1 Click to edit Master title style Click to edit Master title style
Transcription
1 Click to edit Master title style Click to edit Master title style
Click to edit Master title style • • • • • X Network for styles ICT Co-ordinators Click to edit Security Master text Second level Third level Fourth level Fifth level UKERNA Training V1.070 Click to edit Master title style Introduction X • •Matthew Cook Click to edit Master text styles • Second level • Senior IT Security Specialist •(Loughborough Third level University) • Fourth level • •UKERNA Contracted Trainer Fifth level • Further details available at: http://escarpment.net/ UKERNA Training V1.070 Click to edit Master title style Background • • • • • • Computing Click to edithas Master changed: text styles – ICT is level becoming more critical Second – ICTlevel Security threats are increasing Third – Internet was very small… Fourth level Fifth level Why bother: – Keeping control and availability – Legal, DPA and bad PR – Reactive work loads UKERNA Training V1.070 1 Click to editand Complexity Master Frequency title style • • • • • Click to edit Master text styles Second level Third level Fourth level Fifth level UKERNA Training V1.070 Click to edit Master title style Passwords • • • • • • • Primary Click to edit defence Master from text attack styles Second notes Post-IT level and under keyboards Third level Change them frequently Fourth level Choose good passwords Fifth level BIOS Restrictions Screensavers UKERNA Training V1.070 ClickVirus Anti to edit Master title style • • • • • Essential Click to edit Master text styles Second level Ensure Third level it is regularly updated Fourth Are all vectors level covered? – Floppy Fifth levelDisc – USB Stick – Email • Cover for staff and students UKERNA Training V1.070 2 Click to edit Master title style Malware • • • • • • • • Adware, Click to edit Spyware, MasterMalware, text styles Anti-X Second level Thirdbe Can level very dangerous Fourth level Malicious code Fifth loggers Key level getting more complex Sending SPAM from institution Be careful what software you run Phishing attacks increasing UKERNA Training V1.070 Click to edit Master title style Backup • • • • • • • • Critical, Click to edit imagine Master what text would styles happen… Second can Backup leveltake a number of forms: Third level Tape Drive Traditional Fourth levelNetwork Robot Automated Fifth USB level Hard Disc Ghost Technology Network Synchronisation A finally, test the backup! UKERNA Training V1.070 Click to edit Master title style Patching • • • •• •• • A Click facttoofedit life Master text styles Second level Operating Systems, and programs contain bugs and will need patching Third level Automated Fourth levelSystems HR for Patching Fifth level Advance Notifications UKERNA Training V1.070 3 Click to edit Master title style Configuration • • • • • Click to edit Master text styles Second level Third level Fourth level Fifth level UKERNA Training V1.070 Click to edit Master title style Wireless • • • • • • • • Ubiquitous Click to editcomputing Master text is styles popular Wireless Second level is easy to configure Third level …but hard to secure Fourth Can someone level sit outside and… Fifth MAClevel Address Filtering Hiding SSID WEP Encryption … is just not enough! UKERNA Training V1.070 Click to edit Master title style Firewalls • • •• • •• Block Click to malicious edit Master traffic text coming styles in and out of the network Second level Internet threats are complex and Third level frequent Fourth level Something Fifth level is required to protect the internal network • Hardware firewalls vs Software firewalls UKERNA Training V1.070 4 Click to edit Master title style Disposal • • •• •• • • • What Click to happens edit Master whentext youstyles dispose of a PC or hard discs? Second level What happens to deleted files? Third level Does formatting remove data? Fourth level Fifth level Data disposal policy Wiping tools UKERNA Training V1.070 Click to forward Moving edit Master title style • • • • •• Educating Click to editusers Master text styles – Top ten security resolutions Second level – Training Third level courses – Staff/institution newsletters Fourth level Asking vendors security related Fifth level questions • Reviewing procedures UKERNA Training V1.070 Click to edit UKERNA Training Master title style • • • • • • • • • Portfolio Click to edit of network Master text based styles training Second Over 10 level different courses Training Third level venues in many locations Comprehensive Fourth level course workbook + CD Fifth level Basic Networking Wireless LAN Fundamentals Firewalls: Planning and Implementation Using Logfiles for Security UKERNA Training V1.070 5 Click to edit Master title style • • • • • Click to edit Master text styles Second level Third level Questions? Fourth level Fifth level http://escarpment.net/ UKERNA Training V1.070 6