SlideShare a Scribd company logo
Basic Computer Security
Outline Why Computer Security Fermilab Strategy: Integrated Computer Security Defense in Depth Your role and responsibilities as a user Other Computing Policy Issues Data backup Incidental use Privacy Offensive material Licensing
Why Computer Security The Internet is a dangerous place We are constantly being scanned for weak or vulnerable systems; new unpatched systems will be exploited within minutes. Fermilab is an attractive target High network bandwidth is useful for attackers who take over lab computers Publicity value of compromising a .gov site Attackers may not realize we have no information useful to them
Why Computer Security - 2 We need to protect Our data Our ability to use our computers (denial of service attacks) Our reputation with DOE, Congress and the general public Major sources of danger Running malicious code on your machine due to system or application vulnerabilities or improper user actions Carrying infected machines (laptops) in from off site
FNAL Strategy Integrated Security Management Defense in Depth Perimeter Controls and auto blocking Mail gateway virus scanning Strong Authentication (Kerberos) Critical System plans Critical vulnerabilities Prompt response to computer security incidents (FCIRT) Intelligent and informed user community
Integrated Security Management Computer Security is not an add-on or something external, it is part and parcel of everything you do with computers (analogy with ES&H) Not “one-size-fits-all”, but appropriate for the needs and vulnerabilities of each system In most cases, it is simply common sense + a little information and care Each Division/Section or large experiment has a GCSC (General Computer Security Coordinator) who acts as liaison with the Computer Security Team in disseminating information and dealing with incident; see  http://computing.fnal.gov/security/  for an up to date list
Strong Authentication Avoid disclosure of passwords on the network No network services (logon or read/write ftp) visible on the general internet can be offered with out requiring Kerberos authentication (unless a formal exemption is applied for and granted) Kerberos provides a single sign in, minimizing use of multiple passwords for different systems Lab systems are constantly scanned for violations of this policy
Critical Systems Defined as “critical to the mission of the Laboratory”, i.e. disruption may have major impact on Laboratory operations; Most things do  not  fall in this category; Special (more stringent) rules & procedures apply; Including periodic reviews; You’ll know if you’re in this category;
Critical Vulnerabilities and Vulnerability Scanning Certain security vulnerabilities are declared critical when they are (or are about to) being actively exploited and represent a clear and present danger Upon notification of a critical vulnerability, systems must be patched by a given date or they will be blocked from network access
Computer Security Incidents Mandatory incident reporting; Report all suspicious activity: If urgent  to FCC Helpdesk, x2345, 24x7; Or  to system manager (if immediately available); Non-urgent to computer_security@fnal.gov; Incidents investigated by Fermi Computer Incident Response Team (FCIRT); Not  to be discussed!
FCIRT (Fermi Computer Security Incident Response Team)  Security experts drawn from throughout the lab Investigate (“triage”) initial reports; Coordinate investigation overall; Work with local system managers; Call in technical experts; May take control of affected systems; Maintain confidentiality;
Other Rules for General Systems “ Blatant disregard” of computer security; First time warning, repeat offense disciplinary action; Unauthorized or malicious actions; Damage of data, unauthorized use of accounts, denial of service, etc., are forbidden; Ethical behavior; Same standards as for non-computer activities; Restricted central services; May only be provided by Computing Division; Security & cracker tools; Possession (& use) must be authorized;
Mandatory System Manager Registration System managers must be registered with FCSC See: http://www.miscomp.fnal.gov/sysadmindb
Your role as a user Guard against malicious code in email Don’t open attachments unless you are sure they are safe Don’t trust who email is from Updated and enabled virus signatures Guard against malicious code from web browsing
Your role - 2 Obey Strong Authentication Policy (Kerberos) Don’t run network services (login or read write ftp) unless they demand Kerberos authentication Treat your kerberos password as a sacred object (never expose it over the network) Promptly report potential computer security incidents X2345 or  [email_address] Follow FCIRT instructions during incidents (especially about keeping infected machines off the network and preserving the status of an infected machine for expert investigation)
Other Computing Policy Issues Data backup Incidental use Privacy Offensive material Licensing
Data Backup Policy - Users Users (data owners) responsible for determining: What data requires protection; How destroyed data would be recovered, if needed; Coordinating backup plan w/ sysadmins; or doing their own backups; If the backup is done for you it might be worth occasionally checking that you can really retrieve the data
Incidental Computer Usage Fermilab permits some non business use of lab computers Guidelines are at  http://computing.fnal.gov/security/ProperUse.htm
Activities to Avoid Large grey area, but certain activities are “over the line”; Illegal; Prohibited by Lab or DOE policy; Embarrassment to the Laboratory; Interfere w/ performance of job; Consume excessive resources;
Privacy of Email and Files Fermilab normally respects the privacy of electronic files and email; Employees and users are required to do likewise; Certain exemptions for system managers and computer security response; All others  must  have Director(ate) approval;
Privacy of Email and Files May not use information in another person’s files seen incidental to any activity (legitimate or not) for any purpose w/o either explicit permission of the owner or a “reasonable belief the file was meant to be accessed by others.” Whether or not group/world accessible; “Group” files implicitly may be used by the group for the mission of the group;
Offensive Material on computers Many “computer security” complaints are not; Material in a computer is like material in a desk; With respect to both privacy and appropriateness; This is a line management, not computer security, concern (except in egregious cases).
Software Licensing Fermilab is strongly committed to respecting intellectual property rights Any use of unlicensed commercial software is a direct violation of lab policy
Questions? [email_address] [email_address]  for questions about security policy [email_address]  for reporting security incident http://computing.fnal.gov/security

More Related Content

PDF
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
PPTX
How to apply risk management to IT
PDF
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
PPT
Security & control in management information system
PPTX
Basic practices for information & computer security
PDF
legalworkspace-infographic 0116
PPT
Threats to an information system
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
How to apply risk management to IT
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security & control in management information system
Basic practices for information & computer security
legalworkspace-infographic 0116
Threats to an information system

What's hot (20)

PPT
3e - Security And Privacy
PDF
Information system and security control
PPTX
Security and control in Management Information System
DOC
System Security Threats and Risks)
PPT
Computer security overview
 
PPTX
Threats to Information Resources - MIS - Shimna
PPTX
System security
PPT
Ch09 Performing Vulnerability Assessments
PPT
Ch13 Business Continuity Planning and Procedures
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PPTX
Securing information system (Management Information System)
PPTX
System Security-Chapter 1
PPT
PPTX
Threats to information security
PPTX
Website security
PPT
Lecture 1
PPT
IT Security for the Physical Security Professional
PPT
Basic Security Chapter 1
PPTX
Threats to information security
PPT
Lect13 security
3e - Security And Privacy
Information system and security control
Security and control in Management Information System
System Security Threats and Risks)
Computer security overview
 
Threats to Information Resources - MIS - Shimna
System security
Ch09 Performing Vulnerability Assessments
Ch13 Business Continuity Planning and Procedures
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Securing information system (Management Information System)
System Security-Chapter 1
Threats to information security
Website security
Lecture 1
IT Security for the Physical Security Professional
Basic Security Chapter 1
Threats to information security
Lect13 security
Ad

Viewers also liked (12)

PDF
조직의 확대 없이 IT ROI 높이기 전략
PDF
클라우드 도입에 대한 기업 고객의 인식 변화
PDF
Luke Travis - About Me
PPTX
Microsoft의 과거.현재 그리고 미래전략은(溫故知新)
PDF
클라우드 어플리케이션 필수조건 Part2
PPTX
엔지니어에게 영업기술이란 날개를 달아주기
PDF
Lean startup에 대하여
PDF
클라우드를 적용한 ISV 기업들의 비지니스 모델 변화
PDF
ISV관점의 SaaS 비지니스 장단점 분석
PDF
주목해야 할 10대 클라우드 컴퓨팅 기업
PDF
옆에 다가 온 클라우드, 어떻게 같이 갈 것인가?
PDF
클라우드 어플리케이션의 필수조건
조직의 확대 없이 IT ROI 높이기 전략
클라우드 도입에 대한 기업 고객의 인식 변화
Luke Travis - About Me
Microsoft의 과거.현재 그리고 미래전략은(溫故知新)
클라우드 어플리케이션 필수조건 Part2
엔지니어에게 영업기술이란 날개를 달아주기
Lean startup에 대하여
클라우드를 적용한 ISV 기업들의 비지니스 모델 변화
ISV관점의 SaaS 비지니스 장단점 분석
주목해야 할 10대 클라우드 컴퓨팅 기업
옆에 다가 온 클라우드, 어떻게 같이 갈 것인가?
클라우드 어플리케이션의 필수조건
Ad

Similar to Basic computersecurity (20)

PPT
Cyber security awareness training by cyber security infotech(csi)
PPT
electinfor safesecurityfor safety24july .ppt
PDF
Operations Security Presentation
PPTX
Network Security
PDF
Packet capture and network traffic analysis
PPTX
security and system mainatance
DOCX
Running head IT SECURITY POLICYIT SECURITY POLICY .docx
PPT
Secure Financial Intelligence System
PPT
Net essentials6e ch10
PPT
Role of a Forensic Investigator
PDF
Duke Pci T Raining Slides
ODP
Cissp Week 23
PPT
08 -Securing Information Systems at workplace.ppt
PPT
Securing Management Information Systems.ppt
PPT
Network security
PDF
Computer Security
DOCX
Part 3 ApplicationEnd-User Security Recommendations.docx
PPTX
Database development and security certification and accreditation plan pitwg
PPTX
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
PPTX
PPT ON CYBER SECURITY FRAMEWORK & CYBER AUDITING IN CRPF .pptx
Cyber security awareness training by cyber security infotech(csi)
electinfor safesecurityfor safety24july .ppt
Operations Security Presentation
Network Security
Packet capture and network traffic analysis
security and system mainatance
Running head IT SECURITY POLICYIT SECURITY POLICY .docx
Secure Financial Intelligence System
Net essentials6e ch10
Role of a Forensic Investigator
Duke Pci T Raining Slides
Cissp Week 23
08 -Securing Information Systems at workplace.ppt
Securing Management Information Systems.ppt
Network security
Computer Security
Part 3 ApplicationEnd-User Security Recommendations.docx
Database development and security certification and accreditation plan pitwg
Sallysspecialservices networksecurityproposal2-100305141834-phpapp02
PPT ON CYBER SECURITY FRAMEWORK & CYBER AUDITING IN CRPF .pptx

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
sap open course for s4hana steps from ECC to s4
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
cuic standard and advanced reporting.pdf
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
sap open course for s4hana steps from ECC to s4
NewMind AI Weekly Chronicles - August'25 Week I
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Building Integrated photovoltaic BIPV_UPV.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
Chapter 3 Spatial Domain Image Processing.pdf
Programs and apps: productivity, graphics, security and other tools
Understanding_Digital_Forensics_Presentation.pptx
Spectroscopy.pptx food analysis technology
Big Data Technologies - Introduction.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
MIND Revenue Release Quarter 2 2025 Press Release

Basic computersecurity

  • 2. Outline Why Computer Security Fermilab Strategy: Integrated Computer Security Defense in Depth Your role and responsibilities as a user Other Computing Policy Issues Data backup Incidental use Privacy Offensive material Licensing
  • 3. Why Computer Security The Internet is a dangerous place We are constantly being scanned for weak or vulnerable systems; new unpatched systems will be exploited within minutes. Fermilab is an attractive target High network bandwidth is useful for attackers who take over lab computers Publicity value of compromising a .gov site Attackers may not realize we have no information useful to them
  • 4. Why Computer Security - 2 We need to protect Our data Our ability to use our computers (denial of service attacks) Our reputation with DOE, Congress and the general public Major sources of danger Running malicious code on your machine due to system or application vulnerabilities or improper user actions Carrying infected machines (laptops) in from off site
  • 5. FNAL Strategy Integrated Security Management Defense in Depth Perimeter Controls and auto blocking Mail gateway virus scanning Strong Authentication (Kerberos) Critical System plans Critical vulnerabilities Prompt response to computer security incidents (FCIRT) Intelligent and informed user community
  • 6. Integrated Security Management Computer Security is not an add-on or something external, it is part and parcel of everything you do with computers (analogy with ES&H) Not “one-size-fits-all”, but appropriate for the needs and vulnerabilities of each system In most cases, it is simply common sense + a little information and care Each Division/Section or large experiment has a GCSC (General Computer Security Coordinator) who acts as liaison with the Computer Security Team in disseminating information and dealing with incident; see http://computing.fnal.gov/security/ for an up to date list
  • 7. Strong Authentication Avoid disclosure of passwords on the network No network services (logon or read/write ftp) visible on the general internet can be offered with out requiring Kerberos authentication (unless a formal exemption is applied for and granted) Kerberos provides a single sign in, minimizing use of multiple passwords for different systems Lab systems are constantly scanned for violations of this policy
  • 8. Critical Systems Defined as “critical to the mission of the Laboratory”, i.e. disruption may have major impact on Laboratory operations; Most things do not fall in this category; Special (more stringent) rules & procedures apply; Including periodic reviews; You’ll know if you’re in this category;
  • 9. Critical Vulnerabilities and Vulnerability Scanning Certain security vulnerabilities are declared critical when they are (or are about to) being actively exploited and represent a clear and present danger Upon notification of a critical vulnerability, systems must be patched by a given date or they will be blocked from network access
  • 10. Computer Security Incidents Mandatory incident reporting; Report all suspicious activity: If urgent to FCC Helpdesk, x2345, 24x7; Or to system manager (if immediately available); Non-urgent to computer_security@fnal.gov; Incidents investigated by Fermi Computer Incident Response Team (FCIRT); Not to be discussed!
  • 11. FCIRT (Fermi Computer Security Incident Response Team) Security experts drawn from throughout the lab Investigate (“triage”) initial reports; Coordinate investigation overall; Work with local system managers; Call in technical experts; May take control of affected systems; Maintain confidentiality;
  • 12. Other Rules for General Systems “ Blatant disregard” of computer security; First time warning, repeat offense disciplinary action; Unauthorized or malicious actions; Damage of data, unauthorized use of accounts, denial of service, etc., are forbidden; Ethical behavior; Same standards as for non-computer activities; Restricted central services; May only be provided by Computing Division; Security & cracker tools; Possession (& use) must be authorized;
  • 13. Mandatory System Manager Registration System managers must be registered with FCSC See: http://www.miscomp.fnal.gov/sysadmindb
  • 14. Your role as a user Guard against malicious code in email Don’t open attachments unless you are sure they are safe Don’t trust who email is from Updated and enabled virus signatures Guard against malicious code from web browsing
  • 15. Your role - 2 Obey Strong Authentication Policy (Kerberos) Don’t run network services (login or read write ftp) unless they demand Kerberos authentication Treat your kerberos password as a sacred object (never expose it over the network) Promptly report potential computer security incidents X2345 or [email_address] Follow FCIRT instructions during incidents (especially about keeping infected machines off the network and preserving the status of an infected machine for expert investigation)
  • 16. Other Computing Policy Issues Data backup Incidental use Privacy Offensive material Licensing
  • 17. Data Backup Policy - Users Users (data owners) responsible for determining: What data requires protection; How destroyed data would be recovered, if needed; Coordinating backup plan w/ sysadmins; or doing their own backups; If the backup is done for you it might be worth occasionally checking that you can really retrieve the data
  • 18. Incidental Computer Usage Fermilab permits some non business use of lab computers Guidelines are at http://computing.fnal.gov/security/ProperUse.htm
  • 19. Activities to Avoid Large grey area, but certain activities are “over the line”; Illegal; Prohibited by Lab or DOE policy; Embarrassment to the Laboratory; Interfere w/ performance of job; Consume excessive resources;
  • 20. Privacy of Email and Files Fermilab normally respects the privacy of electronic files and email; Employees and users are required to do likewise; Certain exemptions for system managers and computer security response; All others must have Director(ate) approval;
  • 21. Privacy of Email and Files May not use information in another person’s files seen incidental to any activity (legitimate or not) for any purpose w/o either explicit permission of the owner or a “reasonable belief the file was meant to be accessed by others.” Whether or not group/world accessible; “Group” files implicitly may be used by the group for the mission of the group;
  • 22. Offensive Material on computers Many “computer security” complaints are not; Material in a computer is like material in a desk; With respect to both privacy and appropriateness; This is a line management, not computer security, concern (except in egregious cases).
  • 23. Software Licensing Fermilab is strongly committed to respecting intellectual property rights Any use of unlicensed commercial software is a direct violation of lab policy
  • 24. Questions? [email_address] [email_address] for questions about security policy [email_address] for reporting security incident http://computing.fnal.gov/security