Network Security: Stand & Deliver
        
        
        
        It’s time to strengthen network defenses, but which solutions really work? Take your cues from these campus technologists, and take notes.
October is national Cyber Security Awareness Month (visit the National Cyber Security Alliance), and for the world of higher education, that means it’s high time to take a
look at defense systems and plan for the future.
Clearly, more planning is needed now than ever before. According to the majority of IT market research
  firms, phishing and identity theft have leapfrogged spam and spyware as top concerns; viruses and e-mail
  worms are at an all-time high; and other affronts to the network (such as distributed denial of service—
  DDoS—and zombie, or “botnet,” attacks) are occurring with greater and greater frequency. Even hackers
  are getting in on the act: A recent USA Today review of 109 computer-related security breaches reported
  by 76 college campuses since January 2005 found that 70 percent involved hacking of one form or another.
Faced with this multitude of threats, security administrators across higher education are fighting back
  on four major fronts: the perimeter, inside the network (internal), e-mail, and the administrative level.
  While perimeter defenses revolve around next-generation firewalls, internal network strategies focus on
  something called “cooperative enforcement” to make sure endpoints are secure. E-mail security is its own
  beast altogether, and at the administrative level, security experts are implementing a mix of penetrationtesting
  and security-event-management tools to identify and repair security problems proactively. These
  are groundbreaking security strategies that work.
Fortifying the Perimeter
Talk about headaches. Security administrators at West Virginia University were reaching for the aspirin
  just about every day last year, as the campus network was constantly under attack by unwanted and malicious
  network traffic, including viruses and worms. Timothy Williams, WVU’s director of telecommunications
  and network operations, remembers that at one point, his IT team incurred a significant drop
  in staff productivity due to a required focus on cleaning computer systems of these infections. These technologists
  needed serious help in fighting the threats they faced, but they didn’t want a solution that would compromise network performance.
Finally, the WVU team settled on three
  perimeter devices from Fortinet. The devices, FortiGate
  3600s, were positioned at the internet
  gateway to scan all traffic coming into
  and going out of the campus network.
  Administrators programmed the tools to
  flag all traffic with viruses, intrusions,
  and other security threats. Because the
  tools are powered by application-specific
  integrated circuit (ASIC) microchips
  specifically designed to perform security
  checks, they were able to parse through
  web traffic in no time. Williams says his
  team reaped the benefits of this new
approach almost immediately.
“Since deploying the systems, we have
  reduced the number of [threats],” he
  says, noting that team members have
  reduced the number of problem systems
  from 48 per day, to no more than five.
  Williams adds that the devices are also
  saving the IT department “significant
  time and money in support costs, and
  allowing us to better focus our efforts on
academic pursuits.”
 
                Since implementing NeoAccel’s SSL VPN-Plus, the 
                Contra Costa Community College District                network 
                hasn’t experienced a single virus outbreak, says Ogden.
 
At George Washington University
  (DC), technologists recently implemented
  similar technology from Reconnex to ensure that certain
  internet traffic complied with federal
  privacy regulations laid out in the
  Gramm-Leach-Bliley Act of 1999. This
  tool, dubbed iGuard, sits on the network
  perimeter and scans all outgoing web
  traffic for sensitive files or data that could
  violate the law. In particular, the tool
  searches e-mails and Microsoft  Office files for sensitive
  information such as Social Security and
  credit card numbers. If the device identifies
  something that violates campus policy,
  it blocks the message and notifies the
sender immediately.
As a result of safeguarding this private
  information, Amy Hennings, assistant
  director of information security, says
  iGuard has become the school’s primary
  defense against identity theft. Because it
  was installed just this summer, however,
  the solution is still too new for GWU to
  determine how well it’s working. Eventually,
  says Hennings, the tool will make the
  network more secure by keeping private
  information from passing over the network
  perimeter. In the meantime, she
  notes, campus skeptics have questioned
  whether the school is invading the very
  privacy it’s trying to protect. Her team
has worked hard to fight this perception.
“We want to make sure that everyone
  knows we’re not interested in reading
  their e-mails,” she says. “We just want to
  make sure all of the e-mails satisfy compliance
requirements.”
Securing the Interior
Blocking certain traffic at the perimeter
  is one thing; administering security
  protocols inside the network is something
  else entirely. At the University of California-Berkeley, officials in the
  department of electrical engineering and
  computer sciences recently piloted a network
  access control (NAC) appliance
  from FireEye  to
  determine which users could gain access
  to certain portions of the campus network.
  Network Manager Fred Archibald
  says the FireEye 4200 tool mirrors network
  traffic and quarantines any machine
  it suspects to be a security threat, until
that device can prove it is safe.
Also in the San Francisco Bay Area,
  in the Contra Costa Community College
  District, technologists recently
  have launched a different type of quarantine
  effort, courtesy of a secure sockets
  layer (SSL) virtual private network
  (VPN) from NeoAccel. The product, dubbed SSL VPNPlus,
  scans outside users as they log in to
  the campus network through the VPN,
  and disallows access to those machines
  that do not carry all of the latest
  antivirus and anti-spyware technology.
  The system then pushes these tools onto
  the users’ computers and forces them to
  upgrade before granting access. According
  to Katherine Ogden, network technology
  manager, the process has made
the entire network safer.
              Behind the DShield
              
LET’S SAY YOU’RE A NETWORK ADMINISTRATOR and your perimeter defenses have just been
breached. No doubt you’re unhappy about the situation, you’re wondering how it happened, and
you’re wishing you could see how many times the same thing has happened to other schools
across the country on the same day your own system was hit. Enter DShield.
              DShield is a free open source service that provides a platform for users of firewalls to share
  intrusion information. Officially launched in 2000, the site received substantial support from security
  training pros The SANS Institute, and has become the data collection engine
  behind the SANS Internet Storm Center.  
              The site provides a color-coded map of the world, with pie charts
    for each continent, outlining the most commonly attacked ports and
    the most frequent types of attacks on each port. The charts present
    the information as a percentage of a whole. In this fashion, users can
    see which parts of the world are experiencing the greatest number of
    attacks at a given time.    
              In the academic environment, colleges and universities can implement
      localized versions of DShield on their own campuses. At Virginia
      Polytechnic Institute and State University, for instance, technologists gather attack data from
      firewalls on campus and publish a similar map (here). Randy Marchany, director
      of the school’s IT Security Lab, says the school is using this technology as an early warning system,
      and notes that he relies on the system to see if certain sections of campus are being targeted,
      and to see which of these sections is reflecting the most intense scan patterns.
               “It’s sort of like looking at a weather map,” he says. “I know, for instance, that a front in St. Louis
      will get here in two days, and that information can be really useful under the right circumstances.”
		   
“We haven’t
  had any kind of
  virus outbreak
  on our network
  since we started
  using it,” she
  says, noting that the product has been
  running for about a year. “Another benefit:
  Our users appreciate being told that
  they have these issues—issues that will
affect the security of their machines.”
IT officials at Colby-Sawyer College
  (NH) are embracing similar strategies to
  secure the inside of their network, but
  because the college operates on a limited
  budget, officials have turned to less
  expensive technologies. In fact, Scott
  Brown, information security analyst at
  the 1,000-student school, says the
  department recently put forth a concerted
  effort to ditch all of its big-name
  security vendors and embrace innovative,
  off-the-beaten-path companies.The
  effort replaced a
  popular antivirus
  product with software
  called Nod32
  from ESET; it also
  involved a trio of new products from
  PA-based developer/reseller Classic Networking.
The first of these products, Classic
  Networking’s own Client Assessment
  Tool (CAT), scans remote computers to
  make sure they comply with all of the
  school’s latest security policies. Next, a
  tool called the ResNet Policy Manager from MSI Software provides the school with the ability
  to register users and enforce the school’s
  policy for Windows Updates, antivirus
  and anti-spyware efforts, and more. Completing
  Colby-Sawyer’s new triad is the
  NitroGuard intrusion prevention system
  (IPS) from NitroSecurity, which uses a correlation
  engine to identify security threats within
  the network and isolate anomalous network
activity before problems can occur.
“While we spent hours configuring our
  system under the old approach, our new
  solutions take care of almost everything
  automatically,” says Brown. “That each
  of these products can retrieve information
from the others is a great benefit.”
Protecting E-mail
Because so many security threats travel
  via e-mail, one of the best ways to secure
  a network is to make certain that e-mail is
  safe. In the interest of simplifying management
  and cost, many schools handle
  this by opting for unified threat management
  (UTM) appliances from vendors
  such as Check Point Software Technologies and Internet Security Systems. These
  tools combine anti-spam and antivirus
  technologies with firewall, VPN, IPS,
  and intrusion detection systems (IDS) to
  provide an all-in-one solution. By and
  large, they are worthwhile methods of
  defending e-mail and a variety of other
network functions.
 
Other schools, however, opt for standalone
  appliances to handle nothing but
  e-mail. At Winthrop University (SC),
  technologists recently installed a Razor-
  Gate MailHurdle e-mail appliance from
  Mirapoint  to scan
  for all sorts of viruses and spam. According
  to Jim Hammond, associate VP of IT,
  the device also enables administrators to
  scan for “graylisted” e-mails, or e-mails
  that may be of suspicious origin. Based
  upon preset heuristics, if the tool suspects
  a sender may be a spammer, it will
  automatically send a “challenge” e-mail
  that requires response before the message
  is processed. Most spam systems
  cannot respond to this request. “Legitimate
  e-mail systems have automatic
  retries written into them,” explains Hammond.
“Graylisting is a way to make sure
the sender is legitimate.”
We’ve taught our users to understand that when an
e-mail comes in with a red exclamation point that says
it’s not trusted, they ignore it or throw it away.
—Nick Davis, University of Wisconsin-Madison
 
There’s more than one way to guarantee
  e-mail traffic is secure, and at the
  University of Wisconsin-Madison, academic
  technologists have tethered their
  efforts to an encryption technology
  known as public key infrastructure (PKI).
  In general, PKI systems are run by a certificate
  authority (CA) server that issues
  digital certificates to authenticate the
  identity of organizations and individuals
  over the network. Nick Davis, the
  school’s PKI administrator, says that at
  UW, these certificates also are used to
  sign messages digitally, a process that
  proves and ensures system e-mail messages
have not been tampered with.
Wisconsin’s PKI infrastructure is a
  hodgepodge of homegrown and vendor solutions. After building certain components
  of the system themselves, the IT
  department started issuing digital certificates
  in September 2005 with the True
  Credentials system from GeoTrust. Today, the certificates
  are available to roughly 450 faculty and
  staff users. While these users are not
  required to use certificates, the school
  has developed a policy that encourages
  users to do so under certain circumstances.
  Davis notes that those who send
  mass e-mails, for instance, are asked to
  sign the notes digitally as proof that the
blasts are not spam.
“We’ve taught our users to understand
  that when an e-mail comes in with a red
  exclamation point that says it’s not trusted,
  they ignore it or throw it away,” he
  says, adding that each user’s certificate is
  good for one year, and that GeoTrust also
  provides off-site certificate escrow to
  keep track of which certificates go where.
“This takes trusted e-mail to a whole
new level,” says Davis.
Managing the Whole
The assumption with technologies such
  as PKI is that nothing is safe unless
  proven otherwise. Many schools, however,
  take the opposite approach, assuming
  that systems are safe unless they can find
  a hole. The act of finding these weaknesses
  usually revolves around processes
  such as vulnerability management and
  penetration testing. In both scenarios,
  network administrators deploy security
  tools to act like hackers and scour a network
  for chinks in its armor. The open
  source movement has led to the development
  of a number of free tools for this
  purpose (see “Behind the DShield,”and “Tools of the Trade”), but a
  variety of vendors sell proprietary solutions
as well.
One of those for-profit solutions is
  Core Impact from Core Security Technologies. At
  the University of North Florida, technologists
  recently deployed this tool to
  automate the penetration testing methods
  previously carried out by hand. In
  the past, this process was essentially a
  full-time job. Today, the Core Impact
  device continuously pings servers and
  firewalls on the network to discover
  weaknesses. Jeff Durfee, assistant
  director of information security, says
  that when the new system discovers a
  weakness, it alerts network administrators
  and suggests patches to make the
defenses as good as new.
“Fixing problems still rests with us,”
  says Durfee. “But knowing this product
  is constantly testing our network to find
  [problems] makes us feel more comfortable
with the defenses we have.”
 
Up Next
Many schools see tools such as vulnerability
  assessment apps falling into a new
  category of security solutions: security
  event management (SEM) software.
  Generally, this technology combines
  vulnerability assessment with packet
  monitoring, intrusion detection and prevention,
  and a reporting engine to present
  findings coherently. Still, like
  penetration testing tools, SEM tools only
  find problems; they don’t fix them. Yet,
  when SEM software is working adequately,
  it can centralize a number of
  security features, making it easier for
  network administrators to manage a variety
of functions.
              Tools of the Trade
              SECURITY WAS HOT on the minds of those who
attended the Campus Technology 2006 conference
in Boston this summer. During a panel about
fighting hackers, technologist Jane DelFavero,
assistant director of technology security services
at New York University, listed a number of free
tools that can be used to snuff out spots where
hackers may sneak into the campus network.
              Some of these tools include:  
              
              For more information on the importance of penetration
                  testing, click here.
           
Recent reports from Gartner indicate that it can cost up
  to $400,000 to implement an off-theshelf
  SEM system. At Boston College
  (MA), however, technologists recently
  took matters into their own hands,
  developing their own system to manage
  security events. The new product is built
  in XML and Java. David Escalante,
  director of computer policy and security,
  says that while it isn’t perfect yet, it
  has improved visibility of security
  events across the network as a whole,
  enabling IT administrators to be more
  proactive about the enhancements they
choose to make.
“If you’re securing your network adequately,
  you’ve got a bunch of machines
  generating a ton of data almost every
  hour,” Escalante says. “We’re just trying
  to manage this information constructively,
  and hope to figure out a way to make it
  more useful than ever before.”
WEBEXTRA :: More on the perennial fight against viruses
  and spam, click here.
 
  
        
        
        
        
        
        
        
        
        
        
        
        
            
        
        
                
                    About the Author
                    
                
                    
                    Matt Villano is senior contributing editor of this publication.