Fermilab Strategy:
- Integrated Computer Security
- Defense in Depth
- Your role and responsibilities as a user
- Other Computing Policy Issues
- Data backup
- Incidental use
- Privacy
- Offensive material
- Licensing
The Internet is a dangerous place
We are constantly being scanned for weak or vulnerable systems; new unpatched systems will be exploited within minutes.Fermilab is an attractive target
- High network bandwidth is useful for attackers who take over lab computers
- Publicity value of compromising a .gov site
- Attackers may not realize we have no information useful to them
We need to protect
- Our data
- Our ability to use our computers (denial of service attacks)
- Our reputation with DOE, Congress and the general public
Major sources of danger
- Running malicious code on your machine due to system or application vulnerabilities or improper user actions
Carrying infected machines (laptops) in from off site
Integrated Security Management
Defense in Depth
- Perimeter Controls and auto blocking
- Mail gateway virus scanning
- Strong Authentication (Kerberos)
- Critical System plans
- Critical vulnerabilities
- Prompt response to computer security incidents (FCIRT)
- Intelligent and informed user community
Incoming Search Tearms
Why Computer Security
what is computer security
definition of computer security
computer security
PC security
security
Fermi lab Strategy
Integrated Security Management
No comments:
Post a Comment