Presentation is loading. Please wait.

Presentation is loading. Please wait.

Using Cornell’s Spider to scan for sensitive information January 27, 2009 Steve Lovaas, ACNS Colorado State University.

Similar presentations


Presentation on theme: "Using Cornell’s Spider to scan for sensitive information January 27, 2009 Steve Lovaas, ACNS Colorado State University."— Presentation transcript:

1 Using Cornell’s Spider to scan for sensitive information January 27, 2009 Steve Lovaas, ACNS Colorado State University

2 Spider, the Tool What is it Where to get it Where to use it Which version Installing Changing defaults Running Logging Remediation Reporting Demo Q&A

3 What is Spider (a refresher moment) Developed by Wyman Miles  Cornell University Open source, CSU collaboration Searches directories, opening files  Reads them if possible Regular-expression matching

4 Where to get it http://ssnscan.colostate.edu Supporting documents, config files Local download of application Link to online documentation Reporting template, exception request

5 Where to use it Easiest to configure on one machine, scan across the network.NET 2.0 or greater for Windows versions Mac and Linux versions available  …but better ones are coming soon Scan from a Windows machine

6 Which version Spider 2.9, 3, or 2008 3 is stable and recommended 2008 has some very useful features, still beta

7 Installing.NET 2.0 (or greater) first Zipped installer Spider 3 installs EXE Spider 2008 installs MSI Final Spider 2008 will include web config updater

8 Changing defaults Spider 3 scans everything Spider 2008 scans a list of file types Can exclude directories to improve performance (and maybe miss) Leave default CC# regexes CSU SSN regex (based on CMU’s).reg file to set config

9 Running Can take a lot of resources Spider 2008 can recover from interruption (with 3, you’ll have to start over)

10 Logging Spider 3  local log file (password if includes the hits)  syslog/Windows Event Log Spider 2008  encrypted State Database, exportable logs  syslog/Windows Event Log Protect your logs!

11 Remediation Spider 3  a manual event Spider 2008  redact (XXXX) SSNs/CC#s in files  right-click-and-delete from the log screen Re-scan after user remediation

12 Reporting Spider 3:  a manual event (or some custom scripts) Spider 2008  log export tool ACNS doesn’t want the logs, but you might want to burn them to disk for archive Summarize results on the report template (Excel)

13 Demo of each version…

14 Questions? Steven.Lovaas@ColoState.EDU


Download ppt "Using Cornell’s Spider to scan for sensitive information January 27, 2009 Steve Lovaas, ACNS Colorado State University."

Similar presentations


Ads by Google