2008 CAMS-ii Users’ Conference
CAMS-ii and TechnologyThe Good, The Bad, The Other
• LAN, WAN, WLAN, WWAN• Firewalls• Intrusion Detection• Email• Encryption• Phishing• Anti-Virus, Anti-Spyware• And some other stuff……….
Technology Topics
Technology
• Technology is changing at a brisk pace.• Moore’s Law
In 1965 Intel co-founder Gordon Moore predicted that the number of transistors on a chip will double about every two years.
• Computers are more powerful, less expensive, and become obsolete sooner
• More ways to “get it done” better, faster, and cheaper.
• As hardware capabilities increase, software is modified to need more hardware capability…the cycle continues
Upgrade or Replace?
Networks
• LAN – Local Area Network• Inside the building (Intranet)
• WAN – Wide Area Network• Outside the building (Internet)
• WLAN – Wireless LAN• WWAN – Wireless WAN
Typical Network Layout
Typical Network Layout
Typical Network Layout
Firewall
• Firewalls protect your network• Keep unwanted traffic and data out
• Hackers, viruses, spyware, etc.
• Hardware and Software Solutions• Routers• Security Appliances• Gateway Computer (Proxy Server)• Individual Computer Programs
Hardware Firewall
• The “NAT” Router• Network Address Translation• Linksys, Dlink, Netgear• Inexpensive• Blocks unwanted entry• Hides networked computers• Typically does not watch outbound
Hardware Firewall
A popular wireless router from Linksys
Hardware Firewall
• The security appliance• Cisco, Sonicwall, Watchguard• More expensive• Provides all basic router functions• Adds additional monitoring and prevention
tools• Anti-virus, anti-spyware, content filter• Intrusion detection / prevention• Outbound monitoring
Intrusion Detection / Prevention
• IDS / IPS adds to the firewall capability
• IDS watches for suspicious activity
• IPS stops suspicious activity
IDS/IPS Sample Reports
IDS/IPS Sample Reports
IDS/IPS Sample Reports
IDS/IPS Sample Reports
IDS/IPS Sample Reports
IDS/IPS Sample Reports
IDS/IPS Sample Reports
IDS/IPS Sample Reports
Software Firewall
• The proxy server• Network Computer with firewall• All other computers get to the internet
through it• Provides all basic router functions• Works like a router• May slow down network traffic• More complex to configure
Software Firewall
• Firewall software on a pc• Norton, McAfee, Zone Alarm• Can identify rogue software • Difficult to configure• Interferes with internal networking• Resource hog• Useful if configured properly
Encryption
• Protects data from prying eyes• Free or cost-based
• Truecrypt• Ccrypt
• Most necessary with removable media• USB devices• CD/DVD media
• CAMS-ii External Backups are encrypted
Security at the Desktop
• Safeguard your data• Notebooks are risky• USB Flash Drives are even riskier
• Don’t forget to back up the pc!!• USB external hard drive• CD/DVD media• Network storage
• Education is important
Phishing and Pharming
• Phishing• Lures people to give up
personal information• Email looks official
• Pharming• Misdirect to fake web site• Modification of hosts file
Malware
• Viruses and Trojan Horses• May turn your pc into a spam machine
• Spyware• May log keystrokes and send home
• Spam• HUGE irritant and wastes time
• Protection• Network• Individual PC
Email is NOT secure!!!!You never know who might be reading your
Secure Email
Can Be Simple or Complicated;
Expensive or Inexpensive
• Personal Security Certificate (SSL)
• Cumbersome
• Limited Functionality
• Encryption Software
• Freeware (less integrated)
• Cost-Based (more integrated)
• Password Protected Files
• Zip Files (less secure)
Email File Encryption
• Encrypt the file, then send it as an attachment
• Cryptainer LE and DeCypherIT are free programs used for this example.
• Cryptainer LE limits file size to 25mb – more than sufficient
• Use DeCypherIT to decrypt the file
• OR…….
• Create an ecrypted “.exe” file to send
• Many firewalls and email clients block .exe files
File Encryption Example
File Encryption Example
File Encryption Example
File Encryption Example
How Security Measures Affect CAMS-ii
• CAMS-ii is on the Intranet• Internet Explorer
• Trusted Sites Zone• ActiveX Controls
• Toolbars and Popup Blockers• Can affect CAMS-ii behavior• Learn how they work
• Anti-Virus / Anti-Spyware• Can stop approved controls
How Security Measures Affect CAMS-ii
• Software Firewalls on PCs• Accessing shared resources• Printing• File transfers
• Where is CAMS-ii?• The Windows “hosts” file
Automatic Windows Updates
• Controversial• Can fix problems• Can cause problems
• Recommendations• Auto-download, manual install• Read install notes
Windows Vista
• Moving to new computers is never much fun for most of us
• It’s not “if” – it’s “when”• Higher hardware requirements
• Lots of memory (RAM)• Robust video capability
• Will my programs work?• Will CAMS-ii work?
Windows Vista
• Which version to use?• Home Basic
• Very Basic – not recommended
• Home Premium• Supports multimedia (Windows Media Center)• Will not work in a Windows Domain
• Business• Will work in a Windows Domain• Does not have all the multimedia features
• Ultimate• Everything included (even the batteries!)
Windows Vista
• User Access Control
•What is it?
•Can I turn it off?
•Changes to file locations in CAMS-ii
•Allows more flexibility for securing the PC
Miscellaneous
The End