Computer Security information for GT staff

This page is for guidance only and describes several aspects of computer security. The objective is to highlight essential points of computer security when working in the IT-GT group.

CERN Computing rules

As a GT member, you are bound by the CERN Computing Rules, available at:

You should know about these have signed them when you have applied for a CERN account and/or a grid certificate from the CERN CA.

Security exposure

As in any large organisation, there are security risks inherent to running and maintaining computing services. As members of the Grid Deployment group, you are likely to have a certain degree of Unix or administrative privileges against a CERN host or some grid service. These privileges come with a responsibility, part of which includes being aware and keeping up-to-date with the most common security attacks CERN or the grid is facing.

A good starting point is the Security Questionnaire provided by the ISSeG project:

The questionnaire should give you a basic understanding of the security risks you and the organisation are facing, as well as common mitigating techniques.

Security awareness

The table below attempts to describe different areas of computer security and is regularly updated.

You should be have sufficient understanding of each of these areas, and in particular:

  • Understand the main risk(s)
  • Identify the recommended solution(s)
  • Review your working practice and take corrective action if needed

Area Topic Where to find information
Desktop Security Web browsing Chat with Romain,
Desktop Security Emails Chat with Romain
Desktop Security Instant messaging and VoIP Chat with Romain
Desktop Security Windows security
Desktop Security Linux security Armoring (Grid) Linux systems
Desktop Security PDAs and phone security Chat with Romain
Network Security Connecting to CERN from home SSH gateways
SSH Socks proxy
SSH agent
SSH port forwarding
Man-In-the-Middle information
Network Security Wire(less) network security Chat with Romain
Host Security Authenticating using SSH at CERN
Host Security AFS access control Worldwide readable
FS command
PTS command
kerberos AFS tokens
Host Security Managing root access root access management in GD
Host Security Linux Rootkits
Host Security Linux host integrity Chat with Romain
Software development Web applications
Software development Secure coding http:/
Know your enemy Underground economy
Know your enemy Common security vulnerabilities and exploitation techniques Chat with Romain
Know your enemy Network traffic capture and live tampering Chat with Romain
Know your enemy Automating exploit preparation and attacks Chat with Romain
Security incidents Incident response, roles and procedures Chat with Romain
Security incidents How to contain and resolve incidents Chat with Romain
Security incidents Linux investigation tips and standard forensic techniques Chat with Romain
Edit | Attach | Watch | Print version | History: r7 < r6 < r5 < r4 < r3 | Backlinks | Raw View | WYSIWYG | More topic actions
Topic revision: r7 - 2011-03-08 - MariaALANDESPRADILLO
    • Cern Search Icon Cern Search
    • TWiki Search Icon TWiki Search
    • Google Search Icon Google Search

    ITGT All webs login

This site is powered by the TWiki collaboration platform Powered by PerlCopyright & 2008-2020 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback