Thursday, 13 September 2012

Why Computer Security | what is computer security | definition of computer security | computer security | pc security | security | Fermilab Strategy | Integrated Security Management


Fermilab Strategy:

  • Integrated Computer Security
  • Defense in Depth
  • Your role and responsibilities as a user
  • Other Computing Policy Issues
  • Data backup
  • Incidental use
  • Privacy
  • Offensive material
  • Licensing

The Internet is a dangerous place

We are constantly being scanned for weak or vulnerable systems; new unpatched systems will be exploited within minutes.

Fermilab is an attractive target

  • High network bandwidth is useful for attackers who take over lab computers
     
  • Publicity value of compromising a .gov site
     
  • Attackers may not realize we have no information useful to them

We need to protect

  • Our data
  • Our ability to use our computers (denial of service attacks)
  • Our reputation with DOE, Congress and the general public

Major sources of danger

  • Running malicious code on your machine due to system or application vulnerabilities or improper user actions
    Carrying infected machines (laptops) in from off site

Integrated Security Management

Defense in Depth

  • Perimeter Controls and auto blocking
  • Mail gateway virus scanning
  • Strong Authentication (Kerberos)
  • Critical System plans
  • Critical vulnerabilities
  • Prompt response to computer security incidents (FCIRT)
  • Intelligent and informed user community

Incoming Search Tearms


Why Computer Security
what is computer security
definition of computer security
computer security
PC security
security
Fermi lab Strategy
Integrated Security Management

No comments:

Post a Comment