Presentation is loading. Please wait.

Presentation is loading. Please wait.

CU – Boulder Security Incidents Jon Giltner. Our Challenge.

Similar presentations


Presentation on theme: "CU – Boulder Security Incidents Jon Giltner. Our Challenge."— Presentation transcript:

1 CU – Boulder Security Incidents Jon Giltner

2 Our Challenge

3 What do we face… The campus computing environment: –~ 20,000 PC-class systems –~ 6,000 Server-acting systems –~ 40,000 accounts Like most universities the campus is highly decentralized

4 What do we face, part 2… We’re responding to about 50 incidents per week: 42% network worms 18% “Root kits” 18% SPAM bots 15% copyright 7% email worm Few involve protected data

5 High Visibility Incidents October 2004 - Continuing Education: CCs and PII July 2005 (all PII) –Wardenberg Health Center –College of Architecture and Planning –Department of Housing including ID Card –Office of the Registrar

6 Invoke Incident Response Process Formal documented process established in 2004 “Requires” notification and involvement of central IT CERIAS Incident Response Database –Center for Education and Research for Information Assurance and Security IRDB https://cirdb.cerias.purdue.edu/website/ https://cirdb.cerias.purdue.edu/website/ –Web Based tool for managing security incidents –Supports email, contact management, role- based access and multi-level access to hierarchical domains of confidentiality.

7 Data Breach Response Team Team is formed if incident involves potential breach of sensitive data Mandate independent forensics –Credit card companies mandate the firms you can use. The team’s primary role is to handle communications: –Notification to affected individuals via US postal mail using best last known address –Notification to affected individuals via email when email addresses are available –Press release –Web content –Follow-up communications with press –Establish and man hot-line for notified individuals (department responsibility)

8 Data Breach Response Team Who is involved: –Legal Counsel –Department head for the compromised department –IT Security Coordinator –Technical lead for the compromised department –Campus Police –University Communications –University Privacy Officer –University Officer with oversight for the compromised department –Treasure's office if compromise involves credit cards

9 Vulnerabilities Windows patches Oracle updates Third-party software, i.e., Veritas back- up software Stale databases

10 Culpability (Discussion) Application and system administration within departments? Controls at network layer? Vendor software? Existence and/or enforcement of well communicated policies regarding data management?

11 Questions: Have we over responded to these specific incidents? –(Not according to established IR process) Has CU-Boulder been victimized more than others, or have we just acknowledged it more publicly?

12 Negative Impacts: PII potentially spilled –(ultimate perception is that it has) University reputation Target squarely on our backs – “script kiddies, look there”

13 Positive Impacts Real-time honing of our Incident Response System Security initiatives getting executive attention Gotten attention of local system admins and their dept. heads Proposed sweeping changes

14 Scoping the Challenge Ahead Must meet academic, research and administrative needs Multi-layered Approach –Host administration –Network access must be earned –Awareness & Education –Frequent Risk Assessments Compounding 70% solutions!

15 The Passel of Solutions 1. Private IP addresses for desktop-class systems 2. Require Host-based Intrusion Detection Software 3. Risk Assessments performed by 3 rd party 4. Further Restrict Inbound Internet Traffic 5. Server Registration


Download ppt "CU – Boulder Security Incidents Jon Giltner. Our Challenge."

Similar presentations


Ads by Google