The Approach to Security in CLRC Gareth Smith With acknowledgements to all the members of the CLRC Computer Network and Security Group, especially Trevor.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

How Does the Internet Work? A Basic Introduction to the Worlds Biggest Computer Network.
Physics Network Integration Chris Hunter. Physics network team Chris Hunter : Network Manager David Newton : Network Support Technician Room DWB 663 Phone.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
HIPAA Security Standards What’s happening in your office?
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Computer Networks An Overview. A Computer Network!
Wi-Fi Structures.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Virtual Company Group 8 Presentation Date: June /04/2017
Leaders’ Forum, March 16, 2006 The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Chapter 7: Using Windows Servers to Share Information.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
By Kyle Slinger.  A network is where you can send information to and from different PCs.
PPD & CLRC's response to the (IS) Security Threat Gareth Smith PPD/CG Christmas Lectures 2002.
1 Web Server Administration Chapter 1 The Basics of Server and Web Server Administration.
CERN’s Computer Security Challenge
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
22nd March 2000HEPSYSMAN Oxford Particle Physics Site Report Pete Gronbech Systems Manager.
E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Gareth Smith RAL PPD RAL PPD Site Report. Gareth Smith RAL PPD RAL Particle Physics Department Overview About 90 staff (plus ~25 visitors) Desktops mainly.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Gareth Smith RAL PPD HEP Sysman. April 2003 Security Changes at RAL.
Security Issues Introduction.. Security All the connectivity schemes you will hear about have security implications. –4 computer security incidents in.
JLAB Password Security Ian Bird Jefferson Lab HEPiX-SLAC 6 Oct 1999.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Central Management of 300 Firewalls and Access-Lists Fabian Mauchle TNC 2012 Reykjavík, 21-May-2012.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Chapter 7: Using Windows Servers
Connecting Desktops and Laptops to Networks
TMG Client Protection 6NPS – Session 7.
Instructor Materials Chapter 7 Network Security
TECHNOLOGY GUIDE THREE
Backdoor Attacks.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Computers
Welcome To : Group 1 VC Presentation
CompTIA Server+ Certification (Exam SK0-004)
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Information Security Session October 24, 2005
IS 4506 Server Configuration (HTTP Server)
Level 2 Diploma Unit 11 IT Security
Firewalls Jiang Long Spring 2002.
Leaders’ Forum, March 16, 2006 The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information.
Presentation transcript:

The Approach to Security in CLRC Gareth Smith With acknowledgements to all the members of the CLRC Computer Network and Security Group, especially Trevor Daniels and Chris Seelig.

Organisational Structure CLRC IS Security Officer Departmental IS Security Officers Computer & Network Security Group. Central Networking and Computer Support Teams

History CNSG created in 1998 – result of audit recommendations. –Before security matters handled in separate interest groups (e.g Windows NT). –Manual checking of logs for scans and application of network blocks in router. –Creation of list for security matters.

1999 – Firewall Set-up Early: –Drafting security policy. –Some protocols filtered. Mid: –Move server systems into given range of IP addresses and block incoming TCP connections to all others. Implemented in routers –Tighten (and check) NT passwords. End: –Start to put protocol filtering in for servers. –Draft incident recovery procedures

2000 As result of audit: –Define systems of High Business Impact –Modem registry Lovebug Virus – Approx 100 systems infected. –Filters put in Exchange and use of Outlook Security Patch.

2001 Concerns over security of home PCs with always on connections. –Guidelines requiring anti-virus and personal firewall on laptops & systems dialling in. Start internal audits of departments. Define rules for use of wireless LANs Concerns over IIS security – aim to reduce numbers of web servers. Use blacklist to filter spam mail. Nimda worm/virus. About 6 systems infected. –Force use of web cache.

2001 – Firewall Upgrade Upgrades to networking (within and off-site) Gnatbox – –PC based system. Some 300 – 400 rules.

2002 Bad start to year with rise in number of incidents. Roll out of latest Internet Explorer Security Patch within a week. Who knows what is next ……

Nimda Virus / Worm 4 methods of infection: – –Web browsing –Network shares –Code Red worm.

protection Exchange Server Mail staging Anti Virus Scan (1) Anti Virus Scan (2) Some attachments removed. Outlook Client Anti-Virus Scan (3) Some attachments removed.

Lack of protection LINUX Client IMAP POP RAL Network RAL Institute for fusion in cold beer bubbles Disk server Internet

How have we been hacked (1) Anonymous ftp left open on web server. –Found by anti-virus software. –System being used as a repository. –Analysis of logs was confusing –Server had to be completely re-installed.

How have we been hacked (2) RAL Boulby Mine CISCO Router Firewall Router Internet ISDN 400km End System

Concerns / Aims Concerns –Rapidly spreading virus/worm. Need to subdivide network to contain any infection. –Risks of web browsing Need to keep patching. Aims –More than one line of defence in all cases.