SANS II: The 1993 World Conference on System Adminstration, Networking, and Security - Technical Program

SANS II: The 1993 World Conference on System Adminstration, Networking, and Security - Technical Program

Post by Carolyn Ca » Thu, 11 Mar 1993 04:03:09



       ************************************************

                           SANS II
                The 1993 World Conference On
        System Administration, Networking, and Security

            Detailed Technical Conference Program

                        Washington, D.C.
                       April 18-23, 1993

Courses: April 18-20
Technical Conference: April 21-23

301-229-1062
S...@FEDUNIX.ORG

Sponsors:

The USENIX Association
SAGE (The System Administrators Guild)
FedUNIX
The Open Systems Conference Board

       *************************************************

SANS is designed to provide practical guidance that can be put to
work immediately upon your return to the office.  The invited and
submitted papers shown below were designed to maximize the value
of every minute you spend at the conference.

Registration information is attached at the end of this message.
===============================================================

Wednesday, April 21 - Track I.
8:30 a.m. to 5:00 p.m.

Part 1. Management and Ask The Experts (Morning)

"The Manager's Perspective: Looking At System Administrators
Through The Site Manager's Eyes and Managing The Manager"  
Bill Howell, University Of North Carolina  (90 Minutes)

     The manager's job is to manage, motivate, and lead
     system administrators. What makes that job especially
     difficult?  What have experienced managers learned?
     And what can the system administrator do to manage the
     manager so that the team works together effectively.

Ask The Experts - I - "System Administration"
Rob Kolstad, BSDI, Bjorn Satdeva, sys/admin, and Elizabeth
Zwicky, SRI
(90 minutes)

     An opportunity to get your system administration
     questions answered, to learn from questions and answers
     asked by others.  Most questions will be gathered in
     advance of the conference by polling all who register,
     but there will also be time for some questions asked at
     the session.  This will be a fast-paced session aimed
     at providing answers that will have wide applicability.

Part 2. System Administration

"Three Great PERL Tools" Tom Christiansen
(60 minutes)

     Covering PERL tools that have not been previously
     published. Probably plum, c2ph, and possibly pxref or
     ssl.  

"Implementing a Redundant, Centralized Mail Server", Michael E.
Winslett,  Systems Programmer/Administrator, Department Of
Computer Science, University of North Carolina
(30 minutes)

     The benefits of centralized mail services are well
     known,  particularly the ability to read from any
     machine, but there are also drawbacks.  This paper
     shows how one organization managed to provide the
     advantages while addressing some of the most serious
     disadvantages. It shows how to modify sendmail and
     create the necessary infrastructure.

"The Newest Version Of fdist"  
Bjorn Satdeva /sys/admin, inc.
(45 minutes)

     The fdist program has undergone a major cleanup and new
     features have been added.  Hear about what it can do
     now from the author.

Part 3: Microsoft

"Microsoft Windows/NT: Systems Management Innovations"  Mark
Ryland, Senior Architectural Engineer, Microsoft,
(75 minutes)

     As PC operating systems evolve to run sophisticated
     servers and symmetric multi-processor machines, today's
     UNIX system administrator is likely to be called on to
     manage those systems in addition to the ones they now
     administer.  This session provides an early look inside
     Windows/NT, the operating system many believe will be a
     tough competitor to UNIX.

=================================================================
Wednesday, April 21, Track II

Part 1.  Security In Large Systems

"Guarding The Fortress: Efficient Methods To Monitor Security On
300+ Systems", Michele D. Crabb, Computer Science Corp., NASA
Ames Research Center
(45 minutes)

     Keeping a watchful eye on several hundred workstations
     of differing architectures can be a security
     administrator's never-ending nightmare.  This paper
     presents an overview of how system security is
     currently maintained on a 300+ system at NASA
     supporting over 1500 users on 6 different
     architectures.  It covers the policies, the training,
     and the monitoring and checking tools.  The tools are
     freely available to other sites.

"Designing Network Security for an Open Research Environment: The
3 Level Approach of NASA Lewis Research Center" Tony Facca
(45 minutes)

     This paper shows how one organization balanced the
     competing forces of research users who wanted and
     needed easy access and the requirements for security
     and integrity required in an organization like NASA.
     The approach was one of evolution covering three
     levels: (1) using existing tools for a multi-vendor
     environment, (2) authentication and authorization, and
     (3) real-time compliance.

"Computer Security Stories: Lessons to Learn"   Matt Bishop,
Professor, Dartmouth
(45 minutes)

     An introduction to the security challenges often faced
     by UNIX managers. These anecdotes illustrate common
     security problems and how they happened.  Also some
     techniques to use to avoid them. Includes the famous
     Internet Worm.

"Post Mortem Of An Intruder Incident" and "An Introduction To The
Guide for Writing Site Security Policy - RFC 1244" Randy
Marchany, Virginia Tech Computing Center
(45 minutes)

     In December 1991, a direct intruder attack was
     discovered.  Fifteen machines in three departments were
     compromised.  This paper chronicles the event and
     provides recommendations for future prevention.  It
     also includes a brief introduction to "The Guide for
     Writing Site Security Policy" which is a product of the
     Internet Engineering Task Force covering issues,
     procedures, and recommendations for incident handling.
     It is not, however, a cookbook.

Part 2. Security Techniques

"Internet Firewalls: An Overview" Marcus Ranum, Senior Scientist,
Trusted Information Systems
(60 minutes)

     Increasing numbers of companies are connecting to the
     Internet, with "firewalls" between their private
     networks for protection against system crackers and
     industrial spies. Many of these firewalls are ad hoc
     constructions developed locally, while others are
     commercial or consulting products. This paper describes
     and categorizes some of the types of firewalls in use,
     and provides an overview of the risks and benefits of
     various approaches to Internet security.

"Questing For Network Security Nirvana in a Not-So-Secure World"
Ken Zolot, Principal, Geer Zolot Associates
(30 minutes)

     Trends and challenges facing financial service
     organizations that need authentication.  Sample topics:
     Co-evolution of technological and political issues, how
     to simultaneously increase openness and security of a
     network, graceful scaling-up of security systems, plus
     several more.

"UNIX Security vs. Mainframe Security: What's Missing?", Carla
Fitzgerald, Director Of Open Systems Programs, Computer
Associates, Int'l.
(45 minutes)

     UNIX computers are being selected by more than 70 per
     cent of large companies for downsizing some of their
     important applications.  But information systems
     managers often delay the move because of concerns about
     UNIX security.  This paper provides a close look at
     what mainframe security managers need to see in UNIX
     security in order to feel comfortable, and shows one
     way the major UNIX systems vendors, led by HP and Sun,
     are meeting the needs.

Part 3: Ask The Experts

Ask the Experts - II - "Networking and Security", Rob Kolstad,
Bjorn Satdeva, Matt Bishop
(60 minutes)

     An opportunity to get your networking and security
     questions answered, to learn from questions and answers
     asked by others.  Most questions will be gathered in
     advance of the conference by polling all who register,
     but there will also be time for some questions asked at
     the session.  This will be a fast-paced session aimed
     at providing answers that will have wide applicability.

=================================================================

Wednesday Birds Of A Feather Sessions
6:00 to 10:00 P.M.
(Preliminary List. If you would like to suggest other BOFs,
please email us at S...@FEDUNIX.ORG)

     "My User Stories Are Better Than Your User Stories"

     "Horror Stories"

     "Government Users BOF"

=================================================================

Thursday, April 22
8:30 a.m. to 5:00 p.m.

Track I

Part 1. Network Management and Related Issues

"Homebrew Network Monitoring: A Prelude To Network Management",
Mike Schulze,  Curtin University of Technology, Perth, West
Australia
(45 minutes)

     Few network management tools have achieved satisfactory
     price/performance for organizations with small budgets.
     This paper looks at network monitoring as a lead-up to
     the management scenario.  It describes tools that allow
     examination and visualization of network communication
     through an intuitive graphical user interface.

"Administration Of Large Distributed UNIX LANs with BONES"
J. Schonwalder and H. Langendorfer, Institute for Operating
Systems and Computer Networks, TU Braunschweig, Germany
(30 Minutes)

     BONES provides a central storage of administrative
     information about large UNIX LANs. Configuration files are
     generated and distributed to the hosts using the SNMP
     protocol. The paper presents the architecture of BONES,
     discusses the object-oriented data model used and compares
     BONES with related work.

"INED: An Application-Independent Network Editor"
J. Schonwalder and H. Langendorfer, Institute for Operating
Systems and Computer Networks, TU Braunschweig, Germany
(30 Minutes)

     An application-independent network editor that can be used
     both to document networks
...

read more »