SlideShare a Scribd company logo
Dark Alleys of the Internet Part 2 ACE/NETC 2007 June 19, 2007 Albuquerque, NM Do the Right Thing!
Attack Statistics AU Border Firewall Packets blocked by 1000s Intrusion Prevention System  (blocking recommended attacks) (week of 5/28-6/02) 90,540 – blocked packets 25,147 – suspicious packets 3,893 – possibly successful
Passwords on a  Sticky Note? How to stop the sharing madness
Passwords No reason to share passwords because you can use: Shared files/folders Permissions settings Remote Desktop E-mail Proxy Web 2.0 products
Managing Passwords Trade-offs Different passwords for different systems Require passwords to change Password Managers Password Safe http://passwordsafe.sourceforge.net Others http://www.lifehack.org/articles/technology/10-free-ways-to-track-all-your-passwords.html Choosing a good pass phrase “ 1wbiDCH”  (I was born in Dale County Hospital) http://www.aces.edu/extconnections/2006/10/
Network Protocols Help protect users
Secure All Protocols Telnet -> SSH FTP -> SFTP SSL Certificates LDAP -> LDAPS HTTP -> HTTPS Require Secure Protocols for New Applications
Plain-text Protocols
Secure Protocol
SSL Certificates Recognized Certificate Authority -$$ Pre-installed Verisign CyberTrust Thawte Self-signed Certificates – free Manual Install eXtension AU VS
Root Certificates Internet Explorer Internet Options Content Certificates
Self-Signed Certificates Products Microsoft Certificate Authority Mac OS - Keychain Linux - OpenSSL Importing Active Directory Download Script
Secure Network Access For the Road Warriors
Virtual Private Network VPN provides unlimited access to campus network Prevent eavesdropping Treat off-campus just like WiFi An insecure transmission medium
Public/Private WiFi Restrict open WiFi ports/protocols Encourage VPN Better encryption Unrestricted access Restrict OS announcements Gain benefit of University border firewall Restrict services to internal Ips Enable Security Prevent stealing bandwidth Add some security to insecure sites
Remote Access Remote Desktop Shared space access Printer access Internal websites
Other References Bruce Schneier’s  http://www.schneier.com SANS’ “@RISK: The Consensus Security Alert”
Thank You Jonas Bowersock ,  Greg Parmer  “ Until it goes missing, security is a boring obstacle to productivity in the minds of most.”  -Greg Parmer

More Related Content

PPTX
VenkaSure Total Security+
PPTX
Advantages & disadvantages of the internet
PPT
Wireless authentication
PDF
OSB220: What's New in Security Endpoint Manager
PPT
How Hard Is It To Hack A Pc
PPTX
Network Security
DOC
PPT
Network Security
VenkaSure Total Security+
Advantages & disadvantages of the internet
Wireless authentication
OSB220: What's New in Security Endpoint Manager
How Hard Is It To Hack A Pc
Network Security
Network Security

What's hot (17)

PPT
Physical data security & security of data over network by team netnepz- A...
PPT
Web Security Programming I I
PDF
Swisscom: Smart Homes & Security Risks
PPT
Http ssl ja3 fingerprinting
PDF
Network Security Certification
PPTX
Network security and firewalls
PPT
Securing you SQL Server
PPT
Firewall
PDF
$HOME Sweet $HOME SANSFIRE Edition
PDF
Computer Security - CCNA Security - Lecture 1
PPTX
Top 10 mobile security risks - Khổng Văn Cường
PPTX
Top 6 Practices to Harden Docker Images to Enhance Security
PPT
Ch06 Wireless Network Security
PPT
Network security and protocols
PPT
Web Servers
PDF
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
Physical data security & security of data over network by team netnepz- A...
Web Security Programming I I
Swisscom: Smart Homes & Security Risks
Http ssl ja3 fingerprinting
Network Security Certification
Network security and firewalls
Securing you SQL Server
Firewall
$HOME Sweet $HOME SANSFIRE Edition
Computer Security - CCNA Security - Lecture 1
Top 10 mobile security risks - Khổng Văn Cường
Top 6 Practices to Harden Docker Images to Enhance Security
Ch06 Wireless Network Security
Network security and protocols
Web Servers
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
Ad

Viewers also liked (20)

PPT
Dark Alleys Part1
PDF
Melhoria De Qualidade Em óLeo De Café Pelo Uso Da ExtraçãO Acelerada Com Solv...
PPT
Animais
PPT
Photo Gallery Hotel La Tour
PDF
ComposiçAo De EsteróIs Em óLeos De Café
PPT
Stellaartois 000
PDF
AvaliaçãO Preliminar Da Viabilidade De ProduçãO De Biodiesel A Partir De GrãO...
PPT
Vistas Del Nublo
PDF
Estudo Dos ParâMetros De ExtraçãO De LipíDios De Café Verde Com Etanol..
PDF
La Habirtacion
PPS
God & You
PPT
Tvd Grupo 10[1]
PDF
ComposiçAo De EsteróIs Em óLeos De Café
PDF
ExtraçàO Do óLeo Da Borra De Café SolúVel Com Etanol Comercial
PPS
Bendito PoçO
PDF
ExtraçAo De Café Tese
PPS
Hare Tortoise
PPT
A TendêNcia Valorativa Da InvestigaçãO Social Simplificada Final
PDF
Presentazione Di Dany
Dark Alleys Part1
Melhoria De Qualidade Em óLeo De Café Pelo Uso Da ExtraçãO Acelerada Com Solv...
Animais
Photo Gallery Hotel La Tour
ComposiçAo De EsteróIs Em óLeos De Café
Stellaartois 000
AvaliaçãO Preliminar Da Viabilidade De ProduçãO De Biodiesel A Partir De GrãO...
Vistas Del Nublo
Estudo Dos ParâMetros De ExtraçãO De LipíDios De Café Verde Com Etanol..
La Habirtacion
God & You
Tvd Grupo 10[1]
ComposiçAo De EsteróIs Em óLeos De Café
ExtraçàO Do óLeo Da Borra De Café SolúVel Com Etanol Comercial
Bendito PoçO
ExtraçAo De Café Tese
Hare Tortoise
A TendêNcia Valorativa Da InvestigaçãO Social Simplificada Final
Presentazione Di Dany
Ad

Similar to Dark Alleys Part2 (20)

PPT
Dark alleys-2015
PPT
Dark Alleys Part1740
PPT
Internet Security
PPT
Computersystemssecurity 090529105555-phpapp01
PPT
Computer Systems Security
PPT
Dark Alleys/Internet Security
PPT
Microsoft Operating System Vulnerabilities
PPT
Microsoft OS Vulnerabilities
PPT
Ch08 Microsoft Operating System Vulnerabilities
PDF
Network Security - Defense Through Layered Information Security
PPT
Microset Security Presentation
PPT
302 Content Server Security Challenges And Best Practices
PPT
New internet security
PPT
NewIinternet security
PPTX
Institutional IT Security
PPTX
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
PPTX
File Sharing-R.D.Sivakumar
PPTX
Unified Secure Channel Demo
PDF
Eximbank security presentation
PPT
Network Security 2016
Dark alleys-2015
Dark Alleys Part1740
Internet Security
Computersystemssecurity 090529105555-phpapp01
Computer Systems Security
Dark Alleys/Internet Security
Microsoft Operating System Vulnerabilities
Microsoft OS Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
Network Security - Defense Through Layered Information Security
Microset Security Presentation
302 Content Server Security Challenges And Best Practices
New internet security
NewIinternet security
Institutional IT Security
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
File Sharing-R.D.Sivakumar
Unified Secure Channel Demo
Eximbank security presentation
Network Security 2016

More from Anne Adrian (20)

PPTX
Study of Open Data in PUSH Universities
PPTX
Presidents United to Solve Hunger (PUSH) and Open Data a PUSH Universities
PPTX
The NEW eXtension: A New Model, A New Opportunity SAAS 2015
PPTX
University of Georgia Cooperative Extension Winter School 2016: From Innovati...
PPTX
International Extension Education Conference: From Innovation to Impact
PPTX
eXtension for Extension Methods class
PPT
The Power of Learning Networks
PPT
Social media
PPT
Online Trends and Diversity
PPT
Skills for the Current and Future Knowledge Worker
PPT
Scaling Our Teaching and Learning on learn.eXtension.org
PPT
Not Your Grandparents’ or Great-grandparents' Exension
PPT
Skills for the Future Knowledge Worker
PPT
Osu field leadership2014
PPT
Skills for the Future Knowledge Worker
PPT
What Do Future Technology and Trends Mean for You?
PPT
The Role of Public Intellectuals in Cooperative Extension 
PPT
Continuous Beta and a Healthy Dose of Paranoia
PPTX
Collaborative social platforms for agriculture extension”
PPT
Informal Learning
Study of Open Data in PUSH Universities
Presidents United to Solve Hunger (PUSH) and Open Data a PUSH Universities
The NEW eXtension: A New Model, A New Opportunity SAAS 2015
University of Georgia Cooperative Extension Winter School 2016: From Innovati...
International Extension Education Conference: From Innovation to Impact
eXtension for Extension Methods class
The Power of Learning Networks
Social media
Online Trends and Diversity
Skills for the Current and Future Knowledge Worker
Scaling Our Teaching and Learning on learn.eXtension.org
Not Your Grandparents’ or Great-grandparents' Exension
Skills for the Future Knowledge Worker
Osu field leadership2014
Skills for the Future Knowledge Worker
What Do Future Technology and Trends Mean for You?
The Role of Public Intellectuals in Cooperative Extension 
Continuous Beta and a Healthy Dose of Paranoia
Collaborative social platforms for agriculture extension”
Informal Learning

Recently uploaded (20)

PPTX
Tartificialntelligence_presentation.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
The various Industrial Revolutions .pptx
PPT
What is a Computer? Input Devices /output devices
PPTX
Modernising the Digital Integration Hub
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Hybrid model detection and classification of lung cancer
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Chapter 5: Probability Theory and Statistics
Tartificialntelligence_presentation.pptx
Architecture types and enterprise applications.pdf
A novel scalable deep ensemble learning framework for big data classification...
The various Industrial Revolutions .pptx
What is a Computer? Input Devices /output devices
Modernising the Digital Integration Hub
WOOl fibre morphology and structure.pdf for textiles
NewMind AI Weekly Chronicles - August'25-Week II
A contest of sentiment analysis: k-nearest neighbor versus neural network
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Getting started with AI Agents and Multi-Agent Systems
O2C Customer Invoices to Receipt V15A.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
Hybrid model detection and classification of lung cancer
TLE Review Electricity (Electricity).pptx
Web App vs Mobile App What Should You Build First.pdf
Group 1 Presentation -Planning and Decision Making .pptx
Getting Started with Data Integration: FME Form 101
DP Operators-handbook-extract for the Mautical Institute
Chapter 5: Probability Theory and Statistics

Dark Alleys Part2

  • 1. Dark Alleys of the Internet Part 2 ACE/NETC 2007 June 19, 2007 Albuquerque, NM Do the Right Thing!
  • 2. Attack Statistics AU Border Firewall Packets blocked by 1000s Intrusion Prevention System (blocking recommended attacks) (week of 5/28-6/02) 90,540 – blocked packets 25,147 – suspicious packets 3,893 – possibly successful
  • 3. Passwords on a Sticky Note? How to stop the sharing madness
  • 4. Passwords No reason to share passwords because you can use: Shared files/folders Permissions settings Remote Desktop E-mail Proxy Web 2.0 products
  • 5. Managing Passwords Trade-offs Different passwords for different systems Require passwords to change Password Managers Password Safe http://passwordsafe.sourceforge.net Others http://www.lifehack.org/articles/technology/10-free-ways-to-track-all-your-passwords.html Choosing a good pass phrase “ 1wbiDCH” (I was born in Dale County Hospital) http://www.aces.edu/extconnections/2006/10/
  • 6. Network Protocols Help protect users
  • 7. Secure All Protocols Telnet -> SSH FTP -> SFTP SSL Certificates LDAP -> LDAPS HTTP -> HTTPS Require Secure Protocols for New Applications
  • 10. SSL Certificates Recognized Certificate Authority -$$ Pre-installed Verisign CyberTrust Thawte Self-signed Certificates – free Manual Install eXtension AU VS
  • 11. Root Certificates Internet Explorer Internet Options Content Certificates
  • 12. Self-Signed Certificates Products Microsoft Certificate Authority Mac OS - Keychain Linux - OpenSSL Importing Active Directory Download Script
  • 13. Secure Network Access For the Road Warriors
  • 14. Virtual Private Network VPN provides unlimited access to campus network Prevent eavesdropping Treat off-campus just like WiFi An insecure transmission medium
  • 15. Public/Private WiFi Restrict open WiFi ports/protocols Encourage VPN Better encryption Unrestricted access Restrict OS announcements Gain benefit of University border firewall Restrict services to internal Ips Enable Security Prevent stealing bandwidth Add some security to insecure sites
  • 16. Remote Access Remote Desktop Shared space access Printer access Internal websites
  • 17. Other References Bruce Schneier’s http://www.schneier.com SANS’ “@RISK: The Consensus Security Alert”
  • 18. Thank You Jonas Bowersock , Greg Parmer “ Until it goes missing, security is a boring obstacle to productivity in the minds of most.” -Greg Parmer

Editor's Notes

  • #2: This is a presentation for system network administrators. Administrators should help teach their users proper security methods.