Your Users, Friend or Foe? Matthew Sullivan IT Security Manager, the University of Canberra Creator, the Spam and Open Relay Blocking System (SORBS)

Slides:



Advertisements
Similar presentations
7 Effective Habits when using the Internet Philip O’Kane 1.
Advertisements

Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Trojan Horse Program Presented by : Lori Agrawal.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Firewalls and Intrusion Detection Systems
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Annual Safety & Security Briefing - 9/22/04 Teresa Downey – SLAC Computer Security Group & SCS Applications Group.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
EMU/ICT Incident Response Team Firewall Access Session Presenter: IRT TEAM Member.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Automating Endpoint Security Policy Enforcement Computing and Networking Services University of Toronto.
Social impacts of the use of it By: Mohamed Abdalla.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11.
PPD & CLRC's response to the (IS) Security Threat Gareth Smith PPD/CG Christmas Lectures 2002.
UNM IT Managed Workstations. Benefits of Managed Workstations  Standard software with uniform configuration ensures end users have the same set of applications.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Honeypot and Intrusion Detection System
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Enjoy Remote Support WinVNC Introduction A&SIT Ben Wu 11/04/08.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Security at NCAR David Mitchell February 20th, 2007.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Rootkits What are they? What do they do? Where do they come from?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Small Business Security Keith Slagle April 24, 2007.
Introduction to Firewalls
Computer security By Isabelle Cooper.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
TCOM Information Assurance Management System Hacking.
FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Don’t let them catch your computer!!!!!
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
Proposed UW Minimum Computer Security Standards From C&C 28 Jan 2005 Draft.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
E-Safety Parent Talk Helping to keep your children safe online.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
PRESENTED BY : Bhupendra Singh
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Seminar On Ethical Hacking Submitted To: Submitted By:
Common Methods Used to Commit Computer Crimes
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Answer the questions to reveal the blocks and guess the picture.
Firewalls.
Nessus Vulnerability Scanning
Information Security Session October 24, 2005
Level 2 Diploma Unit 11 IT Security
Implementing Client Security on Windows 2000 and Windows XP Level 150
16. Account Monitoring and Control
Windows Vista Inside Out
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Your Users, Friend or Foe? Matthew Sullivan IT Security Manager, the University of Canberra Creator, the Spam and Open Relay Blocking System (SORBS)

About this Talk Provoking discussion. The Network Security Problem. To firewall, or not? Old school, or just forgotten? Some examples. How does it affect you?

Provoking Discussion These slides are not to teach they are to remind. We hear lots of talk about what we should and shouldn’t do, why don’t we ask? Windows Vista –Great new time saving product, –New smarter and, more secure OS, –Or cash cow designed to line the pockets of shareholders? –Or even something to drive the American Economy?

The Network Security Problem Securing against outside attack the priority? Securing against inside attack? Security of the desktop? Securing against stupidity?

To Firewall or not? Everyone has a firewall, or do they? Who thinks they are secure because they are firewalled? Who thinks they are not secure without one?

Old School, or just forgotten? Head count: How many hosts ( 1k)? How many seats ( 1k)? Who is firewalling? Who has gateways? Who has had a host hacked ( 1yr)? Firewalls are only needed to prevent stupidity Without stupid people we wouldn’t need them. Without nasty people we wouldn’t need them either….

An example (home user). Senior Unix Admin working for Customs Can’t make Zone Alarm work with program. Installs VNC for help. Opens VNC port in firewall. Doesn’t set password. 18 hours later, “hacker attack” RootkitRevealer reveals nothing. Machine under full remote control.

An Example (Professional) Professor, external project. Has 2 servers, RedHat, and Windows 2003 Machines are “Servers” for custom app. ITSec alerted to scanning at 03:30 5 th Feb ‘07 10:00 “Networks” blocked external access. 15:30 6 th Feb ‘07 machine and owner located. Operator and Professor wondering why Windows 2003 was ‘having problems’ 15:35 6 th Feb, machine removed from internal network. 13:00 8 th Feb ITSec asked to examine machine. RootkitRevealer indicated unidentified RootKit. 9 th Feb machine re-installed.

So what’s the Problem? Unix Admin, opens a port in firewall, doesn’t secure service. Professor hasn’t patched Win 2003 server, common IIS exploit used to ‘Root’ server. Both ask ITSec why firewall didn’t stop the “hacker”…?

How does this affect you? So what are the risks here…? A server hacked on the corporate network? A home user, with their computer hacked? A mobile user with a laptop? Another example, the Chinese Laptop.. Staff member takes laptop to China Laptop gets infected with ‘Drive/Share’ virus. Staff member hands USB drive around. 5+ machines get infected…

Conclusion Firewalls don’t make you secure. Good network practices keep you secure. Successful attacks often start inside. Getting inside is the biggest hurdle. Using your staff against you make it easier. VPNs need to be considered carefully. »Enforce controls about what can connect. »Ensure good home hygiene if you use VPNs Monitor your internal network. Consider your internal network “Hostile” if you allow external access. Laptops are equivalent to home machines.

The Last Word Be proactive. Look for problems. »Use scanning tools internally. »Use IDSs. »Give access to those who need it. Don’t make things too difficult for users. »Making it more difficult for users will result in users making it easier for themselves.

Thank You Matthew Sullivan