Library items tagged: incident response

Anonymous
Jisc processes NetFlow data collected on various routers within the Janet network. This NetFlow data is used in planning, network operations, research and security incident response, and is considered necessary to effectively complete some of the tasks involved in these areas.
Anonymous
This page provides a brief overview on how to deal with reported SSH scans originating from your own systems. It does not cover SSH scanning targeted at your systems and originating elsewhere.
Anonymous
Background There is a great deal of literature about the operation of authoritative nameservers, but not so much about the resolver function.This note is for system and network managers or administrators in Janet organisations (particularly smaller organisations with relatively simple networks) and is intended to give them confidence that they have correctly configured this straighforward but critical part of the DNS in their own networks.
Anonymous
This advice is principally to help a Janet organization respond properly to reports from Janet CSIRT that a worm or virus is present in their network. The intrusion of worm and virus software to one or more of your computers is the most common class of network abuse. In some cases it does little obvious, direct or immediate harm to your network; but it does need dealing with systematically and promptly:
Anonymous
Some ports have historically been associated with security vulnerabilities, but see little legitimate use on a WAN or the general Internet. They present a risk to your network and little to no legitimate use is prevented by blocking them. If your network is partitioned with one or more firewalls so that different parts support different functions or groups of users, you should consider applying the same restrictions at the firewalls between them.
Anonymous
Malware is a term used to encompass a wide and growing variety of software threats to the security of computer systems. It consists of software designed to interrupt the normal operation of a computer for some malicious purpose. This may simply be to disrupt the normal operation of a system but more commonly and increasingly it is used to gain unauthorised access to resources and information.
Anonymous
As the listed abuse contact for much of the IP address space in use on Janet, Janet CSIRT receives many copyright infringement reports on behalf of the Janet community. Janet CSIRT is not able to identify individual users or machines on its customer organisations’ networks, so the most effective way to deal with these complaints of unacceptable use of the network is to forward them to the responsible customer organisation. Those organisations are required by the Janet AUP to deal effectively with complaints.
Anonymous
Community group and email list
Anonymous
Why? To trace use of Janet, both legitimate and otherwise, helping to investigate and learn from security incidents. Whilst some network events are of a continuing nature, others may only occur sporadically and unexpectedly, and logging of activity can help us understand what took place in the past. Many networks now use Network Address Translation (NAT) or proxy devices that obscure the source of of a connection to the external world, which can prevent the timely investigation of serious incidents.
Anonymous
Typical Denial of Service abuse (DoS) involves a very large number of connections or packets being directed to the target computer, either from a single source IP address or (Distributed Denial of Service, DDoS) from a number of addresses, possibly a large number and probably in several different networks. Sometimes the effect is to stop the data network working or make it so slow as to interfere with its normal use; sometimes the target is a single machine which also may cease to work or run very slowly.