Download presentation
Presentation is loading. Please wait.
Published byMaryann Jacobs Modified over 9 years ago
1
Copyright 2001 Marchany1 Auditing Networks, Perimeters and Systems Introduction
2
Copyright 2001 Marchany2 Who should be here Unix Sys Admins NT Sys Admins Auditors In general, just really cool people!
3
Copyright 2001 Marchany3 The Audit Track Goal Auditors – need to know a little bit of techie to be able to perform a meaningful audit Sys Admins – need to think a little more like auditors Everybody! – Think like an attacker!
4
Copyright 2001 Marchany4 Randy Marchany VA Tech Computing Center Blacksburg, VA 24060 Randy.Marchany@vt.edu 540-231-9523 SANS 2001 Applying Risk Analysis Techniques to Information Systems
5
Copyright 2001 Marchany5 Unit 1: Pay Me Now or Pay Me Later Why we need to check our infrastructure
6
Copyright 2001 Marchany6 Why Bother? This section will give you some concrete examples of what can happen if you don’t have basic security rules at your site. Every one of these attacks could have been prevented ahead of time with minimal effort. The cost to fix it afterwards was much higher!
7
Copyright 2001 Marchany7 Pay Me Now or Pay Me Later E = D + R –E = amount of time you’re exposed –D = amount of time it takes to detect an attack –R = amount of time it takes to react to an attack Easiest way to calculate the cost of an Incident –Multiply average hourly wage * Time * People
8
Copyright 2001 Marchany8 The Top 10 Vulnerabilities BIND (Unix/Linux/NT/Win2K) CGI programs (www servers) RPC (Tooltalk) (Unix/linux/NT/Win2K) Microsoft IIS – RDS and others (NT/Win2K) Sendmail (Unix/Linux) Sadmind and mountd (Unix/Linux) Global file sharing (NetBios, NFS, Appleshare) Weak/no passwords, demo/guest accounts IMAP/POP buffer overflow Default SNMP community strings (Network)
9
Copyright 2001 Marchany9.77%Webdist#2, #4 15.5%IMAP#9 12.4%Qpopper#9.52%Innd 26.1%Tooltalk#3, #6 10.8%RPC_mountd#3, #6 18.1%BIND#1 12.2%WWW#2 735065Hosts scannedTOTAL Percent VulnerabilityTop 10 #
10
Copyright 2001 Marchany10 The Top 10 Internet Threats for 2000 Available at www.sans.org/topten.htmlwww.sans.org/topten.html You should check your systems for these vulnerabilities The fix is simple. Apply Patches or ServicePaks. Your sysadmins/netadmins should check your system(s) for the top 10 threats. –Bindview Hackershield – NT systems –SARA, SAINT – Unix/Linux freeware tools
11
Copyright 2001 Marchany11 References http://security.vt.edu www.sans.org www.sans.org –Top 10 threats, Defeating Ddos, etc. www.nipc.gov www.nipc.gov www.cornell.edu/CPL www.cornell.edu/CPL www.securityfocus.com www.securityfocus.com –Early Warning Vulnerability list www.insecure.org www.insecure.org www.usdoj.gov/criminal/cybercrime/index.html www.usdoj.gov/criminal/cybercrime/index.html –Federal Search & Seizure Guidelines
12
Copyright 2001 Marchany12 Course Revision History
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.