SlideShare a Scribd company logo
1 of 24
CSIRT service
Helping you keep your network, data and reputation safe
CSIRT?
»Names may vary;
› CSIRT (Computer Security Incident ResponseTeam)
› IRT (Incident ResponseTeam)
› CERT (Computer Emergency ResponseTeam)
Overview
»Coordinate with our community and other CERTs, ISPs,
third parties as necessary
»Provide advice and assistance in relation to security
»Investigate security incidents on Janet
Why?
»Enforce Janet Security Policy / AUP
»Protect the availability of the Janet network
»Preserve reputation of the Janet network and our
community
What do we do?
»Abuse Desk
› RIPE Abuse contact
› abuse@ja.net
»Examples
› UBE / Spam
› Scanning
› Misuse
› Law enforcement enquiries
What do we do?
»Threat reporting
› Shadowserver
› Google alerts
»Examples
› Google Safe Browsing
› Service misconfiguration
› Malware sinkhole connections
What do we do?
»Incident coordination
› Janet customers
› Third parties
»Examples
› Phishing
› Denial of service
› Compromised systems
Incident statistics – Feb’16
Organisation security
»Who is responsible for security?
› Everyone is.
»Security can’t be fixed by technology alone
Organisation security
»Who is responsible for security?
› Everyone is.
»Security can’t be fixed by technology alone
› Advocate good security practices
Security Practices
»Promote strong passwords
› Even better – use password managers!
»2factor authentication where possible
»Software updates
»Up-to-date antivirus
»Allow only what you need on firewalls
»Accurate logging
»Mail filters/spam/attachment filtering
Organisation security
»Who is responsible for security?
› Everyone is.
»Security can’t be fixed by technology alone
› Advocate good security practices
› Raise awareness
Awareness
»People will be people
› They will open things they shouldn’t
› They will click on things they shouldn’t
› It happens
»How you react is just as important…
Incident response process
»Then…
› Find knowledge gaps
› Identify where you can help
› Culprit or victim?
– Targeted attacks work because of the effort behind them
– It’s too easy to blame the user
– It will make them less likely to admit an incident has happened
– It’s not the best thing for your organisation long-term
– Everyone makes mistakes, and it can happen to anyone.
Awareness
»Internal workshops
»OpenDNS phishing quiz
»Create your own phishing tests
› GoPhish – open source phishing toolkit
»Incident response exercises
Organisation security
»Who is responsible for security?
› Everyone is.
»Security can’t be fixed by technology alone
› Advocate good security practices
› Raise awareness
› Ensure your staff have the tools and resources they need
»Security incidents do and will happen.
› Be prepared
› Be as open as possible
› Learn from them
»Engage in the community to help and learn from others
Community
»UK-security mailing list
› Request access via Jiscmail or email irt@csirt.ja.net
»CiSP – Cyber Information Sharing Partnership
› Part of CERT-UK
– Joint industry government initiative
› Membership by sponsor only
Other resources
»SANS critical controls
› Basic to intermediate options
»Jisc training
› Courses, webinars, workshops
»ESISS - Education Shared Information Security Service
› Pen testing & manual/automated vulnerability scanning
› info@esiss.ac.uk
Things to think about
»What are your key assets?
› How do you protect them?
»When a security incident occurs:
› Do you have a response plan in place?
› Do your IT staff have the tools and information available to
investigate?
– Logs
– Appropriate contact information
› Lessons learned exercises
Closing
Janet CSIRT
Email: irt@csirt.ja.net
Phone: 0300 999 2340
03/03/2016 23
jisc.ac.uk
Thank you
Mark Siddle
Security Specialist – Janet CSIRT
Mark.siddle@jisc.ac.uk
03/03/2016 24

More Related Content

Viewers also liked

Liberating facts from the scientific literature - Jisc Digifest 2016
Liberating facts from the scientific literature - Jisc Digifest 2016Liberating facts from the scientific literature - Jisc Digifest 2016
Liberating facts from the scientific literature - Jisc Digifest 2016Jisc
 
Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Jisc
 
Build your own university app in under an hour - Jisc Digifest 2016
Build your own university app in under an hour - Jisc Digifest 2016Build your own university app in under an hour - Jisc Digifest 2016
Build your own university app in under an hour - Jisc Digifest 2016Jisc
 
Beacon technology in education (Pervasive Networks)
Beacon technology in education (Pervasive Networks)Beacon technology in education (Pervasive Networks)
Beacon technology in education (Pervasive Networks)Jisc
 
Business intelligence: making more informed decisions - Jisc Digifest 2016
Business intelligence: making more informed decisions - Jisc Digifest 2016Business intelligence: making more informed decisions - Jisc Digifest 2016
Business intelligence: making more informed decisions - Jisc Digifest 2016Jisc
 
Introducing the IRUSdataUK pilot - Jisc Digifest 2016
Introducing the IRUSdataUK pilot - Jisc Digifest 2016Introducing the IRUSdataUK pilot - Jisc Digifest 2016
Introducing the IRUSdataUK pilot - Jisc Digifest 2016Jisc
 
Introducing the open citation experiment - Jisc Digifest 2016
Introducing the open citation experiment - Jisc Digifest 2016Introducing the open citation experiment - Jisc Digifest 2016
Introducing the open citation experiment - Jisc Digifest 2016Jisc
 
Making sense of open scholarly communications data - Jisc Digifest 2016
Making sense of open scholarly communications data - Jisc Digifest 2016Making sense of open scholarly communications data - Jisc Digifest 2016
Making sense of open scholarly communications data - Jisc Digifest 2016Jisc
 
Getting ready for learning analytics - Jisc Digifest 2016
Getting ready for learning analytics - Jisc Digifest 2016Getting ready for learning analytics - Jisc Digifest 2016
Getting ready for learning analytics - Jisc Digifest 2016Jisc
 
Delivering online learning - are you ready? - Jisc Digifest 2016
Delivering online learning - are you ready? - Jisc Digifest 2016Delivering online learning - are you ready? - Jisc Digifest 2016
Delivering online learning - are you ready? - Jisc Digifest 2016Jisc
 
The future of open access (OA) monographs: collaboration and best practice - ...
The future of open access (OA) monographs: collaboration and best practice - ...The future of open access (OA) monographs: collaboration and best practice - ...
The future of open access (OA) monographs: collaboration and best practice - ...Jisc
 
The Janet network: your digital utility - Jisc Digifest 2016
The Janet network: your digital utility - Jisc Digifest 2016The Janet network: your digital utility - Jisc Digifest 2016
The Janet network: your digital utility - Jisc Digifest 2016Jisc
 

Viewers also liked (12)

Liberating facts from the scientific literature - Jisc Digifest 2016
Liberating facts from the scientific literature - Jisc Digifest 2016Liberating facts from the scientific literature - Jisc Digifest 2016
Liberating facts from the scientific literature - Jisc Digifest 2016
 
Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016Transforming assessment and feedback with technology - Jisc Digifest 2016
Transforming assessment and feedback with technology - Jisc Digifest 2016
 
Build your own university app in under an hour - Jisc Digifest 2016
Build your own university app in under an hour - Jisc Digifest 2016Build your own university app in under an hour - Jisc Digifest 2016
Build your own university app in under an hour - Jisc Digifest 2016
 
Beacon technology in education (Pervasive Networks)
Beacon technology in education (Pervasive Networks)Beacon technology in education (Pervasive Networks)
Beacon technology in education (Pervasive Networks)
 
Business intelligence: making more informed decisions - Jisc Digifest 2016
Business intelligence: making more informed decisions - Jisc Digifest 2016Business intelligence: making more informed decisions - Jisc Digifest 2016
Business intelligence: making more informed decisions - Jisc Digifest 2016
 
Introducing the IRUSdataUK pilot - Jisc Digifest 2016
Introducing the IRUSdataUK pilot - Jisc Digifest 2016Introducing the IRUSdataUK pilot - Jisc Digifest 2016
Introducing the IRUSdataUK pilot - Jisc Digifest 2016
 
Introducing the open citation experiment - Jisc Digifest 2016
Introducing the open citation experiment - Jisc Digifest 2016Introducing the open citation experiment - Jisc Digifest 2016
Introducing the open citation experiment - Jisc Digifest 2016
 
Making sense of open scholarly communications data - Jisc Digifest 2016
Making sense of open scholarly communications data - Jisc Digifest 2016Making sense of open scholarly communications data - Jisc Digifest 2016
Making sense of open scholarly communications data - Jisc Digifest 2016
 
Getting ready for learning analytics - Jisc Digifest 2016
Getting ready for learning analytics - Jisc Digifest 2016Getting ready for learning analytics - Jisc Digifest 2016
Getting ready for learning analytics - Jisc Digifest 2016
 
Delivering online learning - are you ready? - Jisc Digifest 2016
Delivering online learning - are you ready? - Jisc Digifest 2016Delivering online learning - are you ready? - Jisc Digifest 2016
Delivering online learning - are you ready? - Jisc Digifest 2016
 
The future of open access (OA) monographs: collaboration and best practice - ...
The future of open access (OA) monographs: collaboration and best practice - ...The future of open access (OA) monographs: collaboration and best practice - ...
The future of open access (OA) monographs: collaboration and best practice - ...
 
The Janet network: your digital utility - Jisc Digifest 2016
The Janet network: your digital utility - Jisc Digifest 2016The Janet network: your digital utility - Jisc Digifest 2016
The Janet network: your digital utility - Jisc Digifest 2016
 

More from Jisc

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptxJisc
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptxJisc
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxJisc
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptxJisc
 

More from Jisc (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptx
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptx
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptx
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

CSIRT service - Jisc Digifest 2016

  • 1. CSIRT service Helping you keep your network, data and reputation safe
  • 2. CSIRT? »Names may vary; › CSIRT (Computer Security Incident ResponseTeam) › IRT (Incident ResponseTeam) › CERT (Computer Emergency ResponseTeam)
  • 3. Overview »Coordinate with our community and other CERTs, ISPs, third parties as necessary »Provide advice and assistance in relation to security »Investigate security incidents on Janet
  • 4. Why? »Enforce Janet Security Policy / AUP »Protect the availability of the Janet network »Preserve reputation of the Janet network and our community
  • 5. What do we do? »Abuse Desk › RIPE Abuse contact › abuse@ja.net »Examples › UBE / Spam › Scanning › Misuse › Law enforcement enquiries
  • 6. What do we do? »Threat reporting › Shadowserver › Google alerts »Examples › Google Safe Browsing › Service misconfiguration › Malware sinkhole connections
  • 7. What do we do? »Incident coordination › Janet customers › Third parties »Examples › Phishing › Denial of service › Compromised systems
  • 9. Organisation security »Who is responsible for security? › Everyone is. »Security can’t be fixed by technology alone
  • 10.
  • 11. Organisation security »Who is responsible for security? › Everyone is. »Security can’t be fixed by technology alone › Advocate good security practices
  • 12. Security Practices »Promote strong passwords › Even better – use password managers! »2factor authentication where possible »Software updates »Up-to-date antivirus »Allow only what you need on firewalls »Accurate logging »Mail filters/spam/attachment filtering
  • 13. Organisation security »Who is responsible for security? › Everyone is. »Security can’t be fixed by technology alone › Advocate good security practices › Raise awareness
  • 14. Awareness »People will be people › They will open things they shouldn’t › They will click on things they shouldn’t › It happens »How you react is just as important…
  • 16. »Then… › Find knowledge gaps › Identify where you can help › Culprit or victim? – Targeted attacks work because of the effort behind them – It’s too easy to blame the user – It will make them less likely to admit an incident has happened – It’s not the best thing for your organisation long-term – Everyone makes mistakes, and it can happen to anyone.
  • 17. Awareness »Internal workshops »OpenDNS phishing quiz »Create your own phishing tests › GoPhish – open source phishing toolkit »Incident response exercises
  • 18. Organisation security »Who is responsible for security? › Everyone is. »Security can’t be fixed by technology alone › Advocate good security practices › Raise awareness › Ensure your staff have the tools and resources they need
  • 19. »Security incidents do and will happen. › Be prepared › Be as open as possible › Learn from them »Engage in the community to help and learn from others
  • 20. Community »UK-security mailing list › Request access via Jiscmail or email irt@csirt.ja.net »CiSP – Cyber Information Sharing Partnership › Part of CERT-UK – Joint industry government initiative › Membership by sponsor only
  • 21. Other resources »SANS critical controls › Basic to intermediate options »Jisc training › Courses, webinars, workshops »ESISS - Education Shared Information Security Service › Pen testing & manual/automated vulnerability scanning › info@esiss.ac.uk
  • 22. Things to think about »What are your key assets? › How do you protect them? »When a security incident occurs: › Do you have a response plan in place? › Do your IT staff have the tools and information available to investigate? – Logs – Appropriate contact information › Lessons learned exercises
  • 24. jisc.ac.uk Thank you Mark Siddle Security Specialist – Janet CSIRT Mark.siddle@jisc.ac.uk 03/03/2016 24

Editor's Notes

  1. A traditional CERT team responds to security incidents in an organisation or for a particular service. Typical activities could be looking at intrusion logs, carry out network and/or host forensics, investigating a compromised host, tracking malware and much more. We are a team of 5+1student with a range of backgrounds. 2 vacant positions. We have over 900 connected organisations which keeps us pretty busy.
  2. Why do we exist? What’s our purpose? Preserve reputation by keeping security incidents to a minimum and resolve investigations promptly. Help and support customers
  3. RIPE has a database of IP address allocation to organisation mappings. Any security incidents relating to Janet IP space and it’s customers will (or should) come through us.
  4. Shadowserver – charity foundation comprised of volunteers with a desire to try and clean up the internet. Without our threat reporting and trusted relationships, many security incidents would likely go unnoticed. This could lead to further network compromise, potential reputational damage. By working with these organisations, we can pass this on to customers to enable them to clean up their networks, and ideally provide early detection. Efficient notification– providing it so customers don’t need to go searching.
  5. Work with customers to resolve incidents promptly and mitigate risk – we’re there. Intermediary service to make sure the right people get the right information at the right time. Trust between certain third parties and our customers.
  6. Security does not just sit within IT. Everyone has a responsibility, whether it be physical security or computer and internet security.
  7. When it comes to security, a lot of organisations tend to buy “security-in-a-box products” to fix their security problems. These products are good and you should have them in your organisation but only fix or detect a certain amount of issues.
  8. 1Password, keepass, last pass as examples RSA Securid, Google Authenticator, Yubikey, Duo.
  9. People have an element of trust as part of human nature. If someone believes something to be true, they’ll run with it. If someone receives an email from a name they know, they’ll likely trust it, but not always validate the message or request they’ve received. Finance example.
  10. Everyone makes mistakes, and it can happen to anyone. Learn from mistakes.
  11. Emails do not always work. They get missed, and too many emails becomes noise. Periodic workshops that are interesting and well presented are often more memorable and hopefully drill these topics home.
  12. Tools and resources – good logging to be able to investigate incidents, training, contacts (both internal and external).
  13. If someone really wants to target your organisation, they will do. Your best bet is to be prepared and have the right procedures in place. Are your organisation contacts with Jisc up-to-date? Brushing incidents under the carpet is not the best method in dealing with incidents. If you’re open with your stakeholders, they will trust you more.
  14. UK-SEC – have a question you want answered about security, or want advice on a certain product? Someone will no doubt have some experience that will help you. CiSP – private and public UK organisations Janet CSIRT will sponsor known security contacts. There is an academia section. Wealth of knowledge amongst both communities that you can exploit and use for the benefit of your organisation.
  15. If you experience a security incident, talk to us about it. As well as being able to help you, we may have information to help with the investigation, or your information may help us with other incidents. Any intelligence you can provide relating to an incident will be appreciated and collectively, could make the sector more secure.