Hi guys,
Im thinking about getting a linux and security cert. Would comptia security and 
Linux plus be the best to start with?Also do you guys ever get together as a 
group?
 

    On Monday, April 4, 2016 5:02 AM, Edmund Cramp <[email protected]> wrote:
 

 #yiv1160609812 #yiv1160609812 -- _filtered #yiv1160609812 {panose-1:2 4 5 3 5 
4 6 3 2 4;} _filtered #yiv1160609812 {font-family:Calibri;panose-1:2 15 5 2 2 2 
4 3 2 4;} _filtered #yiv1160609812 {font-family:Tahoma;panose-1:2 11 6 4 3 5 4 
4 2 4;}#yiv1160609812 #yiv1160609812 p.yiv1160609812MsoNormal, #yiv1160609812 
li.yiv1160609812MsoNormal, #yiv1160609812 div.yiv1160609812MsoNormal 
{margin:0in;margin-bottom:.0001pt;font-size:11.0pt;}#yiv1160609812 a:link, 
#yiv1160609812 span.yiv1160609812MsoHyperlink 
{color:#0563C1;text-decoration:underline;}#yiv1160609812 a:visited, 
#yiv1160609812 span.yiv1160609812MsoHyperlinkFollowed 
{color:#954F72;text-decoration:underline;}#yiv1160609812 
p.yiv1160609812MsoPlainText, #yiv1160609812 li.yiv1160609812MsoPlainText, 
#yiv1160609812 div.yiv1160609812MsoPlainText 
{margin:0in;margin-bottom:.0001pt;font-size:11.0pt;}#yiv1160609812 
p.yiv1160609812MsoAcetate, #yiv1160609812 li.yiv1160609812MsoAcetate, 
#yiv1160609812 div.yiv1160609812MsoAcetate 
{margin:0in;margin-bottom:.0001pt;font-size:8.0pt;}#yiv1160609812 
p.yiv1160609812MsoListParagraph, #yiv1160609812 
li.yiv1160609812MsoListParagraph, #yiv1160609812 
div.yiv1160609812MsoListParagraph 
{margin-top:0in;margin-right:0in;margin-bottom:0in;margin-left:.5in;margin-bottom:.0001pt;font-size:11.0pt;}#yiv1160609812
 span.yiv1160609812BalloonTextChar {}#yiv1160609812 
span.yiv1160609812EmailStyle19 {color:windowtext;}#yiv1160609812 
span.yiv1160609812EmailStyle20 {color:#1F497D;}#yiv1160609812 
span.yiv1160609812EmailStyle21 {color:#1F497D;}#yiv1160609812 
span.yiv1160609812EmailStyle22 {color:#1F497D;}#yiv1160609812 
span.yiv1160609812EmailStyle23 {color:#993366;}#yiv1160609812 
span.yiv1160609812EmailStyle24 {color:#1F497D;}#yiv1160609812 
span.yiv1160609812EmailStyle25 {color:#1F497D;}#yiv1160609812 
span.yiv1160609812PlainTextChar {}#yiv1160609812 .yiv1160609812MsoChpDefault 
{font-size:10.0pt;} _filtered #yiv1160609812 {margin:1.0in 1.0in 1.0in 
1.0in;}#yiv1160609812 div.yiv1160609812WordSection1 {}#yiv1160609812 _filtered 
#yiv1160609812 {} _filtered #yiv1160609812 {} _filtered #yiv1160609812 {} 
_filtered #yiv1160609812 {} _filtered #yiv1160609812 {} _filtered 
#yiv1160609812 {} _filtered #yiv1160609812 {} _filtered #yiv1160609812 {} 
_filtered #yiv1160609812 {} _filtered #yiv1160609812 {}#yiv1160609812 ol 
{margin-bottom:0in;}#yiv1160609812 ul {margin-bottom:0in;}#yiv1160609812 > 
Would you care to share without giving away the store a broad definition of a 
locked-down network?  I’ll post our setup for comment:  Our first line of 
defense is the firewall – which, from the outside, is drop all by default with 
only the ports needed for specific services open - and those ports only go to 
the machines that need them.  The second line is the mail server – everything 
goes through the AV filter (Kaspersky), obvious infections are refused at the 
mail server and anything that gets past the AV filter is then content filtered 
– all mail with a  .exe, .src, ,docx, .xls, .xlsx .bat, html attachment etc 
(the list is long), or a zip file that is password protected is quarantined.  
Anything that gets through both the AV and content filter goes through Spam 
Assassin before it reaches the users mailbox.  The third line of defense is 
that NOBODY has default administrative privileges on any Windows PC and all 
PC’s are patched up to date and run Windows Defender.  And finally – Smart 
Users who are very skeptical of social engineering, “Hi Jane, this is Ben. I 
need to transfer money to a customer ASAP to seal this deal, what’s the Wire 
Transfer password” and sudden emails from friends with a one line hyperlink.  
So that’s the defense but it’s not “locked down” by my book – these are the 
weaknesses that I see in our network:  1.       PDF files are allowed into the 
network – these are not a huge threat at the moment, I hear stories of spear 
fishing with PDFs but I don’t think we rate that high in anyone’s interest.2.   
    Javascript – I try to keep this off the systems but so many things use it 
that we install it on demand and try to remember to remove it afterwards.3.     
  Flash – Again, remove on sight but sometimes it has to come back for one web 
site of another.4.       Drive by (ad network based) infections – all PC’s have 
three browsers installed, Firefox with AdBlockPlus and NoScript for default and 
general use, Chrome for when you want to access a site without ABP and NS, and 
Internet Explorer for anonymous use (no history, no cookies, everything deleted 
on exit).  Backups currently work like this but I’m thinking about changing 
this in light of the ransomware threat:  The main NAS is backed up off-site in 
real-time.A daily backup of the NAS is pulled via Rsync to another machine 
every night at midnight with each day stored separately for 5 days of history.  
Regards,
Edmund Cramp
--  
"HTML's a cheap whore. Treating her with respect is possible, and even 
preferable, because once upon a time she was a beautiful and virginal format, 
but you shouldn't expect too much of her at this point."  
_______________________________________________
General mailing list
[email protected]
http://brlug.net/mailman/listinfo/general_brlug.net


  
_______________________________________________
General mailing list
[email protected]
http://brlug.net/mailman/listinfo/general_brlug.net

Reply via email to