TSAG Meeting 1/09/02 Update on Current Technology Initiatives Steven Fitzgerald.

Slides:



Advertisements
Similar presentations
Presenter: Mark Elkins Topic: Things not getting done.
Advertisements

E MAIL CONFIGURATION. 1] Select option from main menu 2] Select account 3] Go to option menu & select New account 4] Start to create new.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Technology Update TSAG Meeting 8/8/02. Announcements: Account Cleanup  Number of Accounts: 41,338  Number of Faculty/Staff:~ 3,000  Number of Students:~30,000(~
Impact of the Recent UC Denver Remote Computing Audit May, 2010.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Technology Update TSAG Meeting 9/12/02. Announcements: Mandatory Password Changes Coming in October! (Postponed) End of BootP (November 1) DNS Cleanup.
Technology Update TSAG Meeting 6/13/02. Announcements: DNS Naming and Cleanup (coming!)  imap: , mail, mail1, mailsrv1  telnet, csun1: csun2, hp9k2,
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Technology Update TSAG Meeting 11/14/02. Announcements: Spam Open Forum  Monday November 18, 2pm-3pm  OV Presentation Room Campus Operations Center:
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Update and Discussions on Technology Initiatives TSAG Meeting 4/11/02.
Chapter 2 Networking Overview. Figure 2.1 Generic protocol layers move data between systems.
Technology Update TSAG Meeting 10/10/02. Announcements: DNS Cleanup Send periodic ICMP ping probes to all DNS entries (8/26- 9/13) Correlate data obtained.
TSAG Meeting 3/14/02 Update on Current Technology Initiatives.
Technology Update TSAG Meeting 7/11/02. Announcements: DNS Naming and Cleanup (coming!)  imap: , mail, mail1, mailsrv1  telnet, csun1: csun2, hp9k2,
COEN 252: Computer Forensics Router Investigation.
Implementing Exchange Server Security Ward Solutions.
Setting up Your New Mail Domain in MS Outlook and Outlook Express By CS Ling (Global Visibility Solution)
POP Configuration Microsoft Outlook What is POP? Short for Post Office Protocol, a protocol used to retrieve from a mail server. Most.
1 Enabling Secure Internet Access with ISA Server.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
FortiGateAntivirusFirewallOverview. 2 Fortinet Technologies Network Security Network security can be viewed from three perspectives: t controlling access.
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Backup Local Online For secure offsite storage of your , and making it available from any computer or smart phone. Backup accessed with.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
First, open Microsoft Outlook How To Configure Microsoft Outllook For Your Webspace Account.
Configuring Windows Vista Applications Lesson 9. Skills Matrix Technology SkillObjective DomainObjective # Configuring Internet Explorer 7 Configure Windows.
Chapter 6: Packet Filtering
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Technology Update TSAG Meeting 4/8/04. Announcements IPX and Appletalk being phased out Friday June (Last day of academic year)
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
The Internet Just the Facts. Protocols TCP/IP are the TRANSPORT protocols of the Internet Services use TCP/IP to connect to other computers on Internet.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Update on  Mail Gateways  Servers  Spam Tagging  Anti-Virus  IMAP  Web Mail  LISTSERV  POP.
Module 10: How Middleboxes Impact Performance
Dear All, Due the problem in sending mails on other We have changed the SMTP Port No. New SMTP Port no. is To do the change.
Technology Update TSAG Meeting 12/12/02. Announcements: Campus Operations Center: Holiday Hours  Christmas: 12/22-1/1 8am-5pm Coverage  On Call Coverage:
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Security fundamentals Topic 10 Securing the network perimeter.
Security fundamentals Topic 9 Securing internet messaging.
POP - Mailbox Access Note – OS & Outlook (2007/2010) should be fully patched with latest service pack and patches.
A Network Security -Firewall Bruce Turin.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
how to configure Gmail account in MS Outlook 2010 account?
Security fundamentals
How to Access an AOL Account with Outlook?
Internet Business Associate v2.0
Working at a Small-to-Medium Business or ISP – Chapter 8
Enabling Secure Internet Access with TMG
IMAP - Mailbox Access Note – OS & Outlook (2007/2010) should be fully patched with latest service pack and patches.
7 Steps to Set Up AT&T on MS Outlook | Customer Support Number
Gmail: Websit: mirzaie-aiu.blogfa.com
© NTT Communications 2017 All Rights Reserved
Virtual Private Network
Chapter 7 Network Applications
On the off chance that your business utilizes Roadrunner as your Internet specialist organization, you will have at least one accounts. While you.
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

TSAG Meeting 1/09/02 Update on Current Technology Initiatives Steven Fitzgerald

Announcements Availability: Gartner Group Data: Replacement: Account Maintenance System (January 28, 2002) Phase out: Meeting Maker V5 (January 19, 2002) Release: Web-based (February 5, 2002) Changes: –To mitigate SPAM mail (February 15, 2002) (mail header must be addressed appropriately) –To strength Modem Pool Authentication (* ) (Pending)

Changes Place tighter restrictions on Mail Headers –Incoming mail “To” field must be valid CSUN address –Outgoing mail “From” field must be a valid CSUN address “Reply-to” filed may be any valid address I.e., mail header must be addressed appropriately. New canonical names for mail servers –Valid: imap, pop3, and smtp –Deprecated: , krusty, mail1 Preparing for Authenticated SMTP

Outlook Mail Configuration Insert screen shot of –outlook ->tools->accounts->properties->General –outlook ->tools->accounts->properties->Servers –outlook ->tools->accounts->properties->Advanced

Modem Pool Changes Change: Uses must call modem pool with Caller-ID enabled Reasons: –To reduce amount of SPAM mail –To reduce DOS attacks –To increase accountability Telephone Number: * Enforcement Date: Pending

Access Control Reduce the amount of SPAM mail Reduce exposure to copyright infringement Reduce exposure to DOS attacks Increase bandwidth to campus community Increase the integrity of inter- and intra-campus network communications Increase productivity of all by not dealing with SPAM and other such attacks

Approach Attack problem in levels Reduce the number of entry points to campus Reduce the number of exit points to campus Move towards authenticated and encrypted protocols and applications, e.g., SSH SSH (secure shell as an alternative to telnet) –csun1.csun.edu: SSH-1.99-OpenSSH_3.0.2p1 (Good) –nikita.csun.edu: SSH-1.99-OpenSSH_3.0.1p1 (Bad) Draft Policy is emerging

Draft Policy (for discussion purposes) 1.All inbound network connections shall be limited to only identified servers on specific ports. 2.All outbound network connections shall be sent to only appropriate servers on specific ports. 3.All network traffic that carries data that have “privacy” issues shall be encrypted. Definition of “servers” and required “ports” is defined locally

Thoughts on Web Improvements Intranet Web (via vhosting) URL File location ~tsag/public_html ~tsag/campus_html (enforcement of https protocol, is there a need?) PHP Enhanced Search Capabilities Statistics Gathering