1 / 7

Cyber Security – Our Approach

Cyber Security – Our Approach. James Clement Network Specialist ETS: Communications & Network Services jclement@monroecc.edu. ETS:CNS recent security enhancements. Continued migration to separate networks based on user. More restrictive firewall rulesets at DCC, PSTF, ATC.

ashley
Download Presentation

Cyber Security – Our Approach

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security – Our Approach James Clement Network Specialist ETS: Communications & Network Services jclement@monroecc.edu

  2. ETS:CNS recent security enhancements • Continued migration to separate networks based on user. • More restrictive firewall rulesets at DCC, PSTF, ATC. • Bluesocket Wireless Gateway • Outlook Web Access upgraded to SSL. • Attachment filtering on college related E-Mail. • Centralized patch management for ETS servers, clients.

  3. ETS:CNS upcoming challenges • Banner Systems Isolation • Voice Over IP Security • Trends in Technology, more is better. • Networks trust the middle man.

  4. Wireless security • Bluesocket Wireless Gateway • Supports IPSec VPN Connections • Requires authenticated users • Uses SSL • Independent Firewall • Use a VPN client such as MCC@Home. • College wide migration to Cisco 1200 access points. • Turn it off when you don’t need it.

  5. E-Mail security Outline of standard preventative measures: • Avoid accessing off-campus E-mail from on campus. • Use a “junk” E-Mail account, such as Yahoo or Google free mail. • Don’t open unknown attachments directly, save & scan them first. • Question messages from unknown sources, suspect titles. Current ETS approach to protection: • Filter dangerous content including:.vbs .com .shs .js .bat .cmd .pif .scr .chm .vb .eml .exe .ceo • Filter media files (.mpg .wmv .avi .mp3 .wm .mpeg) > 1 Megabyte in size.

  6. Easy steps to improving your security • Passwords – Change often, Use hard to guess combinations, Don’t tell. • E-Mail – Question mail from unknown senders. • Stay current on Windows Updates. • Update Anti-virus signatures often. • Clean Spyware with tools such as Spybot. • Use the Google Toolbar to stop pop-ups. • Avoid installing “entertainment” or novelty & File Sharing software. • Use VPN clients (MCC@Home) on untrusted networks. • Avoid using public terminals, insecure computers.

  7. Questions & Comments Related Links: http://toolbar.google.com

More Related