Title: Security Best Practices
1Security Best Practices
- What are we fighting?
- What are we trying to protect?
- How can we best combat these problems?
2Security Best Practices
- Overall Top Issues
- PC Security
- Internal Network Security
- Wireless Security
- File System Security
- Firewall or Perimeter Security
3What are we fighting?
- Viruses
- Sophos polled 3,000 IT administrators and learned
that most do not update antivirus signatures for
remote offices and telecommuters as often as they
do for office-based systems - Normally attaches to files
- Worms
- Propagates over the network
- Unpatched systems are at risk
4What are we fighting?
- Trojans
- May look friendly
- Client/server approach Zombie
- Network Attacks
- Scanning, sniffing, intrusion attempts, buffer
overflows, DDOS attacks - Internal Attacks
- Unauthorized attempts
5What are we trying to protect?
- Perimeter
- Local Networks
- PCs
6Overall Top Issues - 1
- Implement Physical Controls
- Servers and networking equipment in a locked area
- Backup devices and media in locked area
- Login access to backup server secured
7Overall Top Issues - 2
- Require or strongly encourage employees to choose
strong passwords - Let upper management know the reasons why this is
important to protect the businesses assets - Internet programs use brute force dictionary
attacks which contain tens of thousands of common
passwords that hackers use to break in to
unsecured computer systems - Passwords should have a minimum of seven
characters, be nondictionary words, and combine
uppercase, lowercase, and special characters - 10 trillion combinations
8Overall Top Issues - 3
- Require new passwords
- Every 90 days or at least twice a year
- Why?
- A stagnate network is a perfect test bed for
exploitation - At the very least, if an intrusion was occurring,
it raises the deterrent factor - If your company was profiled by a hacker and
recorded that passwords frequently change, they
may not waste time on you - Set account lockout parameters
- Use a brute force attack on your own passwords
9Overall Top Issues - 4
- Verify that your virus-protection subscription is
current and working - Can you include spyware protection also?
- Does engine updates to the antivirus programs
occur automatically or manually?
10Overall Top Issues - 5
- Email Issues
- Internal Email Server
- Install either a gateway or API filtering
solution - Both is better as some solutions will allow it
- Client PCs should also email scanning
functionality for a second layer of defense - Train or educate employees about email
attachments - Including the need to avoid opening attachments
from unknown sources
11Overall Top Issues - 6
- Beware of Social Engineering
- On-site visits to gather data
- Person posing on the phone as an employee
- Spoofed email
- Train employees to be cautious
- Lock PC when away
12Overall Top Issues - 7
- Install a total protection solution
- If you host your own web sites locally, using
just a firewall is not going to make it secure - Install an IDS system and policy management
13Overall Top Issues - 8
- Test your security posture regularly
- Hackers have all the time in the world to update
their technology and skills - See where your holes exist before someone else
does
14Overall Top Issues 9
- Terminating employees
- Remove their network access immediately
- Escort them out
15Overall Top Issues 10
- Secure Telecommuting and remote access
- As VPN solutions are increasing to allow greater
flexibility and more productivity, securing
remote access is critical. - Use Quarantine services built into Windows Server
2003 RRAS
16Overall Top Issues 11
- Especially if youre hosting web sites, update
your Web server software regularly - Stay up-to-date on current patch level and
service packs for underlying OS
17Overall Top Issues 12
- Kill network services that are not needed
- May include
- Web
- Email
- FTP
- Network browsing
18Overall Top Issues 13
- Filter Connections
- Protect and scan HTTP and FTP traffic
- IS IM used?
- Consider hosting your own
- Filter the traffic
19Overall Top Issues 14
- Log everything you can
- Firewall, Web Server, Email Server, File Server,
etc - Copy logs to another system
- Consider a centralized approach
20 21PC Security
- Implement a Firewall
- BlackIce, ZoneAlarm, McAfee, Symantec
- Install Patches and Service Packs
- Turn on the Automatic Updates feature
- Windows Update
- Office Update
- Keep the antivirus software up-to-date
- Check for updates every 2 hours minimum
- Is the scanning engine updated automatically?
- Use Spyware detection/removal software
22Internal Network Security
- What makes up the network?
- Routers, Switches, Firewalls
- SERVERS
- File, Email, Web, Database, Dedicated
Application, Backup, Testing - PCs
- And the BIG one, USERS!
- Basically, anything connected
23Securing Basic Network Devices
- Why secure a switch?
- Man in the Middle Attacks
- Traffic Sniffing
- LAN port forwarding
- What about a router?
- Table poison
- Reroute traffic
24Server Security Best Practices
- Disable the Alerter service and the Messenger
service - Alerter service notifies users of administrative
alerts - This service usually is not required under normal
circumstances
25Server Security Best Practices
- Disable the Messenger service
- This service provides the ability to send
messages between clients and servers - Allows users to use "net send" messages hitting
your computer from the internet - The Messenger service uses UDP ports 135, 137,
and 138 TCP ports 135, 139, and 445
26Server Security Best Practices
- Disable the Clipbook service
- Used to store information (cut / paste) and share
it with other computers - Service has nothing to do with moving data from
Excel to Word
27Server Security Best Practices
- Disable the Human Interface Device service,
except for those users who need it - Service enables the use of specialized devices
such as game controllers and virtual reality
devices
28Server Security Best Practices
- Disable the Indexing service
- Makes searching the local hard drive faster by
keeping a virtual index of the files - Uses about 500 K to 2 MB in an idle state
- Sore spot for buffer overflow attacks
29Server Security Best Practices
- Disable Machine Debug Manager
- Provides support for program debugging
- Typically used by developers
- Disable it in Internet Explorer
30Server Security Best Practices
- Don't run any unnecessary network services
- World Wide Web Publishing Service
- Simple Mail Transport Protocol (SMTP)
- FTP Publishing Service
- Network News Transfer Protocol
31Email Server Security Best Practices
- Using a separate relay
- Virus/Spam Protection
- Test to verify an open relay doesnt exist
- Tools
- www.samspade.org
- www.abuse.net/relay.html
32Web Server Security Best Practices
- Use IIS 6.0 if at all possible
- Separate protected application pools
- URLScan
- http//www.microsoft.com/technet/security/tools/ur
lscan.mspx - Keep current on patch level
33User Best Practices
- Hardening user passwords
- Educate them as to why this is important
- Show them how to create strong passwords
- Password Rules
- Putting a password on a sticky note
- Do not store miscellaneous passwords on hard
drives - Administrators and sensitive account users should
have stronger than normal passwords - Enforce the policy
34 35Wireless Security Best Practices
- Change the default SSID (wireless equivalency of
workgroup name) to something less common - Or better yet, disable SSID broadcasts
- Use a unique login name and password to gain
access to the device - Default login and passwords are publicly
available on the Internet
36Wireless Security Best Practices
- Enable the highest method of security the device
will allow - WEP is not bulletproof, but it provides
additional protection - 128-bit is preferred
- Make sure the device has up-to-date firmware
37Wireless Security Best Practices
- Implement media-access control (MAC) filtering
- Allows only the wireless adapters specified to
access the device - Not bulletproof or spoofproof, but adds another
layer of security - SNMP community names
- If not being used, turn it off
- Change the string to something other than public
38Wireless Security Best Practices
- Minimize the amount of signal leaked to the
outside - If there is no need for wireless access outside
the building, place the device to the center of
the building - Audit the wireless network
- Walk around the outside of the building with a
laptop - Use Network Stumbler to assist with the
security audit
39Wireless Security Best Practices
- Small number of wireless clients?
- Consider using static IP addresses instead of
DHCP - Use subnets different from the default setting
- Consider using a VLAN or VPN to protect the
traffic - L2TP with IPSec is a common method
40Wireless Security Best Practices
- Public Wireless Access Points
- All transmissions are unencrypted
- At the very least, use a firewall
- Turn off Windows File and Print Sharing
- Use a VPN solution if connecting to something
secure
41Wireless Security Best Practices
- If a RADIUS server exists, use it
- For sites without a Remote Authentication Dial-In
User Service (RADIUS) infrastructure, WPA
supports the use of a preshared key. For sites
with a RADIUS infrastructure, Extensible
Authentication Protocol (EAP) and RADIUS is
supported.
42Wireless Security Best Practices
- Using WPA on Your Wireless Network
- Wi-Fi Protected Access is a stronger protocol
that fixes the weaknesses in WEP - The encryption key changes with every frame
- Three critical components needed to upgrade
wireless security from WEP to WPA - access point (AP) or wireless router that
supports WPA - wireless network card that has WPA drivers
available - client that supports WPA and your operating
system
43Wireless Security Best Practices
- Updating the OS to include WPA functionality
- Microsoft provides a free WPA upgrade, but it
only works with Windows XP - Microsoft Knowledge Base Article 815485
- If the OS other than Win XP, you'll need
third-party client software - MeetingHouse Data Communications
- http//www.mtghouse.com/products/index.shtml
44 45File System Security
- NTFS vs FAT
- FAT 16
- DOS
- FAT 32
- Windows 98, ME, 2000, XP
- NTFS
- Windows NT, 2000, XP
- NTFS5
- Windows 2000, XP
46File System Security
- NTFS Security
- Object ownership
- Permission inheritance
- Auditing
- Encrypting File System (EFS)
- Sharing and File Permissions
- Full Control, Change, and Read
- Is there a difference between Server 2000 and
2003?
47Firewall Technology
- Basically three types of Firewall technology
- Packet filter
- Routes traffic based on IP/port
- Stateful packet inspection
- Analyzes traffic on top of routing
- Application proxy
- Works as a translator
- Most Firewalls are a combination or hybrid
- The general role is to block unsolicited traffic
48Firewall or Perimeter Security
- Do we need publicly accessible servers?
- How to protect transports?
- Remote access
- VPN
- Lock down where inbounds are coming from
- Email
- An Intrusion Detection System (IDS) is a
necessity today
49- Questions?
- This presentation can be found online at
- http//www.kirbykomputing.com/Shared20Documents/F
orms/AllItems.aspx
Brian Kirby SEDA Council of Governments bkirby_at_s
eda-cog.org bkirby_at_kirbykomputing.com