SlideShare ist ein Scribd-Unternehmen logo
1 von 12
‘‘How Secure Are Your ITHow Secure Are Your IT
Systems’Systems’
““What are the real threats and how to manage them”What are the real threats and how to manage them”
Darrell BurkeyDarrell BurkeyUnix Systems Administrator - GIAC Security Essentials CertificationUnix Systems Administrator - GIAC Security Essentials Certification
president@case.org.aupresident@case.org.au
Computing
ssistance
upport&
ducation
A
S
E
incorporated
CASE Inc 2
““IT Resources for theIT Resources for the
CommunityCommunity
by the Community”by the Community”
CASE was formed to assist individuals andCASE was formed to assist individuals and
community organisations in making bettercommunity organisations in making better
use of information technology to accomplishuse of information technology to accomplish
their goals.their goals.
Today’s discussions will be specific toToday’s discussions will be specific to
experiences from the community sector andexperiences from the community sector and
relate to systems and configurations mostrelate to systems and configurations most
commonly used by small to medium non-commonly used by small to medium non-
profit organisations.profit organisations.
CASE Inc 3
Limited resourcesLimited resources
Staff issuesStaff issues
Unpatched softwareUnpatched software
Outdated equipmentOutdated equipment
Viruses and malwareViruses and malware
False authorityFalse authority
CASE Inc 4
Define Your RiskDefine Your Risk
Risk = Threat x VulnerabilityRisk = Threat x Vulnerability
Defense in DepthDefense in Depth
No one solution will be effectiveNo one solution will be effective
What they wantWhat they want
Anything from random vandalism toAnything from random vandalism to
obtaining resources and informationobtaining resources and information
for use in organised crimefor use in organised crime
CASE Inc 5
Basic TheoryBasic Theory
The CASE Acid TestThe CASE Acid Test
Can you put an axe through it and continue to work withoutCan you put an axe through it and continue to work without
loss of data or productivity?loss of data or productivity?
How To Pass The TestHow To Pass The Test
Establish a robust, fault tolerant server-to-peer networkEstablish a robust, fault tolerant server-to-peer network
based on ‘best practice’ solutions maintained by qualifiedbased on ‘best practice’ solutions maintained by qualified
technical staff working to your specific needs and goals.technical staff working to your specific needs and goals.
Isolate WorkstationsIsolate Workstations
Proper network design will isolate your workstations fromProper network design will isolate your workstations from
connecting directly to external networksconnecting directly to external networks
CASE Inc 6
Basic TheoryBasic Theory
© Medical Networking Solutions LLC
CASE Inc 7
Social EngineeringSocial Engineering
A Typical Scam EmailA Typical Scam Email Intercepted by Server
Warning: This message has had one or more attachments removedWarning: This message has had one or more attachments removed
Warning: (3YMH6JJY.exe, 3YMH6JJY.zip).Warning: (3YMH6JJY.exe, 3YMH6JJY.zip).
Warning: Please read the "tucan_net-Attachment-Warning.txt" attachment(s) forWarning: Please read the "tucan_net-Attachment-Warning.txt" attachment(s) for
more information.more information.
Dear Microsoft Customer,Dear Microsoft Customer,
Starting 12/11/2009 the ‘Conficker’ worm began infecting Microsoft customersStarting 12/11/2009 the ‘Conficker’ worm began infecting Microsoft customers
unusually rapidly. Microsoft has been advised by your Internet provider that yourunusually rapidly. Microsoft has been advised by your Internet provider that your
network is infected.network is infected.
To counteract further spread we advise removing the infection using anTo counteract further spread we advise removing the infection using an
antispyware program. We are supplying all effected Windows Users with a freeantispyware program. We are supplying all effected Windows Users with a free
system scan in order to clean any files infected by the virus.system scan in order to clean any files infected by the virus.
Please install attached file to start the scan. The process takes under a minute andPlease install attached file to start the scan. The process takes under a minute and
will prevent your files from being compromised. We appreciate your promptwill prevent your files from being compromised. We appreciate your prompt
cooperation.cooperation.
Regards,Regards,
Microsoft Windows Agent #2 (Hollis)Microsoft Windows Agent #2 (Hollis)
Microsoft Windows Computer Safety DivisionMicrosoft Windows Computer Safety Division
CASE Inc 8
What Works for UsWhat Works for Us
Servers based on open source softwareServers based on open source software
maintained by qualified staff have the potentialmaintained by qualified staff have the potential
to address the most critical of issues:to address the most critical of issues:
 ReliabilityReliability
 Security - firewall, monitoring, reportingSecurity - firewall, monitoring, reporting
 Timely technical supportTimely technical support
 Low initial costsLow initial costs
 Low ongoing costsLow ongoing costs
 Services to meet a variety of needsServices to meet a variety of needs
CASE Inc 9
False AuthorityFalse Authority
““I swear this is true. It happened to myI swear this is true. It happened to my
brother. He opened the email and not onlybrother. He opened the email and not only
did it erase his hard drive but all his housedid it erase his hard drive but all his house
plants died and the food in his refrigeratorplants died and the food in his refrigerator
went off! Make sure you send this messagewent off! Make sure you send this message
to everyone in your address book to warn allto everyone in your address book to warn all
your friends so it doesn’t happen to them.”your friends so it doesn’t happen to them.”
““I don’t know anything about IT but here’sI don’t know anything about IT but here’s
what we are going to do because...”what we are going to do because...”
CASE Inc 10
Improved DecisionsImproved Decisions
 Ask for qualificationsAsk for qualifications
 Ask for examples of workAsk for examples of work
 Ask about membership to professionalAsk about membership to professional
bodies such as the ACS and SAGEbodies such as the ACS and SAGE
 Be aware of possible biasBe aware of possible bias
 Consider an IT auditConsider an IT audit
CASE Inc 11
Support Your StaffSupport Your Staff
 Do you have an Acceptable Use Policy?Do you have an Acceptable Use Policy?
 What training do you provide?What training do you provide?
 How well is your IT documented?How well is your IT documented?
 Do you have a password policy?Do you have a password policy?
 Knowledge empowers!Knowledge empowers!
 Ensure you have appropriate supportEnsure you have appropriate support
CASE Inc 12
Questions?
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Agile Scrum Foundation - Exin
Agile Scrum Foundation - ExinAgile Scrum Foundation - Exin
Agile Scrum Foundation - Exin
Alessandro Grillo
 
Worldwide Who's Who Press release from LinkedIn
Worldwide Who's Who Press release from LinkedInWorldwide Who's Who Press release from LinkedIn
Worldwide Who's Who Press release from LinkedIn
Robert Edwards
 

Was ist angesagt? (18)

Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering AllTheTalks Security Chaos Engineering
AllTheTalks Security Chaos Engineering
 
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos EngineeringRSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
RSAC 365 2021 Virtual Summit Spotlite Presentation on Security Chaos Engineering
 
DNA Cloud Backup
DNA Cloud BackupDNA Cloud Backup
DNA Cloud Backup
 
Future-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical ThreatsFuture-proofing Supply Chain against emerging Cyber-physical Threats
Future-proofing Supply Chain against emerging Cyber-physical Threats
 
ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2
 
Agile Scrum Foundation - Exin
Agile Scrum Foundation - ExinAgile Scrum Foundation - Exin
Agile Scrum Foundation - Exin
 
Worldwide Who's Who Press release from LinkedIn
Worldwide Who's Who Press release from LinkedInWorldwide Who's Who Press release from LinkedIn
Worldwide Who's Who Press release from LinkedIn
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOpsNewOps Days 2019: The New Ways of Chaos, Security, and DevOps
NewOps Days 2019: The New Ways of Chaos, Security, and DevOps
 
Future-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threatsFuture-proofing maritime ports against emerging cyber-physical threats
Future-proofing maritime ports against emerging cyber-physical threats
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
AgileScrum
AgileScrumAgileScrum
AgileScrum
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote Working
 
Dl Cowan Resume July 2012
Dl Cowan Resume July 2012Dl Cowan Resume July 2012
Dl Cowan Resume July 2012
 
Secrets of SolarWinds SAM
Secrets of SolarWinds SAMSecrets of SolarWinds SAM
Secrets of SolarWinds SAM
 
A Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and BusinessA Tale of Woe, Chaos, and Business
A Tale of Woe, Chaos, and Business
 

Andere mochten auch

Marina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle Prizes
Marina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle PrizesMarina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle Prizes
Marina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle Prizes
mjslee77
 

Andere mochten auch (20)

подорож по математичному океані
подорож по математичному океаніподорож по математичному океані
подорож по математичному океані
 
Psicopanoramas
PsicopanoramasPsicopanoramas
Psicopanoramas
 
Company Analysis
Company AnalysisCompany Analysis
Company Analysis
 
5 Cara mengatasi jerawat secara alami
5 Cara mengatasi jerawat secara alami5 Cara mengatasi jerawat secara alami
5 Cara mengatasi jerawat secara alami
 
La confessione
La confessioneLa confessione
La confessione
 
Ayotzinapa: Piece for facebook (nation)
Ayotzinapa: Piece for facebook (nation)Ayotzinapa: Piece for facebook (nation)
Ayotzinapa: Piece for facebook (nation)
 
Finance for non finance course outline (32 Hours/ 4 day)
Finance for non finance course outline (32 Hours/ 4 day)Finance for non finance course outline (32 Hours/ 4 day)
Finance for non finance course outline (32 Hours/ 4 day)
 
Email marketing (Kiel Van Daal + Paul Armstrong, Sitback Solutions)
Email marketing (Kiel Van Daal + Paul Armstrong, Sitback Solutions)Email marketing (Kiel Van Daal + Paul Armstrong, Sitback Solutions)
Email marketing (Kiel Van Daal + Paul Armstrong, Sitback Solutions)
 
Partes de la oración nivel i
Partes de la oración nivel iPartes de la oración nivel i
Partes de la oración nivel i
 
C:\Documents And Settings\Icm01\Desktop\Reading Habit Of Undergraduates In Sr...
C:\Documents And Settings\Icm01\Desktop\Reading Habit Of Undergraduates In Sr...C:\Documents And Settings\Icm01\Desktop\Reading Habit Of Undergraduates In Sr...
C:\Documents And Settings\Icm01\Desktop\Reading Habit Of Undergraduates In Sr...
 
Planificación
PlanificaciónPlanificación
Planificación
 
Chocolate Residue To Hydrogen Fuel Presentation
Chocolate Residue To Hydrogen Fuel PresentationChocolate Residue To Hydrogen Fuel Presentation
Chocolate Residue To Hydrogen Fuel Presentation
 
додавання суми до числа
додавання суми до числадодавання суми до числа
додавання суми до числа
 
MelWelchNOV16
MelWelchNOV16MelWelchNOV16
MelWelchNOV16
 
-водойми--україни
-водойми--україни-водойми--україни
-водойми--україни
 
Customer connect program ver 3
Customer connect program ver 3Customer connect program ver 3
Customer connect program ver 3
 
Cloud computing and managed services (Sumit Dutta, CSSWA)
Cloud computing and managed services (Sumit Dutta, CSSWA)Cloud computing and managed services (Sumit Dutta, CSSWA)
Cloud computing and managed services (Sumit Dutta, CSSWA)
 
Security supervisor ppt
Security supervisor pptSecurity supervisor ppt
Security supervisor ppt
 
Ubuntu in the office (Gregory Storer, Family Life)
Ubuntu in the office (Gregory Storer, Family Life)Ubuntu in the office (Gregory Storer, Family Life)
Ubuntu in the office (Gregory Storer, Family Life)
 
Marina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle Prizes
Marina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle PrizesMarina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle Prizes
Marina Chos Tae Kwon Do Easter 2011 Group Photo and Raffle Prizes
 

Ähnlich wie How secure are your IT systems? (Darrell Burkey, CASE)

Cyber security innovation imho
Cyber security innovation imhoCyber security innovation imho
Cyber security innovation imho
W Fred Seigneur
 
Introduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocIntroduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.Doc
Walmart Super Center
 
Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docx
jessiehampson
 

Ähnlich wie How secure are your IT systems? (Darrell Burkey, CASE) (20)

Cyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.comCyb 610 Your world/newtonhelp.com
Cyb 610 Your world/newtonhelp.com
 
Cyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.comCyb 610 Motivated Minds/newtonhelp.com
Cyb 610 Motivated Minds/newtonhelp.com
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...Are you ready for the next attack? reviewing the sp security checklist (apnic...
Are you ready for the next attack? reviewing the sp security checklist (apnic...
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.com
 
Cyber security innovation imho
Cyber security innovation imhoCyber security innovation imho
Cyber security innovation imho
 
The Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - PowertechThe Truth About Viruses on Power Systems - Powertech
The Truth About Viruses on Power Systems - Powertech
 
Csec 610 Motivated Minds/newtonhelp.com
Csec 610 Motivated Minds/newtonhelp.comCsec 610 Motivated Minds/newtonhelp.com
Csec 610 Motivated Minds/newtonhelp.com
 
Csec 610 Extraordinary Success/newtonhelp.com
Csec 610 Extraordinary Success/newtonhelp.comCsec 610 Extraordinary Success/newtonhelp.com
Csec 610 Extraordinary Success/newtonhelp.com
 
Csec 610 Education is Power/newtonhelp.com
Csec 610 Education is Power/newtonhelp.comCsec 610 Education is Power/newtonhelp.com
Csec 610 Education is Power/newtonhelp.com
 
Csec 610 Your world/newtonhelp.com
Csec 610 Your world/newtonhelp.comCsec 610 Your world/newtonhelp.com
Csec 610 Your world/newtonhelp.com
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 
Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)Broken by design (Danny Fullerton)
Broken by design (Danny Fullerton)
 
Introduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.DocIntroduction To Pc Security Pre Test.Doc
Introduction To Pc Security Pre Test.Doc
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
Information security and protecting your business
Information security and protecting your businessInformation security and protecting your business
Information security and protecting your business
 
Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docx
 
What we do
What we doWhat we do
What we do
 

Mehr von makinglinks

Mehr von makinglinks (12)

Teaspoon of Concrete (Aram Hosie, Inspire Foundation)
Teaspoon of Concrete (Aram Hosie, Inspire Foundation)Teaspoon of Concrete (Aram Hosie, Inspire Foundation)
Teaspoon of Concrete (Aram Hosie, Inspire Foundation)
 
Facebook hands on (Bianca Wirth, Wirth Consulting)
Facebook hands on (Bianca Wirth, Wirth Consulting)Facebook hands on (Bianca Wirth, Wirth Consulting)
Facebook hands on (Bianca Wirth, Wirth Consulting)
 
Measuring social return in a HITnet community participation project (Julie Gi...
Measuring social return in a HITnet community participation project (Julie Gi...Measuring social return in a HITnet community participation project (Julie Gi...
Measuring social return in a HITnet community participation project (Julie Gi...
 
Using film as a personal advocacy tool, an evaluation method and a social act...
Using film as a personal advocacy tool, an evaluation method and a social act...Using film as a personal advocacy tool, an evaluation method and a social act...
Using film as a personal advocacy tool, an evaluation method and a social act...
 
Why Weight WA (Annie Gan, PHAIWA + Diabetes WA)
Why Weight WA (Annie Gan, PHAIWA + Diabetes WA)Why Weight WA (Annie Gan, PHAIWA + Diabetes WA)
Why Weight WA (Annie Gan, PHAIWA + Diabetes WA)
 
Online technology + leading women’s health experts = innovative education aus...
Online technology + leading women’s health experts = innovative education aus...Online technology + leading women’s health experts = innovative education aus...
Online technology + leading women’s health experts = innovative education aus...
 
Making links using an internet intervention to support breastfeeding mothers ...
Making links using an internet intervention to support breastfeeding mothers ...Making links using an internet intervention to support breastfeeding mothers ...
Making links using an internet intervention to support breastfeeding mothers ...
 
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)
ICT planning and choosing appropriate ICTs (Sumit Dutta - CSSWA)
 
HeartNET: an online community giving heart patients a voice (Lynsey Ulridge -...
HeartNET: an online community giving heart patients a voice (Lynsey Ulridge -...HeartNET: an online community giving heart patients a voice (Lynsey Ulridge -...
HeartNET: an online community giving heart patients a voice (Lynsey Ulridge -...
 
Free and open source software (FOSS) for NGOs (Sky Croeser - Internet Studies...
Free and open source software (FOSS) for NGOs (Sky Croeser - Internet Studies...Free and open source software (FOSS) for NGOs (Sky Croeser - Internet Studies...
Free and open source software (FOSS) for NGOs (Sky Croeser - Internet Studies...
 
Designing online forms (Jessica Kerr, Formulate)
Designing online forms (Jessica Kerr, Formulate)Designing online forms (Jessica Kerr, Formulate)
Designing online forms (Jessica Kerr, Formulate)
 
Online Game Mechanics for Social Action (Richard Giles, CPSU/CSA)
Online Game Mechanics for Social Action (Richard Giles, CPSU/CSA) Online Game Mechanics for Social Action (Richard Giles, CPSU/CSA)
Online Game Mechanics for Social Action (Richard Giles, CPSU/CSA)
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

How secure are your IT systems? (Darrell Burkey, CASE)

  • 1. ‘‘How Secure Are Your ITHow Secure Are Your IT Systems’Systems’ ““What are the real threats and how to manage them”What are the real threats and how to manage them” Darrell BurkeyDarrell BurkeyUnix Systems Administrator - GIAC Security Essentials CertificationUnix Systems Administrator - GIAC Security Essentials Certification president@case.org.aupresident@case.org.au Computing ssistance upport& ducation A S E incorporated
  • 2. CASE Inc 2 ““IT Resources for theIT Resources for the CommunityCommunity by the Community”by the Community” CASE was formed to assist individuals andCASE was formed to assist individuals and community organisations in making bettercommunity organisations in making better use of information technology to accomplishuse of information technology to accomplish their goals.their goals. Today’s discussions will be specific toToday’s discussions will be specific to experiences from the community sector andexperiences from the community sector and relate to systems and configurations mostrelate to systems and configurations most commonly used by small to medium non-commonly used by small to medium non- profit organisations.profit organisations.
  • 3. CASE Inc 3 Limited resourcesLimited resources Staff issuesStaff issues Unpatched softwareUnpatched software Outdated equipmentOutdated equipment Viruses and malwareViruses and malware False authorityFalse authority
  • 4. CASE Inc 4 Define Your RiskDefine Your Risk Risk = Threat x VulnerabilityRisk = Threat x Vulnerability Defense in DepthDefense in Depth No one solution will be effectiveNo one solution will be effective What they wantWhat they want Anything from random vandalism toAnything from random vandalism to obtaining resources and informationobtaining resources and information for use in organised crimefor use in organised crime
  • 5. CASE Inc 5 Basic TheoryBasic Theory The CASE Acid TestThe CASE Acid Test Can you put an axe through it and continue to work withoutCan you put an axe through it and continue to work without loss of data or productivity?loss of data or productivity? How To Pass The TestHow To Pass The Test Establish a robust, fault tolerant server-to-peer networkEstablish a robust, fault tolerant server-to-peer network based on ‘best practice’ solutions maintained by qualifiedbased on ‘best practice’ solutions maintained by qualified technical staff working to your specific needs and goals.technical staff working to your specific needs and goals. Isolate WorkstationsIsolate Workstations Proper network design will isolate your workstations fromProper network design will isolate your workstations from connecting directly to external networksconnecting directly to external networks
  • 6. CASE Inc 6 Basic TheoryBasic Theory © Medical Networking Solutions LLC
  • 7. CASE Inc 7 Social EngineeringSocial Engineering A Typical Scam EmailA Typical Scam Email Intercepted by Server Warning: This message has had one or more attachments removedWarning: This message has had one or more attachments removed Warning: (3YMH6JJY.exe, 3YMH6JJY.zip).Warning: (3YMH6JJY.exe, 3YMH6JJY.zip). Warning: Please read the "tucan_net-Attachment-Warning.txt" attachment(s) forWarning: Please read the "tucan_net-Attachment-Warning.txt" attachment(s) for more information.more information. Dear Microsoft Customer,Dear Microsoft Customer, Starting 12/11/2009 the ‘Conficker’ worm began infecting Microsoft customersStarting 12/11/2009 the ‘Conficker’ worm began infecting Microsoft customers unusually rapidly. Microsoft has been advised by your Internet provider that yourunusually rapidly. Microsoft has been advised by your Internet provider that your network is infected.network is infected. To counteract further spread we advise removing the infection using anTo counteract further spread we advise removing the infection using an antispyware program. We are supplying all effected Windows Users with a freeantispyware program. We are supplying all effected Windows Users with a free system scan in order to clean any files infected by the virus.system scan in order to clean any files infected by the virus. Please install attached file to start the scan. The process takes under a minute andPlease install attached file to start the scan. The process takes under a minute and will prevent your files from being compromised. We appreciate your promptwill prevent your files from being compromised. We appreciate your prompt cooperation.cooperation. Regards,Regards, Microsoft Windows Agent #2 (Hollis)Microsoft Windows Agent #2 (Hollis) Microsoft Windows Computer Safety DivisionMicrosoft Windows Computer Safety Division
  • 8. CASE Inc 8 What Works for UsWhat Works for Us Servers based on open source softwareServers based on open source software maintained by qualified staff have the potentialmaintained by qualified staff have the potential to address the most critical of issues:to address the most critical of issues:  ReliabilityReliability  Security - firewall, monitoring, reportingSecurity - firewall, monitoring, reporting  Timely technical supportTimely technical support  Low initial costsLow initial costs  Low ongoing costsLow ongoing costs  Services to meet a variety of needsServices to meet a variety of needs
  • 9. CASE Inc 9 False AuthorityFalse Authority ““I swear this is true. It happened to myI swear this is true. It happened to my brother. He opened the email and not onlybrother. He opened the email and not only did it erase his hard drive but all his housedid it erase his hard drive but all his house plants died and the food in his refrigeratorplants died and the food in his refrigerator went off! Make sure you send this messagewent off! Make sure you send this message to everyone in your address book to warn allto everyone in your address book to warn all your friends so it doesn’t happen to them.”your friends so it doesn’t happen to them.” ““I don’t know anything about IT but here’sI don’t know anything about IT but here’s what we are going to do because...”what we are going to do because...”
  • 10. CASE Inc 10 Improved DecisionsImproved Decisions  Ask for qualificationsAsk for qualifications  Ask for examples of workAsk for examples of work  Ask about membership to professionalAsk about membership to professional bodies such as the ACS and SAGEbodies such as the ACS and SAGE  Be aware of possible biasBe aware of possible bias  Consider an IT auditConsider an IT audit
  • 11. CASE Inc 11 Support Your StaffSupport Your Staff  Do you have an Acceptable Use Policy?Do you have an Acceptable Use Policy?  What training do you provide?What training do you provide?  How well is your IT documented?How well is your IT documented?  Do you have a password policy?Do you have a password policy?  Knowledge empowers!Knowledge empowers!  Ensure you have appropriate supportEnsure you have appropriate support