Data Security Symposium. Network Security and Planning Ron Ternowski



Similar documents
Network Security. Mike Trice, Network Engineer Richard Trice, Systems Specialist Alabama Supercomputer Authority

1B1 SECURITY RESPONSIBILITY

Cisco ASA 5500 Series Business Edition

Network and Security Controls

How To Protect Your School From A Breach Of Security

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Best Practices For Department Server and Enterprise System Checklist

13. Acceptable Use Policy

AASTMT Acceptable Use Policy

How to Practice Safely in an era of Cybercrime and Privacy Fears

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

University System of Maryland University of Maryland, College Park Division of Information Technology

Section 12 MUST BE COMPLETED BY: 4/22

Guideline on Auditing and Log Management

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Odessa College Use of Computer Resources Policy Policy Date: November 2010

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Top tips for improved network security

Implementing Cisco IOS Network Security

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Cyber Essentials Questionnaire

Supplier Information Security Addendum for GE Restricted Data

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

IINS Implementing Cisco Network Security 3.0 (IINS)

Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students

Protecting personally identifiable information: What data is at risk and what you can do about it

The University of Information Technology Management System

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title

Research Information Security Guideline

Security Virtual Infrastructure - Cloud


NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Achieving PCI-Compliance through Cyberoam

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

How To Protect A Network From Attack From A Hacker (Hbss)

Data Security and Healthcare

NETWORK SECURITY GUIDELINES

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

PortWise Access Management Suite

GFI White Paper PCI-DSS compliance and GFI Software products

8 Steps for Network Security Protection

The Information Security Problem

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

8 Steps For Network Security Protection

Hosted Exchange. Security Overview. Learn More: Call us at

National Cyber Security Month 2015: Daily Security Awareness Tips

Case Study: Security Implementation for a Non-Profit Hospital

CPSC 467: Cryptography and Computer Security

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

plantemoran.com What School Personnel Administrators Need to know

Did you know your security solution can help with PCI compliance too?

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

FIREWALL POLICY DOCUMENT

Altus UC Security Overview

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Protect your personal data while engaging in IT related activities

The Cloud App Visibility Blindspot

March

INTRUSION DETECTION SYSTEMS and Network Security

74% 96 Action Items. Compliance

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

INSTANT MESSAGING SECURITY

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Information Technology Acceptable Use Policies

Management and Storage of Sensitive Information UH Information Security Team (InfoSec)

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

Network Security Policy

System and Network Security Policy Internet User Guidelines and Policy. North Coast Council West Canal Road Valley View, Ohio 44125

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

La Cañada Unified School District Personnel Use of Technology Regulations (AR ) Also known as the Staff Technology and Internet Use Policy

Hang Seng HSBCnet Security. May 2016

NON-PROFIT ORGANIZATIONS NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT CONTRACTING

Hengtian Information Security White Paper

Through the Security Looking Glass. Presented by Steve Meek, CISSP

The Hillstone and Trend Micro Joint Solution

Information Technology Acceptable Use Policy

Best Practices for Outdoor Wireless Security

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

FileCloud Security FAQ

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Network Security Guidelines. e-governance

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.

State of Texas. TEX-AN Next Generation. NNI Plan

Our Mission. Provide traveling, remote and mobile laptop users with corporate-level security

Chapter 1 The Principles of Auditing 1

Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data

Global Partner Management Notice

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

CONTENTS. PCI DSS Compliance Guide

Transcription:

Data Security Symposium Network Security and Planning Ron Ternowski

Data Security Symposium Today s Activities 9:40 a.m. 10:30 a.m. Session I 10:30 a.m. 10:40 a.m. Break 10:40 a.m. 11:30 a.m. Session II 11:30 a.m. 11:40 a.m. Break 11:40 a.m. 12:30 p.m. Session III 12:30 p.m. 1:15 p.m. Lunch 1:15 p.m. 2:15 p.m. Second Keynote 2:15 2:45 p.m. Panel Discussion and Wrap Up

Network Security and Planning C.I.A. Data Breach Network Security Network Firewalls VPN Access Content Filtering BYOD Transfer of Data i.e. dropbox, vendor drives, icloud Email Security Passwords

C.I.A. Confidentiality ensures that the necessary level of secrecy is enforced at each junction of data processing and prevents unauthorized disclosure. Integrity the assurance of the accuracy and reliability of the information and systems is provided, and any unauthorized modification is prevented. Availability ensures reliability and timely access to data and resources to authorized individuals.

C.I.A Security in Layers

C.I.A What encompasses security?

Data Breach Why do we worry about security? Insurance company, WellPoint, fined $1.7m over data exposure - In 2009, WellPoint reported to the federal agency that an online database holding personal and health information for 612,402 individuals was left accessible over the Internet between October 2009 and March 2010. The data included names, addresses, birth dates, Social Security numbers, phone numbers and health information. 6,300 USC students warned about data breach The University of South Carolina is dealing with another data breach while it continues work to eliminate unnecessary use of Social Security numbers. USC sent letters this week to 6,300 students whose personal information, including Social Security numbers, could have been on a laptop stolen from the physics department.

Data Breach Fla. Dept. of Education Reports Breach - The Florida Department of Education reports that 47,000 participants in a teacher preparation program had personal information exposed on the Internet for 14 days during a data transfer between servers housed at Florida State University. Compromised information includes names, Social Security numbers, and, in some cases, addresses, according to a spokesperson for the Department of Education. The university is performing work under contract with the education department, according to a statement the Department of Education provided to DataBreachToday. Upon discovering the problem, the education department closed off access to the personal information, cleared all cached data files and ran security checks to ensure information was only accessible by authorized users, according to the statement. An investigation determined that the information may have been accessed 23 times via Google; that may have included unauthorized access, the statement acknowledges. Affected Individuals are being offered free credit monitoring services, the spokesperson said.

Network Security Documentation Physical security Is the server room locked? Are the cabinets locked? Are switches/routers in a locked cabinet with controlled access? VLAN Design By building? By Network segment? By usage? Are servers on their own VLAN? Segmented by Firewall? DHCP Snooping Trusted interfaces are the only responders to requests. SLPP (Avaya) and BPDU Guard (Cisco) disable any port that receives a BPDU message, helps prevent loops.

Network Security Layer 2 Always use a dedicated VLAN ID for all trunk ports. Avoid using VLAN 1. Set all user ports to access. Deploy port security when possible for user ports. Enable STP attack mitigation (BPDU Guard, Root Guard, SLPP). Disable all unused ports and put them in an unused VLAN. Ensure DHCP attack prevention where needed.

Network Firewalls Checkpoint Firewall Model 4800 Running Gaia R75.40 Multiple Security Zones Server Area BYOD DMZ VPN Capable Statefull Firewall Feature Availability IPS capable, Application Awareness, Identity Awareness

Network Firewalls Firewall Rules

Network Firewalls Firewall Logs Real-time and historical

VPN Access Multiple methods for VPN Access Contivity, ASA, Firewall How do you control and log access? Is it tied to your directory structure? Who has access? When and from where was it accessed? MOST IMPORTANT What access do the end-users have? Very Important that the access and user accounts are audited on a regular basis. Recommend every quarter but should be done annually as a minimum.

Content Filtering Lightspeed Systems URL Filtering P2P Networks Proxy Blocking Port Blocking Blocked File Extensions Blocked Search Keywords Reports, Reports, Reports Search Queries and Suspicious Search Queries Web Activity Peer 2 Peer Report option Summary Reports

Content Filtering - Options

Content Filtering Blocked File Extensions

Content Filtering Blocked Search Keywords

Content Filtering - Reports

Content Filtering - Reports

Content Filtering - Reports

BYOD What do we do???

BYOD School Board Policy? Is there one? Do we need to update? Is there an AUP for Staff or Students? E1B Policy Group can Assist. Where do we put these devices? BYOD network? Off the firewall? What type of authentication should be used, if any? What level of filtering should they have? How do we track these individuals?

Transfer of Data How is data moved in our District? Do we know where all of our PII is kept? Do we know when it is moved? Is it moved securely? Remember the CIA Triad. Do we know who has access to this data? What permissions are on the folders, files, shares? Are we using cloud services? Are you sure??? Dropbox SkyDrive Google Drive icloud

Email Security What email system do you use? How is it accessed? Is it available from outside the District? Is the client or web based access encrypted? Are you using a SPAM service? Do you have clear rules about email use? Establish and promote a robust email policy AUP i.e. Do not forward inappropriate material, not for personal use, limit attachment size to X MB s Present the dangers clearly. Viruses, trojans, bots, spam and phishing attacks. Hatemail, bullying, other inappropriate actions. Illegal or copyright file transmission. Regulatory breaches FERPA, HIPPA

Email Security Email Etiquette Train the user regularly What to send. Who to send to. Reply vs Reply All vs BCC Scan all emails and attachments for viruses Prevent data loss through email Block attachments by file type. Add disclaimers and banners to emails in both directions. Ensure your system is not being abused by unknown or malicious users.

Passwords Password Policy!!! What is an acceptable compromise between security and your end-users?

Contact People WNYRIC Service Desk servicedesk@e1b.org (716)821-7171 or (800) 872-0780 WAN Seniors ON Region Dave Buettner E1 Region Chris Siniscalchi E2 Region Pat Gugino CA/GST Regions Kyle Lyon Buffalo Ken Koch Content Filtering Barb Fedchak Ron Ternowski

Data Security Symposium Questions??