Student Tech Security Training. ITS Security Office



Similar documents
BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

FORBIDDEN - Ethical Hacking Workshop Duration

AVeS Cloud Security powered by SYMANTEC TM

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Loophole+ with Ethical Hacking and Penetration Testing

An Introduction on How to Better Protect Your Computer and Sensitive Data

Guideline for Prevention of Spyware and other Potentially Unwanted Software

End-user Security Analytics Strengthens Protection with ArcSight

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Computer Viruses: How to Avoid Infection

Countermeasures against Spyware

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Host-based Intrusion Prevention System (HIPS)

Endpoint Protection Small Business Edition 2013?

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Course: Information Security Management in e-governance

Section 12 MUST BE COMPLETED BY: 4/22

ViRobot Desktop 5.5. User s Guide

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

What Do You Mean My Cloud Data Isn t Secure?

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Secure Your Mobile Workplace

Industrial Security for Process Automation

Common Cyber Threats. Common cyber threats include:

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

Trend Micro OfficeScan Best Practice Guide for Malware

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Open an attachment and bring down your network?

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

What you need to know to keep your computer safe on the Internet

INFORMATION SECURITY FOR YOUR AGENCY

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Cybersecurity Health Check At A Glance

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Nessus and Antivirus. January 31, 2014 (Revision 4)

Remote Deposit Quick Start Guide

Infocomm Sec rity is incomplete without U Be aware,

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

Client Security Risk Assessment Questionnaire

Information Security Threat Trends

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Data Management Policies. Sage ERP Online

PC Security and Maintenance

Cyber Essentials Scheme

Codes of Connection for Devices Connected to Newcastle University ICT Network

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

McAfee Internet Security Suite Quick-Start Guide

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

How-To Guide: Cyber Security. Content Provided by

Why is a strong password important?

CYBERTRON NETWORK SOLUTIONS

Using Spy Sweeper for Windows Author: Jocelyn Kasamoto

Keystroke Encryption Technology Explained

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Data Management & Protection: Common Definitions

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Home Use Installation Guide For Symantec Endpoint Protection (SEP) 11 For Mac

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Top 10 Tips to Keep Your Small Business Safe

Network Incident Report

Certified Secure Computer User

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Information Security

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Desktop and Laptop Security Policy

Getting Started with Symantec Endpoint Protection

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Transcription:

Student Tech Security Training ITS Security Office

ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with IDS Incident Response Work with Network Security Contacts Education System Security Assessment Policy Compliance Copyright Violations

Network Citizenship Policy Intended to protect campus network. At UI persons owning or overseeing network connected systems are responsible for securing them. Servers, laptops, handhelds, lab equipment, etc. Systems posing a threat to campus network will be removed.

Who are the Customers Faculty viewpoint Loss of Control Loss of Privacy Transparency Unforgettable experiences Be a resource Share experiences Lend advice

Baseline Security Standards Software Updates Automatic updates Anti-virus UI site license Update virus signatures Strong Administrator Passwords Support Contacts Best Practices http://cio.uiowa.edu/itsecurity/bestprac/

Legal Responsibilities Confidential Data HR Data University records Legally Protected Data HIPAA - Health Insurance Portability and Accountability Act FERPA Family Educational Rights and Privacy Act Graham Leach Bliley

What s an Incident Incidents System Intrusion Web defacement Intrusion Attempts Malicious Scanning Viruses Malware Others? When to Report? How to Report?

Incident Response

Where do threats come from? Unmanaged machines Automated programs or scripts Script kiddies

Types of Threats Malware Viruses Worms Bot Networks Trojans Key-stroke loggers RootKits - Hacker Defender Software Vulnerabilities Privilege Elevation Bugs / Glitches / Fuzzing Full Disclosure vs. Obscurity

Types of Threats Social Engineering Phishing Tricking people to run applications, open e-mail attachments or navigate to websites Cross Site Scripting Trojan website Identity Theft Credential Theft / Impersonation Financial Theft

Report & Prevent Report Phishing http://www.antiphishing.org/phishing_arc hive.html Information about Identity Theft http://www.consumer.gov/idtheft/index.h tml

Spyware Spyware How do you get Spyware By downloading Attractive applications, utilities and games Utilities like Weatherbug P2P file sharing Obscure EULAs Captures data from your computer Monitors your actions on the Internet Installs programs without your consent Places Intelligent Ads

You might have spyware if: You notice new toolbars, links, or favorites that you did not want or place in your Web browser. Your default home page, mouse pointer, or search program changes. You type the address for a specific Web site, but are taken to another Web site without notice. You see a lot of pop-up ads, even if you're not on the Internet. Your computer suddenly performs slowly or seems unstable.

Hacking Google Use search engines to find vulnerabilities http://johnny.ihackstuff.com usernames filetype:log username putty Management Consoles inurl:rpsys.html And Many more

What s our exposure Fast Internet connection Thousands of fast computers University Values Unrestricted Internet access Individual / Academic Freedom Distributed management Unmanaged computers Broad Acceptable Use Policy Can we block threats? Do we block threats?

Countermeasures & Best Practices Educated Computer Users Understand relevant technology Understand the threats Timely response to problems

Countermeasures & Best Practices Careful Computer Management Automate OS + Application Patching Update Anti-virus signatures Regular reliable backups Strong Passwords Principle of Least Privilege UAC User Account Control Access Control Lists Security Auditing MBSA MS Baseline Analyzer Securely Store and Erase Confidential Data

Countermeasures & Best Practices Careful Computer Management Physical Security MS Threats and Countermeasures guide http://www.microsoft.com/windowsxp/usi ng/helpandsupport/getstarted/ballew_03 may19.mspx System services Software restrictions XP Security Guide http://www.microsoft.com/technet/securit y/prodtech/windowsxp/secwinxp/default. mspx

Countermeasures & Best Practices Security Tools Host Based Firewall Windows Firewall Symantec Client Security IPSEC Rules Anti-virus Symantec Corporate Edition Anti-spyware Windows Defender Symantec Anti-virus Security Configuration MS Security Templates

Log Monitoring How do you know when your being attacked? How do you know you ve been attacked Security Event Log http://www.ultimatewindowssecurity.com /encyclopedia.html

Windows Defender http://www.microsoft.com/athome/sec urity/spyware/software/default.mspx Real-time defense Few false positives Automatic updates

MS 10 ways to work more securely http://www.microsoft.com/atwork/get started/worksecure.mspx

Protect Your Computer! http://helpdesk.its.uiowa.edu/security

Security Vs. Convenience

MBSA Hands -on Identifies Common Vulnerabilities Weak or unmannaged policies and configurations Missing OS security updates User accounts

Disaster Recovery Backups, Like care insurance, you don t need it until you need it. But if you need it, you d better have it! Types of Backup Network Drives External Media Tape Drive CD / DVD USB

NT Backup System State

System Restore Restore points System Checkpoints

What should I backup?

Does the restore work? Yes, I m in charge of backups I said backups, I don t know who s in charge of restores Test your restore methods Does your backup contain everything needed?

Keeping up to date Secunia Securityfocus CVE Slashdot RSS Feedreader OMPL

Windows Live One Care http://www.windowsonecare.com/ OneCare Antivirus Antispyware Firewall Performance Tune-ups Data Backup And Restore Norton 360

Windows Live Safety Center Beta Safety Center Web Scanner http://safety.live.com/site/en- US/center/howsafe.htm