The Case for Tripwire® Nick Chodorow Sarah Kronk Jim Moriarty Chris Tartaglia.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
{ Best Practice Why reinvent the wheel?.   Domain controllers   Member servers   Client computers   User accounts   Group accounts   OUs 
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Using Nagios for Intrusion detection Miguel Cárdenas Montes Elio Pérez Calle Francisco Javier Rodríguez Calonge.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Enterprise Network Security Accessing the WAN Lecture week 4.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
Lecture 11 Intrusion Detection (cont)
Tripwire Enterprise Server – Getting Started Doreen Meyer and Vincent Fox UC Davis, Information and Education Technology June 6, 2006.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Virtual Machine Management
1 Host – Based Intrusion Detection “Working of Tripwire”
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Task Scheduler Pro Managing scheduled tasks across the enterprise Joe Vachon Sales Engineer.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Windows Server MIS 424 Professor Sandvig. Overview Role of servers Performance Requirements Server Hardware Software Windows Server IIS.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Antivirus Technology in State Government Kym Patterson State Chief Cyber Security Officer Department of Information Systems.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
Honeypot and Intrusion Detection System
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Samba – Good Just Keeps Getting Better The new and not so new features available in Samba, and how they benefit your organization. Copyright 2002 © Dustin.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
HONEYPOTS An Intrusion Detection System. Index Intrusion Detection System Host bases Intrusion Detection System Network Based Intrusion Detection System.
Role Of Network IDS in Network Perimeter Defense.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
IDS And Tripwire Rayhan Mir COSC 356. What is IDS IDS - Intrusion detection system Primary function – To monitor network or host resources to detect intrusions.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Some Great Open Source Intrusion Detection Systems (IDSs)
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
OSSEC HIDS ● Jonathan Schipp ● Dubois County Linux User Group ● Sept 4 th, 2011 ● jonschipp (at) gmail.com.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Critical Security Controls
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Designing IIS Security (IIS – Internet Information Service)
6. Application Software Security
Presentation transcript:

The Case for Tripwire® Nick Chodorow Sarah Kronk Jim Moriarty Chris Tartaglia

The DMZ at OurCompany  External, customer-facing websites sit in the DMZ Includes: DNS, mail, data and application servers

The DMZ and Risk  Internal Risk Botched migration of software Patch application gone awry  External Risk DMZ is exposed to the Internet Intruders could modify, remove, or add files to the servers resulting in a multitude of issues

Is the solution?

What is ?  The most popular host-based IDS for Linux Also popular with Windows  Change monitoring and analysis tool Establishes control over both authorized and unauthorized changes on servers  Provides enterprises with … High availability Compliance with regulations from internal and external policies More effective systems security

What can do?  Detect Provides change detection across network servers, routers, switchers, firewalls, ect. Captures all changes (malicious and authorized)  Reconcile Rapidly determines which files have been changed  Report Audit Logs Real-Time notification ( )

cost of implementation * $24,000 for 25 servers ** $120/server and $1400/management station *** implementation, familiarization, training, testing Year 1Year 2Year 3 Fixed Costs*$24,000$ 0 Maintenance Costs** $ 4,400 Labor Time*** 375 hours50 hours

Management Buy-In  Problem High initial cost and man-hours Management not concerned with internal risk  What sold Management? The ability to monitor the DMZ 24/7 from illicit activity … and then be able to recover quickly

Deployment  Initial deployment One management station Tripwire client running on 2 web servers and 1 data server This deployment was a success Full scale deployment followed

concerns  Too many false positives Due to mis-configuration Server group less likely to promptly address real issues  Do Tripwire vulnerabilities exist? 2004 – Format String Vulnerability  When an report was created, a local user could execute arbitrary code that runs as the same rights as the user running the file check (usually root or sys admin) 2001 – Symbolic link attack  On Linux and Unix, Tripwire opens insecure temporary files with predictable names in publicly-writable directories. Using a symbolic link attack, a local intruder may overwrite or create arbitrary files on machines running tripwire. Others ?????

Alternative IDS Products  Symantec IDS “Only true real-time monitoring services in the Managed Security Services industry “ Host-Based Centralized Console Management  Can view Network-Based IDS in same console Price varies upon support  Different levels of service can be purchased  Why was Symantec IDS not chosen? OurCompany already uses Symantec Anti-Virus … did not want a single vendor security solution

Alternative IDS Products (Open Source)  Samhain Host-Based Centralized-Monitoring Web-Based Management Console Tamper Resistant  PGP-Signed database and configuration files Terms under GNU General Public License  FCheck PERL script creates “snapshot” of system in known state Monitors machines against “snapshot” and reports inconsistencies Terms under GNU General Public License

Alternative IDS Products (Open Source)  AIDE Stands for Advanced Intrusion Detection Environment Similar capabilities as Tripwire Billed as a free replacement for Tripwire Terms under GNU General Public License  Integrit Simple, secure alternative to Tripwire and AIDE Small memory footprint Terms under GNU General Public License  Why NONE of these products were chosen? Management at OurCompany does not consider Open Source an option at this time No support plan available on these products

Questions ???