Any views expressed within media held on this service are those of the contributors, should not be taken as approved or endorsed by the University, and do not necessarily reflect the views of the University in respect of any particular issue.

Computing Systems

Computing Systems

Informatics Computing Staff jottings

Scanning for vulnerable systems

This article describes a couple of security enhancements which the Computing Team will be developing over the next few months.

As I mentioned  last time, we have recently started scanning all our externally-visible machines for security vulnerabilities using the JANET ESISS penetration-testing service.  In order to use the service as effectively as possible we need an up-to-date list of the URLs of web sites to be tested.  For managed servers, our configuration database contains the necessary information.  For self-managd machines we propose extracting URLs from the traffic going to the servers on those machines, which we expect should keep the list automatically current.

We are also evaluating the use of the snort intrusion detection system, in the hope that it might be able to alert us to the presence of compromised machines or services on our network.  This does sound a promising system, but we are still at the initial stages with it and it is not yet clear whether it would have too much of an effect on our edge routers to be able to run it as we would like.

Both of these will require the automated inspection of traffic passing through our edge routers, with the Head of School’s permission under the terms of the Lawful Business Practice regulations.  This will, of course, be kept to the absolute minimum necessary for the purpose.

Leave a reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

css.php

Report this page

To report inappropriate content on this page, please use the form below. Upon receiving your report, we will be in touch as per the Take Down Policy of the service.

Please note that personal data collected through this form is used and stored for the purposes of processing this report and communication with you.

If you are unable to report a concern about content via this form please contact the Service Owner.

Please enter an email address you wish to be contacted on. Please describe the unacceptable content in sufficient detail to allow us to locate it, and why you consider it to be unacceptable.
By submitting this report, you accept that it is accurate and that fraudulent or nuisance complaints may result in action by the University.

  Cancel