AUUG Security Symposium |
Monday 19 November | Time | Tut No. | Tutorial Title and Outline | |||
---|---|---|---|---|---|---|
Half Day Morning Tutorial | 9am - 12:30pm | M1 | Firewalls, by Lawrie Brown
With the ever increasing growth and pervasiveness of the Internet, more and more organisations find that they need to connect to the Internet in order to fulfil their goals. However, there are persistent security concerns with such a connection. The usual approach to reducing these concerns is to install a firewall to provide perimeter defence around private networks which supplies a single controlled and monitored point of connection. The design, installation, and ongoing management of a firewall though, is a non-trivial task. This workshop will provide an overview of this process. This starts with the determination of an appropriate security policy, and then the specification of services to be supported and policy applied. From this a suitable firewall architecture can be selected from the range available, specific equipment chosen and configured. Then there is the ongoing management of the firewall, maintaining its safe configuration, responding to security events, and monitoring its ongoing use. The workshop will not discuss particular products, rather it is aimed to assist those who need to manage this process. Contents
|
|||
Half Day Morning Tutorial | 9am - 12.30pm | M2 | Practical IPSec, by Adrian Close
Networks on the Internet are increasingly turning to firewalls as a means of protecting themselves against external network-based attacks, creating their own small islands of trust. However, the increasing need for secure, inter-network communications requires extending that trust across the Internet itself - a risky proposition in an increasingly hostile network environment. Implementing IPSEC is one plausible solution and this tutorial will cover the fundamentals of doing this in the real world. Practical demonstrations of the technology involved will be given throughout the tutorial, which will include debugging techniques useful for successful deployment and interoperability of various IPSEC implementations. Topics:
|
|||
Half Day Morning Tutorial | 9am - 12.30pm |
|
Securing Solaris, by Pauline van Winsen
Solaris is currently the most widely implemented proprietary UNIX on the Internet today. Like all systems, the standard installation can have security issues - from out of date applications to insecure defaults. This tutorial will give the student an overview of the tasks required to secure a Solaris system in a number of environments - from workstation and server to firewall and web server. Main topics discussed will be:
| |||
Half Day
Afternoon Tutorial |
1:30pm - 5pm |
|
A Cryptography Primer, by Lawrie Brown Data encryption algorithms form an important technical component in providing secure and authenticated electronic security and communications. This workshop is designed to provide attendees with a brief overview of the field of cryptography, the terms, techniques, and algorithms. It starts by introducing the classical cryptographic techniques which form the foundations of the field. We then survey modern private key ciphers, widely used for bulk and link data encryption, from DES to the new AES encryption algorithm Rijndael. Next we consider public key encryption algorithms and signature schemes, essential for the use of cryptography in large scale, wide area communications. We conclude with a brief look at a couple of cryptographic applications, illustrating the different ways these components are combined to build a security solution. Contents
|
|||
Half Day Afternoon | 1:30pm - 5pm |
|
Building an open source firewall, by Michael Paddon Most network administrators today recognise the need for firewalls to enforce policy on inter-network traffic. While there are many commercial products addressing this need, many organisations are turning to open source solutions for reasons of performance, strength, robustness, transparency and price. One popular and mature open source firewall package is Darren Reed's ipfilter, which is available for a wide range of unix like systems, both open source and commercial. Attendees will learn, in detail, how to configure ipfilter for a wide range of real world situations and protocols. Topics covered include:
Attendees are expected to be familiar with the IP, UDP and TCP protocols and
should have some systems/network administration experience.
|
|||
Half Day Afternoon | 1:30pm - 5pm |
|
Secure Router Configuration, by Philip Smith, Cisco Systems
The integrity of the Internet depends on the security practices of the service providers whose networks are its constituent parts. Many organisations pay detailed attention to protecting end sites and their servers, but often overlooking the critical components which actually make up the Internet - the routers. This tutorial covers many of the concepts and techniques necessary to protect routers, and gives an overview of some of the facilities available on routers to deal with network incidents directed at the core infrastructure. Topics will include:
| |||
Half Day Afternoon | 1:30pm - 5pm |
|
Securing BIND, by Pauline van Winsen
The Domain Name System, DNS, is used to resolve names to IP addresses and vice versa and thus is one of the fundamental infrastructure protocols in use on the Internet and within organisations. in use. Unfortunately, a number of security exploits have been revealed in specific versions of BIND and many default installations of BIND are exploitable. This tutorial will give the student an overview of the tasks required to secure a BIND name server and steps which can be taken to minimize the impact of any future vulnerabilities which may be found in BIND. Example configurations will be given for versions 8 and 9 of BIND. The main topics discussed will be:
|
AUUG2001 Home | AUUG Home | Site
Map | Email comment