Presentation is loading. Please wait.

Presentation is loading. Please wait.

Educause Security 2007ISC Information Security Copyright Joshua Beeman, 2007. This work is the intellectual property of the author. Permission is granted.

Similar presentations


Presentation on theme: "Educause Security 2007ISC Information Security Copyright Joshua Beeman, 2007. This work is the intellectual property of the author. Permission is granted."— Presentation transcript:

1 Educause Security 2007ISC Information Security Copyright Joshua Beeman, 2007. This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

2 Educause Security 2007ISC Information Security Security Reporting University of Pennsylvania Joshua Beeman jbeeman@isc.upenn.edu

3 Educause Security 2007ISC Information Security Overview Penn’s environment Version 1 (duct tape, chewing gum…) Version 2 (less gum, more tape…) Results

4 Educause Security 2007ISC Information Security Environment A private university in Philadelphia, PA founded in 1740 22,000 students/4,000 faculty/13,000 staff 7500 students live on campus 9000+ students, staff and faculty live in the surrounding community Health System has separate management –IT division outsourced/15,000 users

5 Educause Security 2007ISC Information Security Environment Computing mostly decentralized over 40 cost centers Some services are managed or coordinated centrally by Information Systems and Computing (ISC) Administrative Systems Support & Security Networking & Telecommunications

6 Educause Security 2007ISC Information Security Environment Open network Decentralized computing Information security concerns continually growing Limited funding Does this sound familiar to anyone?

7 Educause Security 2007ISC Information Security Environment Why a Security Report? Awareness Identify larger trends Develop security “hawks” Improve customer service

8 Educause Security 2007ISC Information Security Report – v.1 Incident Tracking via Excel Spreadsheet: Date IP address Center name Incident source Incident type Handler comments (optional)

9 Educause Security 2007ISC Information Security Report – v.1 Key Elements – Compromises: Total number of compromises Total number of IP addresses Ratio of Compromises/IP’s Ranking (based on ratio) Average (based on ratio)

10 Educause Security 2007ISC Information Security Report – v.1 Key Elements – Critical Hosts: Total number of Critical Hosts registered Total number of IP addresses Ratio of Critical Hosts/IP’s Ranking (based on ratio) Average (based on ratio)

11 Educause Security 2007ISC Information Security Report – v.1 Key Elements – Management Reports: Summary tables –Compromise ranking –Critical Host ranking Summary graphs –Incident source –Overall distribution

12 Educause Security 2007ISC Information Security

13 Educause Security 2007ISC Information Security

14 Educause Security 2007ISC Information Security

15 Educause Security 2007ISC Information Security

16 Educause Security 2007ISC Information Security

17 Educause Security 2007ISC Information Security

18 Educause Security 2007ISC Information Security

19 Educause Security 2007ISC Information Security

20 Educause Security 2007ISC Information Security Report – v.2 GRADI (web-based incident tracking system) Captures previous fields plus… Case Status (Pending, closed, etc.) MAC Address Wallplate Port List User PennKey …and more for certain case types

21 Educause Security 2007ISC Information Security Report – v.2 GRADI (continued) In addition provides automated processes for: DNS & host contact lookup Custom handling based on incident type Emailing/routing Searching, export, etc.

22 Educause Security 2007ISC Information Security Report – v.2 Previous Key Elements: Compromises Critical Hosts Critical Events Management reports

23 Educause Security 2007ISC Information Security Report – v.2 Plus New Elements: Wireless, Wired DMCA, non-DMCA Critical Vulnerabilities New management reports Comparative studies

24 Educause Security 2007ISC Information Security

25 Educause Security 2007ISC Information Security

26 Educause Security 2007ISC Information Security

27 Educause Security 2007ISC Information Security Results Provided senior management with tools and data Increased information security awareness Identified larger trends, problem areas Improved Universities overall security posture Created security “hawks”

28 Educause Security 2007ISC Information Security

29 Educause Security 2007ISC Information Security

30 Educause Security 2007ISC Information Security

31 Educause Security 2007ISC Information Security Results Remember that v.1 was based on: Individual Excel spreadsheets 5 data fields


Download ppt "Educause Security 2007ISC Information Security Copyright Joshua Beeman, 2007. This work is the intellectual property of the author. Permission is granted."

Similar presentations


Ads by Google