Information Security Level II Office of the Vice President for Information Technology Mr. Corbett Consolvo, IT Security Analyst Ms. Lori McElroy, IT Security Officer Iffat Jabeen, IT Security GRA
Agenda University server management requirements Securing your OS how to avoid most attacks Sensitive information scanning File share and permissions management Google scanning Vulnerability scanning Wireless security best practices Risk assessment
Introduction A word about this class This is NOT a hacking class, it s not even an ethical hacking class The goal for this class is to better prepare you to manage security on the systems you are responsible for Why do we care about information security?
How to Avoid Most Attacks The Big 4 OS patches AV update Firewall Use multiple accounts User, Admin
Securing Your OS The Big 4 first Activity 1: Using Windows XP Professional Security Checklist (on your CD)
Windows Security Tools Activity 2: Scanning with Windows Defender Activity 3: Scanning with Microsoft Security Baseline Analyzer
Windows Permissions Activity 4: Share Permissions Check active permission on share Activity 5: Security Permissions Security permissions are more granular permissions on the folders and files inside the share Beware "Inherit Permissions"
Web Site Scanning Open source tools for web site scanning OWASP project www.owasp.org Activity 6: Google Scanning Google Reconnaissance Defenses
Wireless Security Change default Admin password and user name Change default SSID Turn on encryption: WPA, WPA2 Enable MAC Address Filteringin Disable SSID broadcast Do not auto-connect to open WiFi nets Position router and access point to prevent data leakage
Risk Assessment and Auditing Vulnerability Scanning and Log Review Activity 7: NMap for Windows Activity 8: Windows Event Viewer Activity 9: Identity Finder Scanning Optional: Systinternals Optional: Wireshark
Tools and References (some on CD) Windows Server Management Procedures security.vpit.txstate.edu/awareness/best_practices/server/stand ards_procedures.html SANS and other Operating System Hardening and Security Checklists Google Checklists and Cheat Sheets Web Applications list of open source scanning tools and checklists Oracle Hardening Checklist Microsoft Security Baseline Analyzer (MSBA) microsoft.com/technet/security/tools/mbsahome.mspx Nmap for Windows (nmap.org) Windows Defender Sysinternals http://live.sysinternals.com/ Identity Finder www.tr.txstate.edu/software/download/identity-finder.html
Contact and Resources Texas State Sites IT Security - http://www.vpit.txstate.edu/security Texas State Software Downloadswww.tr.txstate.edu/software/download.html Phishing - /awareness/phishing.html Report an Incident to IT Security or /tools/incident_report.html Contacts Information Technology Security 512-245-HACK(4225), Information Technology Assistance Center (Help Desk) 512-245-ITAC(4822) or 512-245-HELP, itac@txstate.edu
Q & A
Q & A