rik farlow, usenix ;login :, august 2004
DESCRIPTION
- PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Rik Farlow, USENIX ;login :, August 2004](https://reader030.vdocuments.net/reader030/viewer/2022032313/56812bad550346895d8fe0a9/html5/thumbnails/1.jpg)
“The attacks on supercomputers at [sites deleted] and other locations were closer to a skillful assault, but they were not actually successful. The attackers, instead of treading lightly, just kept abusing more accounts and taking over more systems, making it only a matter of time before their intrusions were discovered. The attackers were certainly persistent, returning even after being discovered. I am hopeful that one or more of the defenders will discuss their experiences with these intrusions in the Security edition of ;login:.”
-Rik Farlow, USENIX ;login:, August 2004
![Page 2: Rik Farlow, USENIX ;login :, August 2004](https://reader030.vdocuments.net/reader030/viewer/2022032313/56812bad550346895d8fe0a9/html5/thumbnails/2.jpg)
Welcome !
![Page 3: Rik Farlow, USENIX ;login :, August 2004](https://reader030.vdocuments.net/reader030/viewer/2022032313/56812bad550346895d8fe0a9/html5/thumbnails/3.jpg)
Who Am I ?Tom BettgeAssociate Director Scientific Computing DivisionNational Center for Atmospheric ResearchBoulder, ColoradoBackground: Applications Software Engineer – Climate Modeling
my mother’s maiden name is Hacker
![Page 4: Rik Farlow, USENIX ;login :, August 2004](https://reader030.vdocuments.net/reader030/viewer/2022032313/56812bad550346895d8fe0a9/html5/thumbnails/4.jpg)
“………………………….The attackers were certainly persistent, returning even after being discovered. I am hopeful that one or more of the defenders will discuss their experiences with these intrusions in the Security edition of ;login:.”
-Rik Farlow, USENIX ;login:, August 2004
![Page 5: Rik Farlow, USENIX ;login :, August 2004](https://reader030.vdocuments.net/reader030/viewer/2022032313/56812bad550346895d8fe0a9/html5/thumbnails/5.jpg)
Program Committee• Tom Bettge National Center for Atmospheric Research• RuthAnne Bevier California Institute of Technology• Ginger Caldwell National Center for Atmospheric Research• Walter Dykas Oak Ridge National Laboratory• Victor Hazlewood San Diego Supercomputer Center• Chris Hempel Texas Advanced Computer Center• Jim Marsteller Pittsburgh Supercomputer Center• Marla Meehl National Center for Atmospheric Research• George Strawn National Science Foundation• Howard Walter National Energy Research Scientific Computing Center• John Towns National Center for Supercomputing
Applications
![Page 6: Rik Farlow, USENIX ;login :, August 2004](https://reader030.vdocuments.net/reader030/viewer/2022032313/56812bad550346895d8fe0a9/html5/thumbnails/6.jpg)
Who Are You ?• Registered Participants: 128
• By Organizational/Agency:– University/NSF 79– DOE 25– Military 8– NASA 8– NOAA 3– Other 5
• By Duty/Position:– system/security administration 50– management 40– end user 10
![Page 7: Rik Farlow, USENIX ;login :, August 2004](https://reader030.vdocuments.net/reader030/viewer/2022032313/56812bad550346895d8fe0a9/html5/thumbnails/7.jpg)
Breakout Sessions
1. User Policies/Education
2. System Administration Policies/Education
3. Network Based Intrusion Detection
4. Host Based Intrusion Detection
5. Grid Computing Challenges
![Page 8: Rik Farlow, USENIX ;login :, August 2004](https://reader030.vdocuments.net/reader030/viewer/2022032313/56812bad550346895d8fe0a9/html5/thumbnails/8.jpg)
Tom
NCAR/Scientific Computing Division
Bettge
Cybersecurity Summit 2004
1
Breakout Session Assignment
![Page 9: Rik Farlow, USENIX ;login :, August 2004](https://reader030.vdocuments.net/reader030/viewer/2022032313/56812bad550346895d8fe0a9/html5/thumbnails/9.jpg)
Monday Evening: Meeting Rooms
• Dewey I / II• Charleston I / II• Farragut• wireless will be available
Contact Staff
![Page 10: Rik Farlow, USENIX ;login :, August 2004](https://reader030.vdocuments.net/reader030/viewer/2022032313/56812bad550346895d8fe0a9/html5/thumbnails/10.jpg)
Thanks to NCAR Staff
• Susan Cross• Lynda Lester• Janie Young
![Page 11: Rik Farlow, USENIX ;login :, August 2004](https://reader030.vdocuments.net/reader030/viewer/2022032313/56812bad550346895d8fe0a9/html5/thumbnails/11.jpg)
![Page 12: Rik Farlow, USENIX ;login :, August 2004](https://reader030.vdocuments.net/reader030/viewer/2022032313/56812bad550346895d8fe0a9/html5/thumbnails/12.jpg)
Cybersecurity Summit ?• Concept of Summit – Spring 2004
Share information, discuss impact upon users, systems, etc.Best PracticesProcedures for future incidents (communication, etc.)
• To include peer agencies• Endorsed/Sponsored by National Science
Foundation• Expanded to broad community• Expanded to include peer agencies• Invitation Only !