Title: Information Security Risk Assessment and Plans
1Information Security Risk Assessment and Plans
2Meeting Objective
- Briefly review 2003-2004 objectives
- Do a reasonableness check on our plans for the
next two years prior to costing them out.
3Security Strategies
- Risk-driven focus on those opportunities with
highest risk reduction bang for the buck. - Make security the default wherever possible.
- Achievable, affordable plans. Concrete steps and
early deliverables. Extend early successes in
subsequent years. - Security-in-depth prevention, detection,
response. - Evaluate a network design and migration strategy
that balances availability against security, and
capable of supporting broader preventative
network security measures.
42003-2004 Activities
5Intrusion Detection
- A new tool, Arbor Peakflow, allows us to collect
and analyze network "flow" info from Penn
routers. - This helps us to see lists of
- top talkers,
- traffic by protocol (web vs email vs p2p vs voice
vs video, etc), - traffic by destination service provider (Cogent
vs Qwest vs Abilene/Internet2), - and much more.
6Intrusion Detection
- Peakflow also allows us to identify denial of
service (DoS, DDoS) attacks in progress,
including sources and protocols, and possible
filtering options. - In this role, the Arbor Peakflow tools act as a
very sophisticated distributed IDS, helping us to
do targeting filtering during major network-based
attacks. - No dedicated IDS systems needed to be put inline
into the network. Netflow data from the routers
is used.
72004-2005 Risk Assessment
8Proposed Security Plans
9Improving Web App Security
10Sniffing
11New machines arrive on campus
12Viruses/Worms
13Phishing
Phishing attacks use 'spoofed' e-mails and
fraudulent websites designed to fool recipients
into divulging personal financial data such as
credit card numbers, account usernames and
passwords, social security numbers, etc. By
hijacking the trusted brands of well-known banks,
online retailers and credit card companies,
phishers are able to convince up to 5 of
recipients to respond to them.
14Phishing
15Phishing
62-99-200-17.sdsl-line.inode.at
16Phishing
17Malicious Employee
18Patches for Applications
19Zero Day Worm