1 Click to edit Master title style Click to edit Master title style

Transcription

1 Click to edit Master title style Click to edit Master title style
Click to edit Master title style
•
•
•
•
•
X
Network
for styles
ICT Co-ordinators
Click
to edit Security
Master text
Second level
Third level
Fourth level
Fifth level
UKERNA Training
V1.070
Click to edit Master title style
Introduction
X
• •Matthew
Cook
Click to
edit Master text styles
• Second level
• Senior IT Security Specialist
•(Loughborough
Third level University)
• Fourth level
• •UKERNA
Contracted Trainer
Fifth level
• Further details available at:
http://escarpment.net/
UKERNA Training
V1.070
Click to edit Master title style
Background
•
•
•
•
•
•
Computing
Click
to edithas
Master
changed:
text styles
– ICT is level
becoming more critical
Second
– ICTlevel
Security threats are increasing
Third
– Internet
was very small…
Fourth
level
Fifth level
Why bother:
– Keeping control and availability
– Legal, DPA and bad PR
– Reactive work loads
UKERNA Training
V1.070
1
Click to editand
Complexity
Master
Frequency
title style
•
•
•
•
•
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
UKERNA Training
V1.070
Click to edit Master title style
Passwords
•
•
•
•
•
•
•
Primary
Click to edit
defence
Master
from
text
attack
styles
Second notes
Post-IT
level and under keyboards
Third level
Change
them frequently
Fourth level
Choose
good passwords
Fifth level
BIOS Restrictions
Screensavers
UKERNA Training
V1.070
ClickVirus
Anti
to edit Master title style
•
•
•
•
•
Essential
Click
to edit Master text styles
Second level
Ensure
Third level
it is regularly updated
Fourth
Are
all vectors
level covered?
– Floppy
Fifth
levelDisc
– USB Stick
– Email
• Cover for staff and students
UKERNA Training
V1.070
2
Click to edit Master title style
Malware
•
•
•
•
•
•
•
•
Adware,
Click to edit
Spyware,
MasterMalware,
text styles
Anti-X
Second level
Thirdbe
Can
level
very dangerous
Fourth level
Malicious
code
Fifth loggers
Key
level getting more complex
Sending SPAM from institution
Be careful what software you run
Phishing attacks increasing
UKERNA Training
V1.070
Click to edit Master title style
Backup
•
•
•
•
•
•
•
•
Critical,
Click to edit
imagine
Master
what
text
would
styles
happen…
Second can
Backup
leveltake a number of forms:
Third level Tape Drive
Traditional
Fourth levelNetwork Robot
Automated
Fifth
USB level
Hard Disc
Ghost Technology
Network Synchronisation
A finally, test the backup!
UKERNA Training
V1.070
Click to edit Master title style
Patching
•
•
•
••
••
•
A
Click
facttoofedit
life Master text styles
Second level
Operating
Systems, and programs
contain
bugs and will need patching
Third
level
Automated
Fourth levelSystems
HR for
Patching
Fifth
level
Advance Notifications
UKERNA Training
V1.070
3
Click to edit Master title style
Configuration
•
•
•
•
•
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
UKERNA Training
V1.070
Click to edit Master title style
Wireless
•
•
•
•
•
•
•
•
Ubiquitous
Click to editcomputing
Master text
is styles
popular
Wireless
Second level
is easy to configure
Third level
…but
hard to secure
Fourth
Can someone
level sit outside and…
Fifth
MAClevel
Address Filtering
Hiding SSID
WEP Encryption
… is just not enough!
UKERNA Training
V1.070
Click to edit Master title style
Firewalls
•
•
••
•
••
Block
Click to
malicious
edit Master
traffic
text
coming
styles in and out
of
the
network
Second level
Internet
threats are complex and
Third level
frequent
Fourth level
Something
Fifth level is required to protect the
internal network
• Hardware firewalls vs Software firewalls
UKERNA Training
V1.070
4
Click to edit Master title style
Disposal
•
•
••
••
•
•
•
What
Click to
happens
edit Master
whentext
youstyles
dispose of a
PC
or
hard
discs?
Second level
What
happens to deleted files?
Third level
Does
formatting
remove data?
Fourth level
Fifth level
Data disposal policy
Wiping tools
UKERNA Training
V1.070
Click to forward
Moving
edit Master title style
•
•
•
•
••
Educating
Click to editusers
Master text styles
– Top ten
security resolutions
Second
level
– Training
Third
level courses
– Staff/institution
newsletters
Fourth
level
Asking
vendors security related
Fifth
level
questions
• Reviewing procedures
UKERNA Training
V1.070
Click to edit
UKERNA
Training
Master title style
•
•
•
•
•
•
•
•
•
Portfolio
Click to edit
of network
Master text
based
styles
training
Second
Over
10 level
different courses
Training
Third level
venues in many locations
Comprehensive
Fourth level
course workbook + CD
Fifth level
Basic Networking
Wireless LAN Fundamentals
Firewalls: Planning and Implementation
Using Logfiles for Security
UKERNA Training
V1.070
5
Click to edit Master title style
•
•
•
•
•
Click to edit Master text styles
Second level
Third level
Questions?
Fourth level
Fifth level
http://escarpment.net/
UKERNA Training
V1.070
6