Presentation is loading. Please wait.

Presentation is loading. Please wait.

UNITS meeting September 30, 2004 Network Security Roger Safian

Similar presentations


Presentation on theme: "UNITS meeting September 30, 2004 Network Security Roger Safian"— Presentation transcript:

1 UNITS meeting September 30, 2004 Network Security Roger Safian r-safian@northwestern.edu

2 Agenda Our environment Statistics Why these incidents occur –What can be done to prevent them Future improvements Questions

3 Firewalls Recommending personal firewalls –Typically Zone Alarm or XP firewall Some departments have traditional firewalls –This number is growing Central IT has a purchasable solution

4 Optional Router Filters Block traffic from entering NU’s network –On more than 75% of the network –Use VPN to bypass filters Ports filtered –MS networking - 135, 137, 138, 139, 445 –Unix NFS & portmapper - 111, 2049 –MS Terminal Services - 3389 –MS SQL – 1433, 1434

5 Packeteer Classifies traffic by application Per application bandwidth partitioning –Mainly P2P Enforces service level agreements –Research park Provides detailed flow information Very limited data lifespan

6 Flow Data Statistical data from border router Sampled – 1 in 100 packets –Source and Destination address –Source and Destination ports –Byte count –Timestamp Used to produce top 20 reports

7 Intrusion Detection System We use two solutions in parallel StealthWatch –A statistical/anomaly based system –Currently two devices One at the border the other at 2020 Ridge Snort –Currently 15 devices

8 Get Control Home for NU security and virus warnings Updated frequently Has tips on staying secure Contains instructions on removing viruses –Links to online removal tools http://www.it.northwestern.edu/security/index.html http://www.it.northwestern.edu/5steps/

9 Statistics FY 2002/2003 –Virus = 1166 –Compromised = 727 –Total incidents = 3042 9/1/02 – 8/31/03 FY 2003/2004 –Virus = 7976 –Compromised = 467 –Total incidents = 9264 9/1/03 – 8/31/04

10 Why these incidents occur? Weak Passwords –All machines and accounts need passwords –Use rules similar to the NetID rules Opening viral attachments –Don’t open unexpected attachments –Only open specific types of extensions –Make sure to look at the LAST extension

11 Why these incidents occur? (2) Updates not applied –Ensure Windows update runs automatically –Don’t forget about layered products Network use –P2P –Be careful when clicking on links

12 Why these incidents occur? (3) Out of date anti-viral software –Ensure you install the NU supplied software –Set to update automatically EVERY day Blended Threats –Multiple attack vectors directed at hosts Home Networks –Frequently attacked with little monitoring

13 Why these incidents occur? (4) Lack of firewall –Even if user has one they don’t understand it –Often installed after the infection Not a good idea This is most serious on home networks –Mitigated by routers with NAT

14 NUSA Network User Status Agent –Automatic notification Two events port off and display –Allows authorized users to re-enable ports –Accepts input from other sources Future use as data correlation agent –Current systems are stand-alone

15 NetPass Current system NetReg –Deployed in the dorms –Associates MAC address with NetID –Checks for 3 vulnerabilities NetPass –Checks for 25 vulnerabilities –Includes self-remediation

16 Questions? Contact Information –1-847-491-4058 –1-847-467-6662 (NOC 24x7) –security@northwestern.edusecurity@northwestern.edu –r-safian@northwestern.edur-safian@northwestern.edu


Download ppt "UNITS meeting September 30, 2004 Network Security Roger Safian"

Similar presentations


Ads by Google