Difference between revisions of "Network Security"

From SOBAC Wiki
Jump to navigation Jump to search
(→‎Resources: Added UofW e-mail breach)
(Moved Meeting Notes to own page)
Line 5: Line 5:
 
; Location: *** Room 1300 *** -- Conrad Grebel University College, 140 Westmount Rd. N., Waterloo, Ontario {{map|url=https://osm.org/go/ZXnbg2DSE--?m=}} <!-- xxxxx Revise as needed, of course --> <!-- xxxxx Revise as needed, of course -->
 
; Location: *** Room 1300 *** -- Conrad Grebel University College, 140 Westmount Rd. N., Waterloo, Ontario {{map|url=https://osm.org/go/ZXnbg2DSE--?m=}} <!-- xxxxx Revise as needed, of course --> <!-- xxxxx Revise as needed, of course -->
 
<!-- Upper Board Room in First United Church, 16 William Street West, Waterloo, Ontario {{map|url=https://osm.org/go/ZXna93PBA?m=}} -->
 
<!-- Upper Board Room in First United Church, 16 William Street West, Waterloo, Ontario {{map|url=https://osm.org/go/ZXna93PBA?m=}} -->
<!-- Communitech Jelly Bean Room 1st Floor, 151 Charles Street West, Kitchener, Ontario {{map|url=https://osm.org/go/ZXnwUqGU--?m=}} -->  
+
<!-- Communitech Jelly Bean Room 1st Floor, 151 Charles Street West, Kitchener, Ontario {{map|url=https://osm.org/go/ZXnwUqGU--?m=}} --> {{:Collaborative Work Space}}
 +
 
 +
-----
 +
 
 +
 
 
<!-- Room 1301 -- Conrad Grebel University College, 140 Westmount Rd. N., Waterloo, Ontario {{map|url=https://osm.org/go/ZXnbg2DSE--?m=}} -->
 
<!-- Room 1301 -- Conrad Grebel University College, 140 Westmount Rd. N., Waterloo, Ontario {{map|url=https://osm.org/go/ZXnbg2DSE--?m=}} -->
 
<!-- ; Event Announcement: [[xxxxx Page Name/Announcement xxxxx YYYY-MM-DD]] --> <!-- URL for the announcement message sent a few days before the meeting -->
 
<!-- ; Event Announcement: [[xxxxx Page Name/Announcement xxxxx YYYY-MM-DD]] --> <!-- URL for the announcement message sent a few days before the meeting -->
Line 17: Line 21:
  
 
* [[Network Security/Meeting Notes 2019-03-11]]
 
* [[Network Security/Meeting Notes 2019-03-11]]
 
==== Resources ====
 
* Firewalls
 
** The most secure firewall: [[File:Nipper for Electronic Wire (Old).png|150px]]
 
** Another secure firewall: [https://www.pfsense.org/ pfSense]
 
* Intrusion Detection Software
 
* Pen Testing apps
 
 
 
* [https://www.techsoupcanada.ca/en/directory/361 TechSoup Canada Catalogue: Server and Network Management]
 
 
 
* Claim: The greatest threat in Network Security is NetAdmin or User Error
 
** [[File:Network Security Dave.jpg|640px]]
 
** Another e-mail breach caused by human error:
 
*** [https://www.cbc.ca/news/canada/kitchener-waterloo/university-waterloo-data-email-breach-information-quest-1.5048814 Names, banking information accidentally shared in emails to University of Waterloo students | CBC News]
 
** Data exfiltration due to user error:
 
*** [https://www.thestar.com/politics/provincial/2019/01/21/privacy-breach-hits-45000-recipients-of-ontarios-disability-support-program.html Privacy breach hits 45,000 recipients of Ontario’s disability support program | The Star]
 
** NetAdmin failed to renew expired domain names:
 
*** [https://arstechnica.com/information-technology/2019/01/godaddy-weakness-let-bomb-threat-scammers-hijack-thousands-of-big-name-domains/ GoDaddy weakness let bomb threat scammers hijack thousands of big-name domains | Ars Technica]
 
** Vulnerability not acknowledged by vendor:
 
*** [https://www.cbc.ca/news/canada/new-brunswick/cyber-malware-breach-dark-web-municipal-parking-servier-click2gov-centralsquare-1.5043818 City knew of massive cyber breach days before admitting it | CBC News]
 
*** <blockquote>On Dec.19, the day following Solomon's exchange with Caissie, the city received notice from CentralSquare Technologies, the Florida company providing the Click2Gov parking server software, that there was no problem with the system. "Resolution: Checked Click2Gov server for evidence of malware/possible breach, no evidence found of breach/malware," says the statement signed only "Customer Support."</blockquote>
 
** Pre-emptive shutdown of mail system to prevent a virus attack that might shut down the mail system.
 
 
=== Meeting Notes ===
 
Spoke about resources, war stories
 
 
* Proprietary mail systems
 
** Errors in implementation, makes mail inaccessible, or sends mail when unwanted.
 
** Corporate culture prevents people from speaking of security flaws
 
 
 
* Bugs in the software
 
* Errors in procedures
 
*
 
 
 
 
==== The Cloud ====
 
* "If the data was in the cloud it would have been safe"
 
* What is The Cloud?
 
** Somebody manages the servers, still subject to human error
 
** But reduces the human interaction that is needed
 
** Maybe if '''everything''' is run by robots...
 
*** But that's not the way Nonprofits operate, engaging people to be more involved
 
 
 
* Open Source groups want more interaction, so still room for error
 
** eg. LibreOffice: Get a professional to manage website? Or keep local group involvement?  No to robots
 
 
* Robots have programmers too
 
** One more level of abstraction
 
 
 
* Problems solved?
 
** Email spoofing, phishing schemes: Joe Jobs, third-party addressbooks breached
 
** Could contact the apparent sender, but that person may not be involved in the message at all
 
 
 
 
=== Tour of pfSense ===
 
 
 
=== Multiple connections to isolate traffic ===
 
 
 
 
 
 
 
 
 
 
 
 
  
  
 
[[Category:NPSA]]
 
[[Category:NPSA]]
 
[[Category:Events]]
 
[[Category:Events]]

Revision as of 05:50, 25 March 2019

Network Security

Date
Monday, 11 March 2019 from 7:00pm to 9:00pm iCal
Meetup Event
https://www.meetup.com/NetSquared-Kitchener-Waterloo/events/257702185/
Location
*** Room 1300 *** -- Conrad Grebel University College, 140 Westmount Rd. N., Waterloo, Ontario Map
=== Collaborative Work Space === 
Date
Monday, 8 April 2019 from 7:00pm to 9:00pm iCal
Meetup Event
xxxxx URL to meetup.com
Location
*** Room 1300 *** -- Conrad Grebel University College, 140 Westmount Rd. N., Waterloo, Ontario Map

xxxxx Description goes here.


--Bob Jonkman & Marc Paré


Resources

Link Text

Link Text



We've talked about Malware and the importance of Keeping Computers Up To Date, and even just about The Things We Should Fear. But what new hazards are unveiled when you connect two or more computers together? When some of those computers aren't on your own network? When malusers are out there trying to break into your network? When you're actually inviting everyone into your network by running servers and services? Should you just outsource everything? Or are there tools available for the Non-Profit SysAdmin to help secure your networks?

We'll talk about the hazards of running a public network, and go over a list of tools and software.

--Marc Paré & Bob Jonkman