Cyberoam Education Sector - Rizal Technological University

Download Report

Transcript Cyberoam Education Sector - Rizal Technological University

............................................................................................................................................................
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Security in Educational Institutes
............................................................................................................................................................
Harvard and Oxford Universities Hacked
by D35m0nd142
Oxford University’s Begbroke Science
Park website contained a vulnerability
that allowed the hacker to access and
leak information on their database.
In the case of Harvard
University, D35m0nd142 found a
cross-site scripting (XSS) vulnerability
on one of their webpages.
October 2012
NullCrew Leaks User Details from
University of Leeds Website
The hackers leaked database
details, but also over 100 email
addresses, password hashes and
usernames.
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Security in Educational Institutes
............................................................................................................................................................
43%
Education/Non-profit
organizations in Europe
have faced security
incidents in the past
12 months
23%
Education/Non-profit
organizations in Europe
are unaware about any
security incident
occurred
The 2012 Global State of Information Security Survey, PwC
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Security in Educational Institutes
............................................................................................................................................................
Spam rates
Phishing rates
Virus rates
Top 5 Verticals
Top 5 Verticals
Top 5 Verticals
Source
Source
Source
Symantec Intelligence Report, November 2012
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Security Concerns of Educational Institutes
............................................................................................................................................................
“Students view harmful websites (violence,
porn), access Bit Torrent and P2P applications
for heavy/unauthorized downloads, and use
proxy to bypass web controls”
“ Highest security within limited budget
becomes tricky.”
“Virus infected network leads to
slower network performance and
choked bandwidth.”
“In shared working environments, students
sometimes download inappropriate content
to play pranks on the student who uses the
same computer next.”
“Uncomfortable pop-ups/ images spring up,
leading to embarrassment, especially in
presence of female faculty and students. “
“Students and faculty use bandwidth for
unproductive surfing, leading to critical
applications by key users being left with
inadequate bandwidth.”
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Challenge 1
............................................................................................................................................................
Access to Inappropriate Web Content & Applications
 Risk of virus, spam, spyware, adware infecting the network
- Embarrassing pop-ups
- Network slow-down
 Unproductive/unauthorized downloads like games, videos
- Bandwidth Choking
- Inadequate bandwidth for key users and critical applications
- Copyright and legal liabilities
 Non-Academic activities
 Non-compliance to regulatory requirements (such as CIPA, PCI)
Proxy and Tunneling Applications
www.cyberoam.com
Porn, Violence, Gaming
Social Media, Chat & Streaming
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Challenge 2
............................................................................................................................................................
Identifying users in shared computing environment
 Lack of knowledge on who is doing what
- Difficult to identify users engaged in non-academic surfing
- Most security solutions identify the IP address and not actual users
 Investigative and forensic analysis become difficult in case of wrongful usage of network
 No real-time visibility into user activity in network
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Challenge 3
............................................................................................................................................................
Virus, Spam and Spyware
 Embarrassing pop-ups
 Network slow-down
- Bandwidth Shortage
- Bandwidth unavailable to critical applications and users
- Productivity loss due to interrupted access to important resources
 Loss of business-critical data
 Institute network may be used to broadcast virus or as a botnet
Spam
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Challenge 4
............................................................................................................................................................
Wi-Fi, BYOD and Virtualization
Laptops and tablets are
used in colleges,
universities and schools
Protect students, staff and
datacenter in virtual
environment
Protect students using
cloud based collaboration
applications
Inability to trace user
specific activity due to
Dynamic IP environment
Risk of Wi-Fi:
Eavesdropping, Interception,
Modification of data in transit
Service disruption, Bandwidth loss
Server Virtualization
Desktop Virtualization
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Challenge 5
............................................................................................................................................................
Security of Institute’s data centers/information assets
 Security of websites from hackers/hacktivists
 Hackers target
- Servers (database server, email server, etc.)
- Vulnerabilities in web facing applications
 Possible risk scenarios:
- Hacked student database
- Grades tampering
- Leaked question papers
- Stolen login passwords
We are
anonymous
Hackers leak
120,000 student
records in raid on
world’s top unis
NullCrew Leaks User
Details from
University of Leeds
Website
www.cyberoam.com
Harvard and Oxford
Universities Hacked
by D35m0nd142
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
............................................................................................................................................................
What solutions we need?
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Technologies We Need
............................................................................................................................................................
 An integrated Gateway-level Security on a single platform
 Reduced TCO (Total Cost of Operations)
- Consolidated security
- Lower CapEx, OpEx
- Reduced cost of training & support
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
We need to control access to websites & applications
............................................................................................................................................................
 Web & Content Filtering
- Blocks and inspects HTTPS sites & Google Cached
pages
- Control Google search by specific keywords
 Application Control
- Block unwanted applications like Proxy, P2P,
Games, Chat, etc.
 YouTube for Schools
- Allows access to selected
educational content
- Blocks inappropriate & peripheral
content such as ads, comments &
links
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
We need to prioritize applications with
Application Visibility & Control
............................................................................................................................................................
Medium Quality
Internet
Control over
www.cyberoam.com
CMS
School
Web
Collaboration
P2P
Management
LMS
tools
mail
Chat
System
High Quality
TurnItIn
Low Quality
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Needs an Identity-based AAA
............................................................................................................................................................
Users
Student
Authenticates
Authorizes
Audits
•
•
•
•
•
•
•
•
•
•
•
• Identity–based
Logs + Reports
• Compliance
Reports
Faculty
User Name
IP Address
MAC Id
Session Id
Internet surfing quota
Schedule control
Security Policies
Web Filtering
Application Visibility & Control
QoS / Bandwidth Management
IM Controls
Management
Control over user network activities
• Who can connect to the network
• Who can access what
• What have they accessed
www.cyberoam.com
Ability to track the user activities;
identify attackers /victims
Take quick network security
decisions
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
On-appliance Logging and Reporting
............................................................................................................................................................
 In-depth reports
- Real time visibility into user and network
activities
- Identifying attackers/victims for quick
corrective actions
 Security & Compliance management
- HIPAA, GLBA, SOX, PCI, FISMA
 Forensic Analysis capability
Dual Dashboard - Traffic & Security Dashboard
www.cyberoam.com
Application Reports
Compliance Reports
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Threat Protection
............................................................................................................................................................
Protection from Virus, Spam and Spyware
 Anti-Virus & Anti-Spyware
- Bi-directional scanning: Web & Email
- Scans HTTP, FTP, SMTP, POP3, HTTPS, IMAP and IM traffic
- 4 million+ signatures
 Anti-Spam (Inbound/Outbound)
- Scans SMTP, POP3, IMAP traffic
- Scanning with Recurrent Pattern Detection (RPDTM) technology
- Virus outbreak detection for zero-hour protection
Intrusion Protection
 Intrusion Prevention System
- Protection of servers (database server, email server, etc.)
- Identity-based IPS policies per user or group
- 3500+ signatures - broadest security cover
 Web Application Firewall
- Protection of websites and web servers from hackers
- Prevents hackers from exploiting Web-Application Vulnerabilities (OWASP TOP10, etc.)
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Security in Wi-Fi & BYOD Scenarios
............................................................................................................................................................
 High performance, integrated security over WLAN
 Identity-based policies in Dynamic IP environment
 Identity-based AAA over personal devices in institute network
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
............................................................................................................................................................
Question and Answer
www.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.