Welcome to the Network Security website at the IAS
This website is intended to bring you the latest news, how to's, tools and resources in Information Security. Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.
The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute. For a description of these principles, please see our About section.
In keeping with the spirit of the Institute, I encourage questions and open discussions about security. And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.
Brian Epstein <email@example.com>
Dear Faculty, Members, and Staff,
Over the past few months we have seen an increase in the number of tageted attacks against the Institute's email systems. In order to mitigate future attacks, Computing has taken several steps to better protect our email systems. This includes realigning our spam and phishing filters to better match vendor best practices, and establishing outbound email throttling to prevent widespread distribution of spam from the Institute.
Following these changes, we also make the following recommendations:
Dear Faculty, Members, Visitors and Staff,
For your convenience, we have merged the functionality of the IAS-Scholar wireless network into the eduroam network. If you haven't already configured your device to use eduroam, we recommend you take a look at the link below for instruction on how to configure it. Accordingly, on August 7, the IAS-Scholar network will no longer be available. This change will have no impact on the public IAS network.
Aww man, it's us
As a security professional, I spend a lot of my time making sure that the bad guys aren't able to break in. I set up all the fancy firewalls and anti-virus to keep us safe. But what happens when a user unknowingly gives up their credentials due to a phish? Well, if you are lucky, the spammers just use it to spam the world. If you are unlucky, the figure out how to attack the inside of your network to get to the crown jewels.
Guidelines for Traveling Safely
Before you travel:
Ensure any devices (laptops, tablets, phones, etc.) you are traveling with are both backed up and current on security updates/patches.
Protecting your home network with OpenDNS for free
Deep packet inspection is a methodology that network security professionals have been doing for many years. It involves looking at the data going over the network and determining if anything malicious is going on based on what's in those packets.
My last post on Ransomware was in 2013 when we were being hit by Cryptolocker. I mentioned that in around 2010 Data Doctor 2010 was the ransomware in the news. According to Wikipedia, the first "ransomware" was called the "AIDS Trojan" in 1989, which didn't encrypt your files, but merely hid their data by encrypting the filenames.
NJEDge has released two Security Awareness videos, one for Students, and another for Faculty and Staff that reviews various topics in keeping yourself safe online.
Here are the links:
Thanks to NJEDge!
The security community has been buzzing over Lenovo's gaff of including Superfish Adware with their Lenovo laptops. Superfish comes pre-installed with a compromised root CA, which is by default installed into the trusted certificate store of system web browsers.