SlideShare a Scribd company logo
Institutional Web Management Workshop September 1998
Information Services
Security principles
Andrew Cormack
Institutional Web Management Workshop September 1998
Information Services
Security principles
• know what computer is for
• run only what's needed with minimal access
• prevent unauthorised access
• keep self and machine up to date
• monitor the system
• educate users
Institutional Web Management Workshop September 1998
Information Services
Know what computer is for
• software must reflect purpose
– workstation ?
– dedicated server ?
• assume out-of-box systems are insecure
– most have old, vulnerable servers
– with everything enabled
– well-known, unnecessary accounts
• usually disable services; seldom enable them
• beware of interactions between services
Institutional Web Management Workshop September 1998
Information Services
Minimal access
• run nothing you don't need
– understand everything you run
• run servers with least possible privilege
– unprivileged accounts
– reduced options
• do services need to be bi-directional?
– only need outbound sendmail on workstations
• restrict access using wrappers and/or routers
Institutional Web Management Workshop September 1998
Information Services
Prevent unauthorised access
• few accounts with good passwords
• see later ...
Institutional Web Management Workshop September 1998
Information Services
Keep up to date
• understand what you run
• use recent versions
– but avoid the “bleeding edge”
• patch as soon as possible
• join mailing lists & community
Institutional Web Management Workshop September 1998
Information Services
Monitor
• backups are very useful
– initial backup for comparison
– later backups as checkpoints
• know what 'normal' system is
• keep & check logfiles
• investigate oddities
• synchronise clocks if possible
– it makes tracking network attacks far easier
• use tools: audits, portscanners etc.
Institutional Web Management Workshop September 1998
Information Services
Educate users
• they can outwit everything you do!

More Related Content

What's hot

CIE AS Level Applied ICT Unit 2 - How Organisations Use ICT
 CIE AS Level Applied ICT Unit 2 - How Organisations Use ICT CIE AS Level Applied ICT Unit 2 - How Organisations Use ICT
CIE AS Level Applied ICT Unit 2 - How Organisations Use ICT
Mr G
 
Design Summit - User stories from the field - Chris Jung
Design Summit - User stories from the field - Chris JungDesign Summit - User stories from the field - Chris Jung
Design Summit - User stories from the field - Chris Jung
ManageIQ
 
Access Control Software
Access Control SoftwareAccess Control Software
Access Control Software
BadgePass
 
CIE A Level Applied ICT Unit 7 - Computer Networks
 CIE A Level Applied ICT Unit 7 - Computer Networks CIE A Level Applied ICT Unit 7 - Computer Networks
CIE A Level Applied ICT Unit 7 - Computer Networks
Mr G
 
Traka property management flyer
Traka property management flyerTraka property management flyer
Traka property management flyer
Tara Wally
 
Module 7 (printing) Review
Module 7 (printing) ReviewModule 7 (printing) Review
Module 7 (printing) Review
Amy McMullin
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
Amy McMullin
 
Security Framework for the IPv6 Era
Security Framework for the IPv6 EraSecurity Framework for the IPv6 Era
Security Framework for the IPv6 Era
Shinsuke SUZUKI
 
Minicom - Remote Data Center Management
Minicom - Remote Data Center ManagementMinicom - Remote Data Center Management
Minicom - Remote Data Center Management
Minicom Advanced Systems
 
Solo Small Business Gateway
Solo Small Business GatewaySolo Small Business Gateway
Solo Small Business Gateway
SOLO Gateway
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)
Ramla Sheikh
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT Outsourcing
MultiTech IT
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
Ricoh India Limited
 
Cybersecurity Summit AHR20 Detect KMC
Cybersecurity Summit AHR20 Detect KMCCybersecurity Summit AHR20 Detect KMC
Cybersecurity Summit AHR20 Detect KMC
Cimetrics Inc
 
Webinar Access Control - October 2015
Webinar Access Control - October 2015Webinar Access Control - October 2015
Webinar Access Control - October 2015
Michael Miller
 
DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016
Scott Carlson
 
Encryption
EncryptionEncryption
Encryption
Nitin Parbhakar
 
Shaik Saleem-Resum-2016
Shaik Saleem-Resum-2016Shaik Saleem-Resum-2016
Shaik Saleem-Resum-2016
Shaik Saleem
 
Additional Skills
Additional SkillsAdditional Skills
Additional Skills
Ravi Bandekar
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and Auditing
Precisely
 

What's hot (20)

CIE AS Level Applied ICT Unit 2 - How Organisations Use ICT
 CIE AS Level Applied ICT Unit 2 - How Organisations Use ICT CIE AS Level Applied ICT Unit 2 - How Organisations Use ICT
CIE AS Level Applied ICT Unit 2 - How Organisations Use ICT
 
Design Summit - User stories from the field - Chris Jung
Design Summit - User stories from the field - Chris JungDesign Summit - User stories from the field - Chris Jung
Design Summit - User stories from the field - Chris Jung
 
Access Control Software
Access Control SoftwareAccess Control Software
Access Control Software
 
CIE A Level Applied ICT Unit 7 - Computer Networks
 CIE A Level Applied ICT Unit 7 - Computer Networks CIE A Level Applied ICT Unit 7 - Computer Networks
CIE A Level Applied ICT Unit 7 - Computer Networks
 
Traka property management flyer
Traka property management flyerTraka property management flyer
Traka property management flyer
 
Module 7 (printing) Review
Module 7 (printing) ReviewModule 7 (printing) Review
Module 7 (printing) Review
 
Chapter 8 Presentaion
Chapter 8 PresentaionChapter 8 Presentaion
Chapter 8 Presentaion
 
Security Framework for the IPv6 Era
Security Framework for the IPv6 EraSecurity Framework for the IPv6 Era
Security Framework for the IPv6 Era
 
Minicom - Remote Data Center Management
Minicom - Remote Data Center ManagementMinicom - Remote Data Center Management
Minicom - Remote Data Center Management
 
Solo Small Business Gateway
Solo Small Business GatewaySolo Small Business Gateway
Solo Small Business Gateway
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT Outsourcing
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
Cybersecurity Summit AHR20 Detect KMC
Cybersecurity Summit AHR20 Detect KMCCybersecurity Summit AHR20 Detect KMC
Cybersecurity Summit AHR20 Detect KMC
 
Webinar Access Control - October 2015
Webinar Access Control - October 2015Webinar Access Control - October 2015
Webinar Access Control - October 2015
 
DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016
 
Encryption
EncryptionEncryption
Encryption
 
Shaik Saleem-Resum-2016
Shaik Saleem-Resum-2016Shaik Saleem-Resum-2016
Shaik Saleem-Resum-2016
 
Additional Skills
Additional SkillsAdditional Skills
Additional Skills
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and Auditing
 

Viewers also liked

A New Day Has Come
A New Day Has ComeA New Day Has Come
A New Day Has Come
Paola Z.
 
Lectura de un dato
Lectura de un datoLectura de un dato
Lectura de un dato
Alba2alvarez
 
379 口语奶茶项目
379 口语奶茶项目379 口语奶茶项目
379 口语奶茶项目
Rui (Nash) Yang
 
History and actors of nonviolence. — 06. From 1939 to 1949
History and actors of nonviolence. — 06. From 1939 to 1949History and actors of nonviolence. — 06. From 1939 to 1949
History and actors of nonviolence. — 06. From 1939 to 1949
Institut de recherche sur la Résolution Non-violente des Conflits
 
Producción industrial de vitaminas y enzimas
Producción industrial de vitaminas y enzimasProducción industrial de vitaminas y enzimas
Producción industrial de vitaminas y enzimas
brtoy
 
Diferencia entre gerencia y administración
Diferencia entre gerencia y administraciónDiferencia entre gerencia y administración
Diferencia entre gerencia y administración
Manuel Bedoya D
 
Kĩ năng sinh tồn
Kĩ năng sinh tồnKĩ năng sinh tồn
Kĩ năng sinh tồn
Tuan Dau Vuong
 
Gerencia publica - Hector Oyarce
Gerencia publica - Hector OyarceGerencia publica - Hector Oyarce
Gerencia publica - Hector Oyarce
Manuel Bedoya D
 

Viewers also liked (10)

Ppt ebata g
Ppt ebata gPpt ebata g
Ppt ebata g
 
A New Day Has Come
A New Day Has ComeA New Day Has Come
A New Day Has Come
 
imcd 2
imcd 2imcd 2
imcd 2
 
Lectura de un dato
Lectura de un datoLectura de un dato
Lectura de un dato
 
379 口语奶茶项目
379 口语奶茶项目379 口语奶茶项目
379 口语奶茶项目
 
History and actors of nonviolence. — 06. From 1939 to 1949
History and actors of nonviolence. — 06. From 1939 to 1949History and actors of nonviolence. — 06. From 1939 to 1949
History and actors of nonviolence. — 06. From 1939 to 1949
 
Producción industrial de vitaminas y enzimas
Producción industrial de vitaminas y enzimasProducción industrial de vitaminas y enzimas
Producción industrial de vitaminas y enzimas
 
Diferencia entre gerencia y administración
Diferencia entre gerencia y administraciónDiferencia entre gerencia y administración
Diferencia entre gerencia y administración
 
Kĩ năng sinh tồn
Kĩ năng sinh tồnKĩ năng sinh tồn
Kĩ năng sinh tồn
 
Gerencia publica - Hector Oyarce
Gerencia publica - Hector OyarceGerencia publica - Hector Oyarce
Gerencia publica - Hector Oyarce
 

Similar to IWMW 1998 Server Management (4) Security Principles

Network management
Network managementNetwork management
Network management
Mohd Arif
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
Wajahat Rajab
 
Case mis ch04
Case mis ch04Case mis ch04
Case mis ch04
Sanghyeok Park
 
Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability
Kaseya
 
BTEC National in ICT: Unit 3 - Operational Issues
BTEC National in ICT: Unit 3 - Operational IssuesBTEC National in ICT: Unit 3 - Operational Issues
BTEC National in ICT: Unit 3 - Operational Issues
mrcox
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
Introduction to computing Chapter 1(B) by asad saleem
Introduction to computing Chapter 1(B) by asad saleemIntroduction to computing Chapter 1(B) by asad saleem
Introduction to computing Chapter 1(B) by asad saleem
COMSATS institute of information Technology, vehari campus
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
Christine MacDonald
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
Priyanka Aash
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001
eaiti
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
Precisely
 
Chapter 12 Managing Systems Support and Security .pptx
Chapter 12 Managing Systems Support and Security .pptxChapter 12 Managing Systems Support and Security .pptx
Chapter 12 Managing Systems Support and Security .pptx
AxmedMaxamuudYoonis
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
Desmond Devendran
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
zaisahil
 
Chapter 1-1.pptx
Chapter 1-1.pptxChapter 1-1.pptx
Chapter 1-1.pptx
biniyamgashaw2
 
AQA AS ICT INFO2 Revision
AQA AS ICT INFO2 RevisionAQA AS ICT INFO2 Revision
AQA AS ICT INFO2 Revision
Snowfairy007
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
Sam Bowne
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-II
ManageEngine
 
[Wroclaw #8] IPMI appsec - an express train to hell
[Wroclaw #8] IPMI appsec - an express train to hell[Wroclaw #8] IPMI appsec - an express train to hell
[Wroclaw #8] IPMI appsec - an express train to hell
OWASP
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
Sam Bowne
 

Similar to IWMW 1998 Server Management (4) Security Principles (20)

Network management
Network managementNetwork management
Network management
 
Operations Security Presentation
Operations Security PresentationOperations Security Presentation
Operations Security Presentation
 
Case mis ch04
Case mis ch04Case mis ch04
Case mis ch04
 
Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability
 
BTEC National in ICT: Unit 3 - Operational Issues
BTEC National in ICT: Unit 3 - Operational IssuesBTEC National in ICT: Unit 3 - Operational Issues
BTEC National in ICT: Unit 3 - Operational Issues
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Introduction to computing Chapter 1(B) by asad saleem
Introduction to computing Chapter 1(B) by asad saleemIntroduction to computing Chapter 1(B) by asad saleem
Introduction to computing Chapter 1(B) by asad saleem
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Chapter 12 Managing Systems Support and Security .pptx
Chapter 12 Managing Systems Support and Security .pptxChapter 12 Managing Systems Support and Security .pptx
Chapter 12 Managing Systems Support and Security .pptx
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
 
Chapter 1-1.pptx
Chapter 1-1.pptxChapter 1-1.pptx
Chapter 1-1.pptx
 
AQA AS ICT INFO2 Revision
AQA AS ICT INFO2 RevisionAQA AS ICT INFO2 Revision
AQA AS ICT INFO2 Revision
 
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-II
 
[Wroclaw #8] IPMI appsec - an express train to hell
[Wroclaw #8] IPMI appsec - an express train to hell[Wroclaw #8] IPMI appsec - an express train to hell
[Wroclaw #8] IPMI appsec - an express train to hell
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 

More from IWMW

Look who's talking now
Look who's talking nowLook who's talking now
Look who's talking now
IWMW
 
Introduction to IWMW 2000 (Liz Lyon)
Introduction to IWMW 2000 (Liz Lyon)Introduction to IWMW 2000 (Liz Lyon)
Introduction to IWMW 2000 (Liz Lyon)
IWMW
 
Web Tools report
Web Tools reportWeb Tools report
Web Tools report
IWMW
 
Personal Contingency Plan - Beat The Panic
Personal Contingency Plan - Beat The PanicPersonal Contingency Plan - Beat The Panic
Personal Contingency Plan - Beat The Panic
IWMW
 
Whose site is it anyway?
Whose site is it anyway?Whose site is it anyway?
Whose site is it anyway?
IWMW
 
Open Source - the case against
Open Source - the case againstOpen Source - the case against
Open Source - the case against
IWMW
 
IWMW 2002: Avoiding Portal Wars - an MIS view
IWMW 2002: Avoiding Portal Wars - an MIS viewIWMW 2002: Avoiding Portal Wars - an MIS view
IWMW 2002: Avoiding Portal Wars - an MIS view
IWMW
 
What does open source mean for the institutional web manager?
What does open source mean for the institutional web manager?What does open source mean for the institutional web manager?
What does open source mean for the institutional web manager?
IWMW
 
Library 2.0
Library 2.0Library 2.0
Library 2.0
IWMW
 
Social participation in student recruitment
Social participation in student recruitmentSocial participation in student recruitment
Social participation in student recruitment
IWMW
 
Supporting Institutions in Changing Times: Manifesto
Supporting Institutions in Changing Times: ManifestoSupporting Institutions in Changing Times: Manifesto
Supporting Institutions in Changing Times: Manifesto
IWMW
 
IWMW 2019 photo scavenger hunt highlights
IWMW 2019 photo scavenger hunt highlightsIWMW 2019 photo scavenger hunt highlights
IWMW 2019 photo scavenger hunt highlights
IWMW
 
How to Turn a Web Strategy into Web Services
How to Turn a Web Strategy into Web ServicesHow to Turn a Web Strategy into Web Services
How to Turn a Web Strategy into Web Services
IWMW
 
Static Site Generators - Developing Websites in Low-resource Condition
Static Site Generators - Developing Websites in Low-resource ConditionStatic Site Generators - Developing Websites in Low-resource Condition
Static Site Generators - Developing Websites in Low-resource Condition
IWMW
 
Looking to the Future
Looking to the FutureLooking to the Future
Looking to the Future
IWMW
 
Looking to the Future
Looking to the FutureLooking to the Future
Looking to the Future
IWMW
 
Developing Communities of Practice
Developing Communities of PracticeDeveloping Communities of Practice
Developing Communities of Practice
IWMW
 
How to train your content- so it doesn't slow you down...
How to train your content- so it doesn't slow you down... How to train your content- so it doesn't slow you down...
How to train your content- so it doesn't slow you down...
IWMW
 
Grassroots & Guerrillas: The Beginnings of a UX Revolution
Grassroots & Guerrillas: The Beginnings of a UX RevolutionGrassroots & Guerrillas: The Beginnings of a UX Revolution
Grassroots & Guerrillas: The Beginnings of a UX Revolution
IWMW
 
Connecting Your Content: How to Save Time and Improve Content Quality through...
Connecting Your Content: How to Save Time and Improve Content Quality through...Connecting Your Content: How to Save Time and Improve Content Quality through...
Connecting Your Content: How to Save Time and Improve Content Quality through...
IWMW
 

More from IWMW (20)

Look who's talking now
Look who's talking nowLook who's talking now
Look who's talking now
 
Introduction to IWMW 2000 (Liz Lyon)
Introduction to IWMW 2000 (Liz Lyon)Introduction to IWMW 2000 (Liz Lyon)
Introduction to IWMW 2000 (Liz Lyon)
 
Web Tools report
Web Tools reportWeb Tools report
Web Tools report
 
Personal Contingency Plan - Beat The Panic
Personal Contingency Plan - Beat The PanicPersonal Contingency Plan - Beat The Panic
Personal Contingency Plan - Beat The Panic
 
Whose site is it anyway?
Whose site is it anyway?Whose site is it anyway?
Whose site is it anyway?
 
Open Source - the case against
Open Source - the case againstOpen Source - the case against
Open Source - the case against
 
IWMW 2002: Avoiding Portal Wars - an MIS view
IWMW 2002: Avoiding Portal Wars - an MIS viewIWMW 2002: Avoiding Portal Wars - an MIS view
IWMW 2002: Avoiding Portal Wars - an MIS view
 
What does open source mean for the institutional web manager?
What does open source mean for the institutional web manager?What does open source mean for the institutional web manager?
What does open source mean for the institutional web manager?
 
Library 2.0
Library 2.0Library 2.0
Library 2.0
 
Social participation in student recruitment
Social participation in student recruitmentSocial participation in student recruitment
Social participation in student recruitment
 
Supporting Institutions in Changing Times: Manifesto
Supporting Institutions in Changing Times: ManifestoSupporting Institutions in Changing Times: Manifesto
Supporting Institutions in Changing Times: Manifesto
 
IWMW 2019 photo scavenger hunt highlights
IWMW 2019 photo scavenger hunt highlightsIWMW 2019 photo scavenger hunt highlights
IWMW 2019 photo scavenger hunt highlights
 
How to Turn a Web Strategy into Web Services
How to Turn a Web Strategy into Web ServicesHow to Turn a Web Strategy into Web Services
How to Turn a Web Strategy into Web Services
 
Static Site Generators - Developing Websites in Low-resource Condition
Static Site Generators - Developing Websites in Low-resource ConditionStatic Site Generators - Developing Websites in Low-resource Condition
Static Site Generators - Developing Websites in Low-resource Condition
 
Looking to the Future
Looking to the FutureLooking to the Future
Looking to the Future
 
Looking to the Future
Looking to the FutureLooking to the Future
Looking to the Future
 
Developing Communities of Practice
Developing Communities of PracticeDeveloping Communities of Practice
Developing Communities of Practice
 
How to train your content- so it doesn't slow you down...
How to train your content- so it doesn't slow you down... How to train your content- so it doesn't slow you down...
How to train your content- so it doesn't slow you down...
 
Grassroots & Guerrillas: The Beginnings of a UX Revolution
Grassroots & Guerrillas: The Beginnings of a UX RevolutionGrassroots & Guerrillas: The Beginnings of a UX Revolution
Grassroots & Guerrillas: The Beginnings of a UX Revolution
 
Connecting Your Content: How to Save Time and Improve Content Quality through...
Connecting Your Content: How to Save Time and Improve Content Quality through...Connecting Your Content: How to Save Time and Improve Content Quality through...
Connecting Your Content: How to Save Time and Improve Content Quality through...
 

Recently uploaded

Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 

Recently uploaded (20)

Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 

IWMW 1998 Server Management (4) Security Principles

  • 1. Institutional Web Management Workshop September 1998 Information Services Security principles Andrew Cormack
  • 2. Institutional Web Management Workshop September 1998 Information Services Security principles • know what computer is for • run only what's needed with minimal access • prevent unauthorised access • keep self and machine up to date • monitor the system • educate users
  • 3. Institutional Web Management Workshop September 1998 Information Services Know what computer is for • software must reflect purpose – workstation ? – dedicated server ? • assume out-of-box systems are insecure – most have old, vulnerable servers – with everything enabled – well-known, unnecessary accounts • usually disable services; seldom enable them • beware of interactions between services
  • 4. Institutional Web Management Workshop September 1998 Information Services Minimal access • run nothing you don't need – understand everything you run • run servers with least possible privilege – unprivileged accounts – reduced options • do services need to be bi-directional? – only need outbound sendmail on workstations • restrict access using wrappers and/or routers
  • 5. Institutional Web Management Workshop September 1998 Information Services Prevent unauthorised access • few accounts with good passwords • see later ...
  • 6. Institutional Web Management Workshop September 1998 Information Services Keep up to date • understand what you run • use recent versions – but avoid the “bleeding edge” • patch as soon as possible • join mailing lists & community
  • 7. Institutional Web Management Workshop September 1998 Information Services Monitor • backups are very useful – initial backup for comparison – later backups as checkpoints • know what 'normal' system is • keep & check logfiles • investigate oddities • synchronise clocks if possible – it makes tracking network attacks far easier • use tools: audits, portscanners etc.
  • 8. Institutional Web Management Workshop September 1998 Information Services Educate users • they can outwit everything you do!