Windows 7 Project and Heartbleed Update Sian Shumway Director, IT Customer Service.

Slides:



Advertisements
Similar presentations
Patch Management Patch Management in a Windows based environment
Advertisements

Information Security The Responsibility of Security Lies on The Shoulders of Each and Every User……. R. LaRocca 1997 Robert LaRocca - Director Information.
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Chapter 7 HARDENING SERVERS.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
How PNNL Manages Windows Desktops 1 Will Jorgensen.
Web server security Dr Jim Briggs WEBP security1.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses, Worms and Spam Definitions Virus - unauthorized software, embedded in other programs and with the ability to propagate when the host program is.
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
FCMAT Technology Recommendations Fil Duldulao Shawn Cabey David Flores Julienne DeGeyter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Alabama Supercomputer Authority A partnership of … and.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Endpoint Control. Module Objectives By the end of this module participants will be able to: Define application detection lists to monitor applications.
Staying Safe Online Keep your Information Secure.
Dell Connected Security Solutions Simplify & unify.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
1 Technology Updates Regional Meetings October 2009 Veronica Coates, AARP Tax-Aide National Technology Manager.
The Microsoft Baseline Security Analyzer A practical look….
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
What is Heartbleed? Heartbleed is a vulnerability in OpenSSL software. OpenSSL is encryption software that accesses websites through a “secure” connection,
Security at NCAR David Mitchell February 20th, 2007.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Because you need to protect your computers!!! By: Ashley Hubbard.
Module 6: Designing Security for Network Hosts
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Small Business Security Keith Slagle April 24, 2007.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NetTech Solutions Protecting the Computer Lesson 10.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Computer Security By Duncan Hall.
Introduction to Network Security. Acknowledgements.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Three steps to prevent Malware infection
CIS 333 Course Experience Tradition/ snaptutorial.com
Configuring Windows Firewall with Advanced Security
Secure Software Confidentiality Integrity Data Security Authentication
Your Computer Wants To Ruin Your Life
2014: the year so far in cyber security
MEASURE I CITIZEN’S OVERSIGHT COMMITTEE MEETING
CIS 333 Competitive Success/snaptutorial.com
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- snaptutorial.com.
CIS 333 RANK Lessons in Excellence-- cis333rank.com.
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
CIS 333 Teaching Effectively-- snaptutorial.com
Cybersecurity Strategy
Implementing Client Security on Windows 2000 and Windows XP Level 150
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
The Move Towards Windows 10
Update to Google’s review guidelines.
INTERNET SECURITY.
Presentation transcript:

Windows 7 Project and Heartbleed Update Sian Shumway Director, IT Customer Service

Windows XP Overview Technical issue: Windows XP support ends April 8, Microsoft will no longer provide patches, updates, or support. XP systems will no longer meet UCSF minimum security requirements and must be upgraded. Risk: XP systems will be vulnerable to security exploits. UCSF enterprise at risk from anticipated influx of threats. Action: Mandate the upgrade of all Windows XP systems. Executive support for escalation, potential funding, and minimizing security exceptions. 2 Post April 8 th UCSF will have substantial quantities of XP computers operating in our environment which requires us to take risk mitigation steps immediately.

Where We Started ~ 8500 XP systems to upgrade ~359 Applications to test, migrate or except Timeline: 3

Progress Update ~ XP systems complete to date ~3000 systems remaining Estimated completion date of May 31 ~400 systems excepted due to application migration cost/availability - complete by April 2015, many earlier ~350 Applications test and migrated ~10 applications required exception to complete migration by April 2015 (~500 systems) 4

Risk Mitigations Microsoft extended support for Windows XP for 1 year Installation of Symantec Endpoint Protection 12 on all computers Install Microsoft Enhance Mitigation Experience Toolkit (EMET) XP computers Enhance the UCSF Spam Firewall Web filtering to monitor network traffic 5

What is the Heartbleed bug This flaw potentially allows attackers to steal passwords or other data from websites using OpenSSL encryption. Approximately 2/3 of all sites on the Internet were vulnerable for almost 2 years until the bug was discovered last week. It’s difficult or impossible to determine whether or not this vulnerability was widely used to steal passwords and confidential information. 6

What we are doing about it Remediation is a 3-step process: Patch the software Install a new SSL certificate Have users to change their passwords IT Security scanned the network to identify vulnerable UCSF systems and notified system administrators Dozens of Internet-accessible systems and many more internally accessible systems have been patched will be sent to all users next week asking you to change UCSF passwords 7

What should you do about it? Change your Active Directory password when asked by IT Change passwords for your personal accounts on sites that may have been affected (Google “Mashable Heartbleed” for a good list of popular, affected sites) Look for updates at: 8

Questions? Web: readyfor7.ucsf.edureadyfor7.ucsf.edu Sian Shumway, Director IT Customer Service Project Manager: 9