Top Banner
Dark Alleys of the Internet Part 2 ACE/NETC 2007 June 19, 2007 Albuquerque, NM Do the Right Thing!
18

Dark Alleys Part2

Jun 26, 2015

Download

Technology

Anne Adrian

Internet security tips for network administrators
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Dark Alleys Part2

Dark Alleys of the Internet

Part 2

Dark Alleys of the Internet

Part 2

ACE/NETC 2007June 19, 2007

Albuquerque, NM

Do the Right Thing!

Page 2: Dark Alleys Part2

Attack StatisticsAttack Statistics» AU Border Firewall

• Packets blocked by 1000s

» Intrusion Prevention System (blocking recommended attacks) (week of 5/28-6/02)

• 90,540 – blocked packets• 25,147 – suspicious packets• 3,893 – possibly successful

Page 3: Dark Alleys Part2

Passwords on a Sticky Note?

Passwords on a Sticky Note?How to stop the sharing

madness

Page 4: Dark Alleys Part2

PasswordsPasswords» No reason to share passwords

because you can use:• Shared files/folders• Permissions settings• Remote Desktop• E-mail Proxy• Web 2.0 products

Page 5: Dark Alleys Part2

Managing PasswordsManaging Passwords» Trade-offs

• Different passwords for different systems• Require passwords to change

» Password Managers• Password Safe

http://passwordsafe.sourceforge.net• Others

http://www.lifehack.org/articles/technology/10-free-ways-to-track-all-your-passwords.html

» Choosing a good passphrase• “1wbiDCH” (I was born in Dale County Hospital)http://www.aces.edu/extconnections/2006/10/

Page 6: Dark Alleys Part2

Network ProtocolsNetwork ProtocolsHelp protect users

Page 7: Dark Alleys Part2

Secure All ProtocolsSecure All Protocols

»Telnet -> SSH»FTP -> SFTP»SSL Certificates

• LDAP -> LDAPS• HTTP -> HTTPS

»Require Secure Protocols for New Applications

Page 8: Dark Alleys Part2

Plain-text ProtocolsPlain-text Protocols

Page 9: Dark Alleys Part2

Secure ProtocolSecure Protocol

Page 10: Dark Alleys Part2

SSL CertificatesSSL Certificates» Recognized

Certificate Authority -$$

» Pre-installed• Verisign• CyberTrust• Thawte

» Self-signed Certificates – free

» Manual Install• eXtension• AU

VS

Page 11: Dark Alleys Part2

Root CertificatesRoot Certificates

» Internet Explorer• Internet

Options• Content• Certificates

Page 12: Dark Alleys Part2

Self-Signed CertificatesSelf-Signed Certificates

» Products• Microsoft Certificate Authority• Mac OS - Keychain• Linux - OpenSSL

» Importing• Active Directory• Download• Script

Page 13: Dark Alleys Part2

Secure Network Access

Secure Network Access

For the Road Warriors

Page 14: Dark Alleys Part2

Virtual Private Network

Virtual Private Network

» VPN provides unlimited access to campus network

» Prevent eavesdropping» Treat off-campus just like WiFi

An insecure transmission medium

Page 15: Dark Alleys Part2

Public/Private WiFiPublic/Private WiFi» Restrict open WiFi ports/protocols» Encourage VPN

• Better encryption• Unrestricted access• Restrict OS announcements• Gain benefit of University border firewall• Restrict services to internal Ips

» Enable Security• Prevent stealing bandwidth• Add some security to insecure sites

Page 16: Dark Alleys Part2

Remote AccessRemote Access

» Remote Desktop» Shared space access» Printer access» Internal websites

Page 17: Dark Alleys Part2

Other References Other References» Bruce Schneier’s

http://www.schneier.com» SANS’ “@RISK: The Consensus

Security Alert”

Page 18: Dark Alleys Part2

Thank YouThank You

Jonas Bowersock, Greg Parmer

“Until it goes missing, security is a boring obstacle to productivity in the minds of most.”

-Greg Parmer