1 / 19

Information Security Risk Assessment and Plans

Information Security Risk Assessment and Plans. NPTF, October 18, 2004. Meeting Objective. Briefly review 2003-2004 objectives Do a reasonableness check on our plans for the next two years prior to costing them out. Security Strategies.

Download Presentation

Information Security Risk Assessment and Plans

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security Risk Assessment and Plans NPTF, October 18, 2004

  2. Meeting Objective • Briefly review 2003-2004 objectives • Do a reasonableness check on our plans for the next two years prior to costing them out. Version 2.4 10/18/04

  3. Security Strategies • Risk-driven – focus on those opportunities with highest risk reduction bang for the buck. • Make security the default wherever possible. • Achievable, affordable plans. Concrete steps and early deliverables. Extend early successes in subsequent years. • Security-in-depth: prevention, detection, response. • Evaluate a network design and migration strategy that balances availability against security, and capable of supporting broader preventative network security measures. Version 2.4 10/18/04

  4. 2003-2004 Activities Version 2.4 10/18/04

  5. Intrusion Detection • A new tool, Arbor Peakflow, allows us to collect and analyze network "flow" info from Penn routers. • This helps us to see lists of • top talkers, • traffic by protocol (web vs email vs p2p vs voice vs video, etc), • traffic by destination service provider (Cogent vs Qwest vs Abilene/Internet2), • and much more. Version 2.4 10/18/04

  6. Intrusion Detection • Peakflow also allows us to identify denial of service (DoS, DDoS) attacks in progress, including sources and protocols, and possible filtering options. • In this role, the ArborPeakflow tools act as a very sophisticated distributed IDS, helping us to do targeting filtering during major network-based attacks. • No dedicated IDS systems needed to be put inline into the network. Netflow data from the routers is used. Version 2.4 10/18/04

  7. 2004-2005 Risk Assessment Version 2.4 10/18/04

  8. Proposed Security Plans Version 2.4 10/18/04

  9. Improving Web App Security Version 2.4 10/18/04

  10. Sniffing Version 2.4 10/18/04

  11. New machines arrive on campus Version 2.4 10/18/04

  12. Viruses/Worms Version 2.4 10/18/04

  13. Phishing Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5% of recipients to respond to them. Version 2.4 10/18/04

  14. Phishing Version 2.4 10/18/04

  15. Phishing 62-99-200-17.sdsl-line.inode.at Version 2.4 10/18/04

  16. Phishing Version 2.4 10/18/04

  17. Malicious Employee Version 2.4 10/18/04

  18. Patches for Applications Version 2.4 10/18/04

  19. Zero Day Worm Version 2.4 10/18/04

More Related