Northwestern University Information Technology UNITS meeting February 17, 2005 Network Security – Statistics and Trends Roger Safian

Slides:



Advertisements
Similar presentations
How to Lock and Unlock Your Computer
Advertisements

Students can gain access to and use programs offered on the computers in the Instructional Support labs via an online network.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Mr C Johnston ICT Teacher
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Internet Savvy & Safety April 22, 2010 Roger Safian Senior Data Security Analyst.
24/7/365 Remote Computer Support. Program Overview.
UNITS meeting September 30, 2004 Network Security Roger Safian
Information and Systems Security/Compliance UNITS 02 Feb 2006.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Password Management for Multiple Accounts Some Security.
Northwestern University Information Technology UNITS Quarterly Meeting April 29, 2004 Network Security Roger Safian
SOA Security Chapter 12 SOA for Dummies. Outline User Authentication/ authorization Authenticating Software and Data Auditing and the Enterprise Service.
EMU/ICT Incident Response Team Firewall Access Session Presenter: IRT TEAM Member.
Pre-enrolment. If you have not yet performed pre-enrolment procedures before, you can do it now using this function.
Hacking Framework Extended: The Role of Vulnerabilities Joseph H. Schuessler Bahorat Ibragimova 8 th Annual Security Conference Las Vegas, Nevada April.
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Fermi Computer Incident Response Team Computer Security Awareness Day March 8, 2005 Michael Diesburg.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Introduction to Cloud Computing & Social Networking Using Google & Facebook Presented by Peggy Higgins Reference/Bibliography Instructor Holly Library.
Security 101 Harper P. Johnson Information Technology Services Director of Information Security.
Copyright © 2008 Rockwell Automation, Inc. All rights reserved. Rockwell Automation Knowledgebase Notification Signup PSAs, Product Notices, etc.
Enforcing Concurrent Logon Policies with UserLock.
FORESEC Academy FORESEC Academy Security Essentials (II)
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Page 1 Credits to Page 2 what happened What you don’t know CAN hurt you s o p l e a s e t a k e a moment to get to know around the world recently E-Rule:
Better worlds through database protection SAFETY MATTERS.
Monitoring Your Network A College Approach Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
HOW TO AVOID PASSWORD HACKING. Have you ever being HACKED ?
OARtech Logging, evidence, and network management Brian Moeller, CISSP 10APR2002.
Small Business Security Keith Slagle April 24, 2007.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
KTAC Security Task Force Superintendents Update April 23, 2015.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Orientation for International Students 2016 Information Services & Techology Pekka Kuronen.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
Security Threats Caela Harris. What is a Virus A computer virus or a computer worm is a malicious software program that can self replicate on computer.
Agenda Last class: Computer Software Today: –Task Manager, Control Panel.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
ABI Electronic Attendance for Elementary Schools Prepared by The SBCUSD Assessment & Accountability Department Revised: February
Computer Security Keeping you and your computer safe in the digital world.
Mobile Device Management Walkthrough For additional help please contact: Paul Peterson 10/3/2014Olea Networks Confidential.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Trend Micro Support for Installing the Latest Version Security 2016.
Business Risks of Insecure Networks
Information Security Session November 11, 2004
Things To Avoid: 1-Never your password to anyone.
Looking for Gmail Help?Gmail Help JUST CALL (800)
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Quicken Problems with Application Data
Quicken Download Bank of America Problems
February 12 – 19, 2018.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Working With The EPISD Gregory McChesney.
How to register for athens
The Knowledge Network How to register.
Ашық сабақ 7 сынып Файлдар мен қапшықтар Сабақтың тақырыбы:
Windows басқару элементтері
Most Effective and Popular Social Networking Site
Қош келдіңіздер!.
Информатика пән мұғалімі : Аитова Карима.
Guidelines for building security policies. Building a successful set of security policies will ensure that your business stands the best possible chance.
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Northwestern University Information Technology UNITS meeting February 17, 2005 Network Security – Statistics and Trends Roger Safian

Northwestern University Information Technology Agenda Statistics Why these incidents occur Questions

Northwestern University Information Technology Statistics FY 2002/2003 –Virus = 1166 –Compromised = 727 –Total incidents = /1/02 – 8/31/03 FY 2003/2004 –Virus = 7976 –Compromised = 467 –Total incidents = /1/03 – 8/31/04

Northwestern University Information Technology Statistics (2) Q1 2003/2004 –Virus = 497 –Compromised = 150 –Total incidents = 890 9/1/03 – 11/30/03 Q1 2004/2005 –Virus = * –Compromised = 1783 –Total incidents = /1/04 – 11/30/04

Northwestern University Information Technology Why these incidents occur? Weak Passwords –All machines and accounts need passwords –Use rules similar to the NetID rules –Longer is better…get creative. Updates not applied –Ensure Windows update runs automatically –Don’t forget about layered products

Northwestern University Information Technology Questions? Contact Information – – (NOC 24x7)