EDUCAUSE Security 2006 Internet John Brown University.

Slides:



Advertisements
Similar presentations
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Advertisements

Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
What's new in Threat Management Gateway (TMG) 2010 Ronald Beekelaar
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Secure Messaging Nick Hall & James Clifford Microsoft.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Information Security in Real Business
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Trend Micro Round Table May 19, Agenda Introduction – why switch? Timeline for implementation Related policies Trend Micro product descriptions.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
LittleOrange Internet Security an Endpoint Security Appliance.
Course 201 – Administration, Content Inspection and SSL VPN
IT:Network:Apps.  Security Options  Group Policy  AppLocker  ACL.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 5 Network Defenses.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Security Guidelines and Management
1 Firewalls Types of Firewalls  Screening router firewalls  Computer-based firewalls  Firewall appliances  Host firewalls (firewalls on clients and.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
INTRODUCING F-SECURE POLICY MANAGER
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Barracuda Load Balancer Server Availability and Scalability.
Hacker Zombie Computer Reflectors Target.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
CERN’s Computer Security Challenge
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Honeypot and Intrusion Detection System
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
EDUCAUSE & Internet2 Security Professionals Conference The Challenge: Securing a Large Multicampus Network Kirk Kelly – Pima Community College Scott Ferguson.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
Lanxin Ma Institute of High Energy physics (IHEP) Chinese Academy of Sciences September 30, 2004 CHEP 2004, Interlaken The Security Protection System at.
Security at NCAR David Mitchell February 20th, 2007.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Firewall Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Module 11: Designing Security for Network Perimeters.
Intrusion Detection on a Shoestring Budget Shane Williams UT Austin Graduate School of Library and Information Science Oct. 18, 2000 SANS Network Security.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
NetTech Solutions Protecting the Computer Lesson 10.
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
© 2006, iPolicy Networks, Inc. All rights reserved. Security Technology Correlation Proneet Biswas Sr. Security Architect iPolicy Networks
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Barracuda NG Firewall ™
Barracuda Firewall The Next-Generation Firewall for Everyone
Click to edit Master subtitle style
Introduction to Networking
IS4680 Security Auditing for Compliance
Cloud Security for Endpoints
Network hardening Chapter 14.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

EDUCAUSE Security 2006 Internet John Brown University

EDUCAUSE Security 2006 John Brown University “John Brown University is a private, Christian university with more than 1,900 students from all over the U.S. and around the world. JBU offers more than 50 undergraduate degrees, including cutting-edge programs such as Digital Media Arts, along with liberal arts programs such as English and history.”

EDUCAUSE Security 2006 Campus Population undergraduate students  900 on campus 200+ graduate students 400+ Adult Degree Completion Students 350 Faculty and Staff

EDUCAUSE Security 2006 Campus Network View

EDUCAUSE Security 2006 Campus Computers & Network Computing Infrastructure  300 Computers in Student Labs 3 Open Labs 7 “Specialty” Labs  500 Office Computers  800 Student Computers Network  1 Gbit Fiber Backbone  100 Mbit cat 5 to desktops  About a dozen WiFi (802.11g) “Hotspots”  9 Mbit Fiber to our ISP

EDUCAUSE Security 2006 Network Services File and Print Servers Several Web/FTP Servers Exchange Server LAN-LAN VPN to 4 Remote Sites Multiple Database Servers AS400 for Administrative Applications

EDUCAUSE Security 2006 Our Problems Whatever happens is our fault Server Farm Patch for Vulnerability Packet Filtering Firewall Our Students Bring in Infected Machines Need to protect us from students Need to protect students from each other JBU Clients Patch for Vulnerability Host Based Anti-Virus

EDUCAUSE Security 2006 Fall 2003: “That Semester” Nachi and Blaster Worms ( July 2003 ) Infection Vectors - Students moving in to the dorms bring in Infected Machines Network Impact - Spread like wildfire Solution  Disconnect Students from the Network  JBU Staff went to the dorms to scan and patch computers  Not Fun 

EDUCAUSE Security – Access Control Server Automated Scans for vulnerabilities Automated Scans for worm activity Enforce Patch and AV Requirements Reports with Instructions and links to …. Web Site with files  Patches  Virus Scanners Student mostly take care of themselves Much Nicer!  Minimal problems (with Sasser)  2005 – It’s not over, yet

EDUCAUSE Security 2006 Internet Security – more to do NAT Protects Clients Protection helps a lot  Anti-virus scan  Quarantine attachments Enforcing Patches helps a lot Client anti-virus helps a lot, but …  Have to keep up with updates  Not perfect Need to compliment the Host Based Anti-Virus and Access Control Agent Intrusion Detection and Prevention for Zero Day Exploits

EDUCAUSE Security 2006 Upgrade & Enhancement Dilemma We had a “Sniffer” Content Filtering Solution  Allows traffic until it categorizes it  Potential to miss traffic in high traffic times Or - it can be installed as a Proxy  Requires Client Configuration  Caused problems with some HTTPS sites Content Filter is Fairly Expensive No budget for Firewall upgrade

EDUCAUSE Security 2006 Evaluation Process Integrated Solution for – Firewall, Content Filtering, AV and IDS/IPS Started looking at following solutions  SonicWall  iPolicy Either could be purchased for what we had budgeted for the Web Filter

EDUCAUSE Security 2006 We Selected iPolicy We liked both iPolicy  Central Management of multiple firewalls (Separate Firewall and Management Hardware)  Integrated Content Filter uses the SurfControl database  Gartner “Magic Quadrant for Network Firewalls” report was a plus  Higher Bandwidth rating for similar cost  Liked commitment to add services while maintaining performance  Technical people impressed us

EDUCAUSE Security 2006 Results We replaced our Firewall and Web Content Filter with one appliance, for a comparable price. Gained IDS/IPS We kept our separate Bandwidth Manager

EDUCAUSE Security 2006 Experience Firewall configuration is easy and effective Easy to take care of behavior anomalies like infected client machines generating SMTP traffic Performance – we run with our Internet connection pegged much of the time – performance is not a problem The Web Content Filter works well  Configuration is simple  Filtering is as accurate as it was with SurfControl

EDUCAUSE Security 2006 Experience Easy to turn On/Off IDS/IPS signatures Over 2400 signatures  Flood Signatures which still need to be tuned Incoming and Outgoing IDS/IPS can detect and block …  Worm activity  Bot activity

EDUCAUSE Security 2006 IDS/IPS: more than buying a box We don’t know all the threats We used iPolicy recommended settings False positives happen  Thresholds for flood/DoS signatures need to be tuned  Some of the alerts are for older vulnerabilities

EDUCAUSE Security 2006 Summary We like the iPolicy Product We need to learn more to use it well We really want IDS to be like AV products today  Pretty much install, set and forget  I know – AV is an easier problem We look forward to Virus Scanning of Internet traffic

EDUCAUSE Security 2006 Questions