-------- Original Message -------- Subject: On-Line SP/ISP/ASP/Big Network Security Training Materials Date: Wed, 10 Dec 2003 10:44:01 -0800 From: Barry Raveendran Greene <[EMAIL PROTECTED]> Reply-To: <[EMAIL PROTECTED]> Organization: Cisco Systems To: <[EMAIL PROTECTED]>
Hello Everyone,
This is a big BCC covering a wide audience in Asia. The objective is to get the word out on SP/ISP/ASP/Big Network security materials that are available for personal training and empowerment. All materials are public resources - available to anyone.
Given that security incidents, worms, DDOS, and other nastiness are facts of networking life, keeping abreast of the latest security techniques and resources are worth the personal investment.
Barry
========================================= SP/ISP/ASP/Big Network Security Materials =========================================
Public On-Line ISP Security Bootcamp - Singapore Summer 2003 ------------------------------------------------------------
http://www.getitmm.com/bootcampflash/launch.html
Sign-On:
http://palomar.getitmm.com/bootcamp/
Much of the materials presented in the ISP Security Bootcamp builds on and assumes a basic understanding of the principles in the ISP Essentials materials. This whitepaper is now a book - ISP Essentials which can be purchased through Cisco Press (http://www.ciscopress.com/) or through another on-line book store. The supplements for the book along with the tutorials, workshops, and bootcamps presented by Philip and I are at:
ftp://ftp-eng.cisco.com/cons/
or
http://www.ispbook.com
TEAM CYMRU Templates and Tools ------------------------------
Team CYMRU provides configuration templates, security templates, and other services to help make the Internet a safer place to network. These can be found at:
http://www.cymru.com/
The Original Backscattered Traceback and Customer Triggered Remote Triggered Black Hole Techniques ---------------------------------------------------------------------------- ---------------------
UUNET Operations Security Team (now MCI) has been extremely generous in their willingness to share with the community new techniques that they are using to mitigate various flavors of attacks. The following links are from the 'source.'
http://www.secsup.org/Tracking/ http://www.secsup.org/CustomerBlackHole/
What is a BOTNET? -----------------
One of the best write ups is from a freeware tool gone commercial (I guess so they can scale).
http://swatit.org/bots/index.html
BGP 'Attack Tree' - Realities of BGP Security -------------------------------------------
Cisco's CIAG Team moves beyond the armchair hypothesizing of BGP Security Risk and runs test again the industry's multiple implementations of BGP
http://www.blackhat.com/presentations/bh-usa-03/bh-us-03-convery-franz.pdf
NANOG ISP Security Seminars and Talks -------------------------------------
The NANOG Coordination Committee actively works to product sessions and seminars to help foster security on the Internet. All sessions are taped and converted to VOD for all to use for their personal education. Over time, this effort has generated a valuable On-Line Tutorial for engineers and organizations seeking to learn more about running a more secure network. The core link to bookmark is:
http://www.nanog.org/ispsecurity.html
Details of the NANOG Security Tutorial Series include:
Tutorial: Implementing a Secure Network Infrastructure (Part I)
http://www.nanog.org/mtg-0310/kaeo.htmlTutorial: ISP Security - Real World Techniques I - Remote Triggered Black
Hole Filtering and Backscatter Traceback.
http://www.nanog.org/mtg-0110/greene.htmlTutorial: ISP Security - Real World Techniques II - Secure the CPE Edge
http://www.nanog.org/mtg-0210/ispsecure.htmlTutorial: ISP Security: Deploying and Using Sinkholes
http://www.nanog.org/mtg-0306/sink.htmlTutorial: Deploying IP Anycast
http://www.nanog.org/mtg-0310/miller.htmlNANOG Security Sessions
Watching Your Router Configurations and Detecting Those Exciting Little Changes http://www.nanog.org/mtg-0310/rancid.html
Building a Web of Trust
http://www.nanog.org/mtg-0310/abley.htmlThe Relationship Between Network Security and Spam
http://www.nanog.org/mtg-0310/spam.htmlSimple Router Security, What Every ISP Router Engineer Should Know and
Practice
http://www.nanog.org/mtg-0310/routersec.htmlFlawed Routers Flood University of Wisconsin Internet Time Server
http://www.nanog.org/mtg-0310/plonka.htmlTrends in Denial of Service Attack Technology
http://www.nanog.org/mtg-0110/cert.htmlRecent Internet Worms: Who Are the Victims, and How Good Are We at Getting the Word Out? ` http://www.nanog.org/mtg-0110/moore.html
DoS Attacks in the Real World
http://www.nanog.org/mtg-0110/irc.htmlDiversion & Sieving Techniques to Defeat DDoS
http://www.nanog.org/mtg-0110/afek.htmlDNS Damage - Measurements at a Root Server
http://www.nanog.org/mtg-0202/evi.htmlProtecting the BGP Routes to Top Level DNS Servers
http://www.nanog.org/mtg-0206/bush.htmlBGP Security Update
http://www.nanog.org/mtg-0206/barry.htmlIndustry/Government Infrastructure Vulnerability Assessment: Background and
Recommendations
http://www.nanog.org/mtg-0206/avi.htmlA National Strategy to Secure Cyberspace
http://www.nanog.org/mtg-0210/sachs.htmlHow to 0wn the Internet in Your Spare Time
http://www.nanog.org/mtg-0210/vern.htmlISP Security BOF I
http://www.nanog.org/mtg-0210/securebof.htmlThe Spread of the Sapphire/Slammer Worm
http://www.nanog.org/mtg-0302/weaver.htmlISP Security BOF II
http://www.nanog.org/mtg-0302/securebof.htmlThe BGP TTL Security Hack
http://www.nanog.org/mtg-0302/hack.htmlSecurity Considerations for Network Architecture
http://www.nanog.org/mtg-0302/avi.htmlLack of Priority Queuing on Route Processors Considered Harmful
http://www.nanog.org/mtg-0302/gill.htmlInterception Technology: The Good, The Bad, and The Ugly!
http://www.nanog.org/mtg-0306/schiller.htmlThe NIAC Vulnerability Disclosure Framework and What It Might Mean to the
ISP Community
http://www.nanog.org/mtg-0306/duncan.htmlInter-Provider Coordination for Real-Time Tracebacks
http://www.nanog.org/mtg-0306/moriarity.html
ISP Security BOF III http://www.nanog.org/mtg-0306/securitybof.html
S-BGP/soBGP Panel: What Do We Really Need and How Do We Architect a
Compromise to Get It?
http://www.nanog.org/mtg-0306/sbgp.htmlBGP Vulnerability Testing: Separating Fact from FUD
http://www.nanog.org/mtg-0306/franz.htmlBGP Attack Trees - Real World Examples
http://www.nanog.org/mtg-0306/hares.htmlNRIC Best Practices for ISP Security
http://www.nanog.org/mtg-0306/callon.html-- --
Barry Raveendran Greene | || || | Senior Consultant | || || | Corp Dev Consulting Engineering | |||| |||| | Tel (Work) +1 408 525-8089 | ..:||||||:..:||||||:.. | Tel (cell): +1 408 757-9880 | C i s c o S y s t e m s | E-mail: [EMAIL PROTECTED] | |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-- srs (postmaster|suresh)@outblaze.com // gpg : EDEDEFB9 manager, outblaze.com security and antispam operations
------------------------------------------------------- This SF.net email is sponsored by: IBM Linux Tutorials. Become an expert in LINUX or just sharpen your skills. Sign up for IBM's Free Linux Tutorials. Learn everything from the bash shell to sys admin. Click now! http://ads.osdn.com/?ad_id=1278&alloc_id=3371&op=click _______________________________________________ linux-india-help mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/linux-india-help
