2019 03 Network Security

Location: Room 1300 — Conrad Grebel University College, 140 Westmount Rd. N. · Waterloo, ON N2L 3G6 (bottom floor, in the hallway that connects the main building to the Chapel-Residence building)
Date: Monday, 11 March 2019
Time: 7:00-9:00PM

We’ve talked about Malware and the importance of Keeping Computers Up To Date, and even just about The Things We Should Fear. But what new hazards are unveiled when you connect two or more computers together? When some of those computers aren’t on your own network? When malusers are out there trying to break into your network? When you’re actually inviting everyone into your network by running servers and services? Should you just outsource everything? Or are there tools available for the Non-Profit SysAdmin to help secure your networks?

We’ll talk about the hazards of running a public network, and go over a list of tools and software.

–Marc Paré & Bob Jonkman


  • Firewalls
    • The most secure firewall: Nipper for Electronic Wire (Old).png
    • Another secure firewall: pfSense
  • Intrusion Detection Software
  • Pen Testing apps

Meeting Notes

Spoke about resources, war stories

  • Proprietary mail systems
    • Errors in implementation, makes mail inaccessible, or sends mail when unwanted.
    • Corporate culture prevents people from speaking of security flaws
  • Bugs in the software
  • Errors in procedures

The Cloud

  • “If the data was in the cloud it would have been safe”
  • What is The Cloud?
    • Somebody manages the servers, still subject to human error
    • But reduces the human interaction that is needed
    • Maybe if everything is run by robots…
      • But that’s not the way Nonprofits operate, engaging people to be more involved
  • Open Source groups want more interaction, so still room for error
    • eg. LibreOffice: Get a professional to manage website? Or keep local group involvement? No to robots
  • Robots have programmers too
    • One more level of abstraction
  • Problems solved?
    • Email spoofing, phishing schemes: Joe Jobs, third-party addressbooks breached
    • Could contact the apparent sender, but that person may not be involved in the message at all

Tour of pfSense

Multiple connections to isolate traffic

This entry was posted in Past Meetings and tagged . Bookmark the permalink.

Leave a Reply