Recent Security Threats & Vulnerabilities Computer security Bob Cowles HEPiX, Spring 2004 – Edinburgh, UK Work supported by.

Slides:



Advertisements
Similar presentations
Oct 28, 2004WPES Off-the-Record Communication, or, Why Not to Use PGP Nikita Borisov Ian Goldberg Eric Brewer.
Advertisements

This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Spring Process Control Spring Outline 1.Optimization 2.Statistical Process Control 3.In-Process Control.
2.008 Manufacturing Systems
Security Update Server Registration, Active scanning and Windows patching.
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
SLAC Remote Access and Citrix XPe Brian Scott SLAC May 2004.
HEPIX May 2004 Edinburgh Linux/Unix highlights.
UKOLN is supported by: Future-proofing the Technology – Addressing the Challenge Dr Liz Lyon, UKOLN, University of Bath, UK Collaboration for Sustainability.
D. Elia, R. SantoroITS week / SPD meeting - May 12, Test beam data analysis D. Elia, R. Santoro – Bari SPD Group Alignments, plane rotation for setup.
June 2008 Surf Safely with a Clean Computer Roger Thornburn.
17 May Multiple Sites. 17 May Multiple Sites This presentation assumes you are already familiar with Doors and all its standard commands It.
An Advanced Shell Theory Based Tire Model by D. Bozdog, W. W. Olson Department of Mechanical, Industrial and Manufacturing Engineering The 23 rd Annual.
Automating Test File Creation Using Excel, UltraEdit, and Batch files to build test data.
© Pearson Education Limited, Chapter 8 Normalization Transparencies.
David Evans CS200: Computer Science University of Virginia Computer Science Lecture 6: Cons car cdr sdr wdr.
Interaction of Particles with Matter
1 Cluster Operating System Support For Parallel Autonomic Computing Andrzej M. Goscinski, J. Silcock, M. Hobbs School of Information Technology Deakin.
David Evans CS200: Computer Science University of Virginia Computer Science Class 38: Intractable Problems (Smiley Puzzles.
· SoftScan Solna Strandväg Solna Sweden The less you hear from us the better Shhh… The less.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
8 April Doors TM Set System Options. 8 April Set System Options Allows you to set certain standard Doors operating parameters and enable certain.
Security in the NT Environment at SLAC HEPNT at CERN December 4, 1998 Bob Cowles, SLAC.
By Hiranmayi Pai Neeraj Jain
Your Users, Friend or Foe? Matthew Sullivan IT Security Manager, the University of Canberra Creator, the Spam and Open Relay Blocking System (SORBS)
Recent Security Threats & Vulnerabilities Computer security Bob Cowles HEPiX, Fall 2004 – Brookhaven, NY, USA Work supported.
1 Security Update Vaughn Book SVP – Chief Technology Officer Arrowhead Credit Union November 9, 2004.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
SLAC Vulnerability Scanning Cyber Security Working Group - LBL December 5, 2005 Teresa Downey - SLAC.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA USA
Computer Security Update Bob Cowles, SLAC stanford.edu Presented at HEPiX - TRIUMF 23 Oct 2003 Work supported by U. S. Department of Energy.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
Computer Security Update Bob Cowles, SLAC stanford.edu Presented at RAL 09 Dec 2002 Work supported by U. S. Department of Energy contract.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Introduction to Active Directory December 10th, pm Daniels 407.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
CERN’s Computer Security Challenge
Understanding the Risks Is Safe Computing Possible? Bob Cowles TERENA Conference 2005 – Poznań, Poland Work supported by U.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Honeypot and Intrusion Detection System
The Microsoft Baseline Security Analyzer A practical look….
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Computer Security Update Bob Cowles, SLAC stanford.edu Presented to HEPiX at Fermilab 23 Oct 2002 Work supported by U. S. Department of Energy.
3-Dec-1998 Stanford Linear Accelerator Center Patrick R. Hancox
What is Computer Security. The Problem There are some bad guys: They are called viruses (or viri)
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Rootkits What are they? What do they do? Where do they come from?
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
CNIT 124: Advanced Ethical Hacking Ch 10: Client-Side Exploitation.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
NetTech Solutions Protecting the Computer Lesson 10.
Introduction TO Network Administration
Computer Security By Duncan Hall.
Recent Security Threats & Vulnerabilities Computer security Bob Cowles HEPiX, Fall 2005 – SLAC Work supported by U. S. Department.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Writing Security Alerts tbird Last modified 2/25/2016 8:55 PM.
On the Road to Eliminating Cleartext Reusable Passwords HEPNT and HEPiX 06 October 1999 Bob Cowles, SLAC Computer Security Officer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Computer Security Keeping you and your computer safe in the digital world.
Working at a Small-to-Medium Business or ISP – Chapter 8
Information Security Session October 24, 2005
Malware March 26, 2018.
Presentation transcript:

Recent Security Threats & Vulnerabilities Computer security Bob Cowles HEPiX, Spring 2004 – Edinburgh, UK Work supported by U. S. Department of Energy contract DE-AC03-76SF00515

25 May 2004HEPiX - Spring Windows uWorms uWindows AD & SUS for patching uViruses uWeb exposures (IE) uLeaked code for WinNT & Win2K

25 May 2004HEPiX - Spring MSBlaster Released MSBlaster at SLAC

25 May 2004HEPiX - Spring Sasser Experience (MS ) uPatched Quickly l Servers within 10 hours l All workstations within 80 hours uVPN changes l No access to local drives of desktops l Firestorm of protest l Disappeared after dust settled (Citrix & RDP) uOngoing problems w/ unpatched systems

25 May 2004HEPiX - Spring AD & SUS for patching uProblematic patching l Office vs.Windows Update l Front Page DLLs l MDAC uMachine vs. User GPOs uSUS Update times uNew Installs uXP SP2 has many improvements (in 2005)

25 May 2004HEPiX - Spring Visitor BaBar Detector BSD Remote access HEP Accelerator SSRL BSD-Private SLAC Basic Internet The way we were …

25 May 2004HEPiX - Spring Visitor BaBar Detector Remote access HEP Accelerator SSRL SLAC Basic Internet The way we were … BSD BSD-Private

25 May 2004HEPiX - Spring Visitor BaBar Detector Remote access HEP Accelerator SSRL SLAC Basic Internet The way we were … BSD BSD-Private

25 May 2004HEPiX - Spring Visitor BaBar Detector Remote access HEP Accelerator SSRL SLAC Basic Internet The way we were … BSD BSD-Private

25 May 2004HEPiX - Spring Visitor BaBar Detector Remote access HEP Accelerator SSRL SLAC Basic Internet The way we were … BSD BSD-Private

25 May 2004HEPiX - Spring Visitor BaBar Detector BSD Remote access HEP Accelerator SSRL BSD-Private SLAC Basic Internet Servers The way we are now …

25 May 2004HEPiX - Spring Visitor BaBar Detector Remote access HEP Accelerator SSRL SLAC Basic Internet Servers The way we are now … BSD BSD-Private

25 May 2004HEPiX - Spring Visitor BaBar Detector Remote access HEP Accelerator SSRL SLAC Basic Internet Servers The way we are now … BSD BSD-Private

25 May 2004HEPiX - Spring Visitor BaBar Detector Remote access HEP Accelerator SSRL SLAC Basic Internet Servers The way we are now … BSD BSD-Private

25 May 2004HEPiX - Spring Viruses uMore sophistication (Bobax and Kibuv) uZip files uEncrypted zip files uFrom microsoft.com uFrom uRun automatically uLeave backdoors; smtp for spam

25 May 2004HEPiX - Spring IE Exposures uNumerous unpatched vulnerabilities uCannot escape IE (but can control) uUnclear how much XP SP2 will fix uThere is still problem of user knowledge

25 May 2004HEPiX - Spring Unix & Linux uLocal Exploits = Remote Exploits umremap (2 times) uASN.1 udo_brk uSolaris: vfs_getvfsws() uCDE dt….. uXfree86 uyp*

25 May 2004HEPiX - Spring Universities & Labs uExploits against Solaris, AIX, Linux uAttacker(s) seem sophisticated uInstall SK rootkit on Linux uInstall trojaned sshd l gets passwords from keyboard/tty entry l accesses RSA keys uCracks yp or kerberos password files uOne time password tokens are in your future

25 May 2004HEPiX - Spring Cisco uRouter uBGP (TCP problem) uWireless access points uPIX uStolen code for IOS

25 May 2004HEPiX - Spring Security Software uCheckpoint uBlack Ice uZone Alarm uISS RealSecure (IDS) uTCPDump / Ethereal uNorton anti-virus uPIX

25 May 2004HEPiX - Spring Macintosh uUSB Keyboard - ^C gives local root uApple File Server bo uQuicktime bo uURL processing in Terminal app uSafari – Help system bo uVolume URI handler registration (no fix)

25 May 2004HEPiX - Spring Other Software uGrid – Slashdot & 2600 uIM software – AIM & Yahoo Messenger uCVS uRealPlayer uWinzip uWeb HP JetAdmin uAcrobat Reader 5.1 uDameware & Serv-U

25 May 2004HEPiX - Spring DameWare How I spent my Christmas vacation

25 May 2004HEPiX - Spring DameWare (2) uOver 13 different Warez kits installed u30 compromised machine, half used for scanning other systems uftp speed tests were run to measure suitability for storing warez uServ-U ftp and Radmin installed at random port numbers. uLook at Hacker Defender – rootkit for Windows available in source to avoid AV scanners

25 May 2004HEPiX - Spring uEvils of HTML l Its big & it hides bad stuff uPhishing scams l Citibank, eBay, PayPal uOutlook 2003 setting (reg for Outlook XP) udidtheyreadit.com

25 May 2004HEPiX - Spring Outlook 2003 Tools -> Options -> Preferences

25 May 2004HEPiX - Spring didtheyreadit.com u tracking using transparent gif image uNot clear how they track time open uFollows forwarding of uTechnically easily defeated l but most dont know how

25 May 2004HEPiX - Spring Final Thoughts uAttacks coming faster; attackers getting smarter uComplex attacks using multiple vulnerabilities uNo simple solution works l Patching helps l Firewalls help l AV & attachment removal help l Encrypted passwords/tunnels help uYou cant be secure; only more secure uWe must share information better l HEPiX Security list – do we need a PGP encrypted r er?