies – Technical enforcement – Encouraging compliance
18
Mandating the Right Things Network control – Registration of hosts – Identification of POC – Ability to withdraw network access on short notice Communications channels – Automated contact mailing list for POCs – Mandatory education for incoming students
19
Releasing Control Optional centralized services – Full end-node management – Patch management – Antivirus management (host based and email scanning) – Active and passive network scanning – Education and training
20
Releasing Control No central support or mandate – Unsupported operating systems – Specialized applications or services – People who don’t use central services end up here
21
Plan Ahead
22
Trends Volume Sophistication Speed Severity Dependency
23
Threats Loss of productivity Loss of data Legal consequences – Copyright violations – Theft of personal information – Use of facilities as stepping stone Loss of funding
24
Conclusions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.