dark alleys part2

18
Dark Alleys of the Internet Part 2 ACE/NETC 2007 June 19, 2007 Albuquerque, NM Do the Right Thing!

Upload: anne-adrian

Post on 26-Jun-2015

936 views

Category:

Technology


0 download

DESCRIPTION

Internet security tips for network administrators

TRANSCRIPT

Page 1: Dark Alleys Part2

Dark Alleys of the Internet

Part 2

Dark Alleys of the Internet

Part 2

ACE/NETC 2007June 19, 2007

Albuquerque, NM

Do the Right Thing!

Page 2: Dark Alleys Part2

Attack StatisticsAttack Statistics» AU Border Firewall

• Packets blocked by 1000s

» Intrusion Prevention System (blocking recommended attacks) (week of 5/28-6/02)

• 90,540 – blocked packets• 25,147 – suspicious packets• 3,893 – possibly successful

Page 3: Dark Alleys Part2

Passwords on a Sticky Note?

Passwords on a Sticky Note?How to stop the sharing

madness

Page 4: Dark Alleys Part2

PasswordsPasswords» No reason to share passwords

because you can use:• Shared files/folders• Permissions settings• Remote Desktop• E-mail Proxy• Web 2.0 products

Page 5: Dark Alleys Part2

Managing PasswordsManaging Passwords» Trade-offs

• Different passwords for different systems• Require passwords to change

» Password Managers• Password Safe

http://passwordsafe.sourceforge.net• Others

http://www.lifehack.org/articles/technology/10-free-ways-to-track-all-your-passwords.html

» Choosing a good passphrase• “1wbiDCH” (I was born in Dale County Hospital)http://www.aces.edu/extconnections/2006/10/

Page 6: Dark Alleys Part2

Network ProtocolsNetwork ProtocolsHelp protect users

Page 7: Dark Alleys Part2

Secure All ProtocolsSecure All Protocols

»Telnet -> SSH»FTP -> SFTP»SSL Certificates

• LDAP -> LDAPS• HTTP -> HTTPS

»Require Secure Protocols for New Applications

Page 8: Dark Alleys Part2

Plain-text ProtocolsPlain-text Protocols

Page 9: Dark Alleys Part2

Secure ProtocolSecure Protocol

Page 10: Dark Alleys Part2

SSL CertificatesSSL Certificates» Recognized

Certificate Authority -$$

» Pre-installed• Verisign• CyberTrust• Thawte

» Self-signed Certificates – free

» Manual Install• eXtension• AU

VS

Page 11: Dark Alleys Part2

Root CertificatesRoot Certificates

» Internet Explorer• Internet

Options• Content• Certificates

Page 12: Dark Alleys Part2

Self-Signed CertificatesSelf-Signed Certificates

» Products• Microsoft Certificate Authority• Mac OS - Keychain• Linux - OpenSSL

» Importing• Active Directory• Download• Script

Page 13: Dark Alleys Part2

Secure Network Access

Secure Network Access

For the Road Warriors

Page 14: Dark Alleys Part2

Virtual Private Network

Virtual Private Network

» VPN provides unlimited access to campus network

» Prevent eavesdropping» Treat off-campus just like WiFi

An insecure transmission medium

Page 15: Dark Alleys Part2

Public/Private WiFiPublic/Private WiFi» Restrict open WiFi ports/protocols» Encourage VPN

• Better encryption• Unrestricted access• Restrict OS announcements• Gain benefit of University border firewall• Restrict services to internal Ips

» Enable Security• Prevent stealing bandwidth• Add some security to insecure sites

Page 16: Dark Alleys Part2

Remote AccessRemote Access

» Remote Desktop» Shared space access» Printer access» Internal websites

Page 17: Dark Alleys Part2

Other References Other References» Bruce Schneier’s

http://www.schneier.com» SANS’ “@RISK: The Consensus

Security Alert”

Page 18: Dark Alleys Part2

Thank YouThank You

Jonas Bowersock, Greg Parmer

“Until it goes missing, security is a boring obstacle to productivity in the minds of most.”

-Greg Parmer