Are You Exposed Network Security Threats Inside The

  • Slides: 9
Download presentation
Are You Exposed? Network Security Threats Inside The Perimeter Morris Bennett Altman Director of

Are You Exposed? Network Security Threats Inside The Perimeter Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Morris. Altman@qc. cuny. edu

18, 000 full time equivalent students located in suburban New York City 76 acre

18, 000 full time equivalent students located in suburban New York City 76 acre campus with 33 buildings 5, 000 computers on the campus network Wireless network covering 98% of the campus

Security Challenge - Hackers The Effect of Hackers – System down time – Network

Security Challenge - Hackers The Effect of Hackers – System down time – Network down time • Outbound DOS attacks swamped Internet Link and/ or edge routers – Loss of productivity – Loss of confidence – Data Loss – Information disclosure

Security Challenge - Hackers Preventing Hackers – Firewall & Security Zones – System Updates

Security Challenge - Hackers Preventing Hackers – Firewall & Security Zones – System Updates – Account Policies • One user per account • Strong passwords • Deactivate on departure – IDS/IPS – Application Firewall – Data Encryption

Security Challenge – Virus/Worm Preventing Infections – Keep systems up to date on all

Security Challenge – Virus/Worm Preventing Infections – Keep systems up to date on all application/OS patches – Personal firewall enabled on every connected computer – Require antivirus on every connected computer – Make antivirus free for home use – Scan all e-mail for viruses

Security Answer – Security Policies & Enforcement – Strong computer use policy – Conduct

Security Answer – Security Policies & Enforcement – Strong computer use policy – Conduct regular penetration test for all systems • Servers • Desktops – Deploy intrusion prevention technology • Stop dangerous activity before damage is done – Deploy Network Access Control Staff

Fore. Scout’s Counter. ACT Intrusion Prevention – Identifies dangerous traffic before it damages our

Fore. Scout’s Counter. ACT Intrusion Prevention – Identifies dangerous traffic before it damages our network – Works without signatures Network Access Control – Create and enforce network security policies – Does not require endpoint agent to interrogate and enforce policies

Questions? Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY

Questions? Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Morris. Altman@qc. cuny. edu