Library items tagged: security

Anonymous
Janet CSIRT routinely processes netflow data to detect signs of Conficker infections on Janet.
Anonymous
Rodney Tillotson The expectation that e-mail services will return a failure notice or report for messages that cannot be delivered is no longer realistic. In most cases Janet-connected organisations should not attempt to provide such notifications.
Anonymous
PB/INFO/082 (11/04) Many organisations are looking to have some form of penetration testing performed on their systems. This may simply be to evaluate existing security measures and to find gaps where security needs improvement, but increasingly it is performed to comply with security standards when connecting to public sector networks or processing payment details.
Anonymous
Janet processes netflow data collected on various routers within the Janet network. This netflow data is used in planning, network operations, research and security incident response, and is considered necessary to effectively complete some of the tasks involved in these areas.
Anonymous
This page provides a brief overview on how to deal with reported SSH scans originating from your own systems. It does not cover SSH scanning targeted at your systems and originating elsewhere.
Anonymous
Background There is a great deal of literature about the operation of authoritative nameservers, but not so much about the resolver function.This note is for system and network managers or administrators in Janet organisations (particularly smaller organisations with relatively simple networks) and is intended to give them confidence that they have correctly configured this straighforward but critical part of the DNS in their own networks.
Anonymous
This advice is principally to help a Janet organization respond properly to reports from Janet CSIRT that a worm or virus is present in their network. The intrusion of worm and virus software to one or more of your computers is the most common class of network abuse. In some cases it does little obvious, direct or immediate harm to your network; but it does need dealing with systematically and promptly:
Anonymous
Some ports have historically been associated with security vulnerabilities, but see little legitimate use on a WAN or the general Internet. They present a risk to your network and little to no legitimate use is prevented by blocking them. If your network is partitioned with one or more firewalls so that different parts support different functions or groups of users, you should consider applying the same restrictions at the firewalls between them.
Anonymous
Malware is a term used to encompass a wide and growing variety of software threats to the security of computer systems. It consists of software designed to interrupt the normal operation of a computer for some malicious purpose. This may simply be to disrupt the normal operation of a system but more commonly and increasingly it is used to gain unauthorised access to resources and information.
Anonymous
As the listed abuse contact for much of the IP address space in use on Janet, Janet CSIRT receives many copyright infringement reports on behalf of the Janet community. Janet CSIRT is not able to identify individual users or machines on its customer organisations’ networks, so the most effective way to deal with these complaints of unacceptable use of the network is to forward them to the responsible customer organisation. Those organisations are required by the Janet AUP to deal effectively with complaints.