Table Of Contents
U of U students, staff and faculty can access the Campus Network via a Virtual Private Network connection known as a VPN. A Virtual Private Network (VPN) provides a secure connection to a network through the Internet from a personal computer Dustin, who provides technical support for U of U NetCom, will discuss what services are available for Mac users.
Check Point Full Disk Encryption provides the highest level of data security with multi-factor pre-boot authentication and the strongest encryption algorithms.
This page give you a summary on setting up the campus VPN on a iPhone or iPod Touch running firmware 2.0 or later.
In the course of deploying new Apple hardware, SCL Mac Support has either commissioned the manufacture of or developed on its own variety of security and protection devices. These devices are designed to secure and protect specific hardware or hardware components from theft or damage (accidental and intentional) that is likely to occur in an open lab or kiosk environment. In each instance, factors such as overall cost, durability, size, and aesthetics were important considerations.
Eavesdrop is a network capture application (based on tcpdump) that captures and understands TCP conversations. It keeps track of the TCP flag history and extracts the payload of each conversation as it is captured. The payload is also searched for image data to display. Graphs can be created to view trends in the captured data.
Espionage is a new user-friendly tool for Mac OS X that allows users to interact with encrypted and password protected folders. This talk will introduce Espionage and will provide an in-depth discussion of its inner workings and will cover some of its edge-use cases.
It seems that someone is always poking their nose where they are not supposed to. Wouldn't it be great to find out when this is happening? That is what Intrusion Detection is for, but what exactly is it, why do you need one, and how do you set one up? Darren will be presenting a general overview and then discuss how to implement one type of Intrusion Detection System for Networks using the HenWen interface to Snort. This will include a demonstration.
Derrick Donnelly will discuss the state of forensics on Mac OS and tasks like using a Mac to create a forensics image of a Mac or PC drive and commands to sift through the amount of information stored on today's hard drives. Derrick is considered one of the foremost experts in Mac forensic analysis. He currently serves as the CTO of BlackBag Technologies, a leading provider of multi-platform forensic software and hardware solutions. Before BlackBag Technologies, he led the IT Security Department at Apple Computer where he played key roles in securely implementing iTunes, .Mac and the Apple online stores. He was a law enforcement officer for the Royal Canadian Mounted Police. He has developed and teaches courses to law enforcement agencies internationally, including the FBI Computer Analysis and Response Team (CART). He also has worked with the US Department of Justice. He attended St. Francis Xavier University in Nova Scotia, Canada where he studied Information Systems.).
This presentation discusses Mac OS X lab physical security, boot security, how to handle published exploits, passwords, world write permissions, SUID applications, how to securely modify the system, what to do with applications that stay open after logout, how to protect services that you might enable, and how to monitor your labs to ensure that they stay secure.
A brief overview of the "help"-related internet security vulnerability recently discovered in Mac OS X.
An overview of MacAnalysis, a network security application.
PGP Whole Disk Encryption locks down the entire contents of a laptop, desktop, external drive, or USB flash drive, including boot sectors, system, and swap files. The data encryption software continuously safeguards data from unauthorized access, providing strong security for intellectual property, and institutional data.
Mike Romo is the product manager for most of the Mac products at Symantec. He will be presenting on overview of the threats that Symantec is setting to Mac OS X, how their products address these threats, demostration of some of their products, and Q & A.
A discussed the pros and cons of TrueCrypt for Mac OS X and demonstration on its use.
A vulnerability has been discovered, that with access to a USB Keyboard connected to the computer running on OS's Mac OS X 10.2.8 or earlier; a person can hold down Control + c during startup and be given access to a root shell prompt due to init crashing. Then they can easily compromise the Mac. Richard will discuss the vulnerability, give an example, and give a workaround to remove the vunerability.
Overviews of various anti-virus software for Mac OS X.
This is some noted "Mac OS X" issues from our campus Qualys reports. Each page includes a detailed description of issue and fix for it.