3 Org Structure Politicians IT Network Structure 5 History of - - PowerPoint PPT Presentation

3 org structure
SMART_READER_LITE
LIVE PREVIEW

3 Org Structure Politicians IT Network Structure 5 History of - - PowerPoint PPT Presentation

3 Org Structure Politicians IT Network Structure 5 History of projects between CMU and the City Heinz College Information Systems & Management Public Policy and Management Penetration Test project last


slide-1
SLIDE 1
slide-2
SLIDE 2
slide-3
SLIDE 3

3

slide-4
SLIDE 4

5

  • Org Structure

– Politicians – IT

  • Network Structure
slide-5
SLIDE 5

6

  • History of projects between CMU and the City

– Heinz College – Information Systems & Management – Public Policy and Management

  • “Penetration Test” project last year

– Technical exercise – Policy assessment and recommendations

slide-6
SLIDE 6

7

  • Initiated discussions with the CIO
  • Review & approval by City Legal, CMU Legal,
  • thers
  • Volunteers installed a sensor at the primary

internet connection

slide-7
SLIDE 7

8

  • Network Situational Awareness class

– http://www.andrew.cmu.edu/course/95-855/ – Instructors:

  • Tim Shimeall*
  • Sid Faber

– Anonymized data

  • MAWI, Internet 2, CDX
slide-8
SLIDE 8

9

  • Gain Network Situational Awareness
  • Provide information back to the city
  • Done in the blind
slide-9
SLIDE 9

10

  • Find Heavy Hitters
  • Create a profile
  • Eliminate bogons
  • Monitor over time
slide-10
SLIDE 10

11

  • ACL / Least Privilege
  • DNS
  • Policy Validation

– Remote Access (Gotomypc) – Streaming Video

slide-11
SLIDE 11

12

  • Network Profile

– Scans – Client Web, Served Web – Servers as Clients – Email – DNS – NTP – Etc.

slide-12
SLIDE 12

13

slide-13
SLIDE 13

14

slide-14
SLIDE 14

15

slide-15
SLIDE 15

16

slide-16
SLIDE 16

17

slide-17
SLIDE 17

18

  • Network Situational Awareness:

– Perceive: Network flow sensor – Comprehend: Network profile, leftovers – Project: What does this mean to me?

slide-18
SLIDE 18

19

  • All packets are innocent until proven guilty

– Profile by country – Scan traffic, inbound traffic

slide-19
SLIDE 19

20

  • Leveraging university, Limited resources
  • External validation

– Support for external auditors

slide-20
SLIDE 20

21

  • Initial impression: too much data
  • Dividing traffic led to identifying patterns
  • Couldn’t really be done with full packet data
slide-21
SLIDE 21

22

  • Improve the sensor

– Instrument the cold spare – Instrument internally – Add metadata

  • Add a security focus
  • Add a geopolitical focus
slide-22
SLIDE 22