Intrusion Prevention System Information
These network based security appliances will be placed into active blocking mode to stop certain attacks from reaching our network. For a list of blocked sites please click the following link: Intrusion Prevention System Information (IPS).
Complimentary Services – Free to all agencies
Network monitoring: The COT Security Administration Branch continually monitors the Kentucky Information Highway network for internal and external threats.
Incident handling: COT Security analysts coordinate responses to and remediation of scans, intrusions or other events on the network.
Resource Access Control Facility (RACF) second level support (Agencies provide their own first level support unless they are consolidated): Mainframe security personnel provide additions, deletions and changes to mainframe user IDs utilizing RACF (Resource Access Control Facility) as the z/OS operating system security software.
Alerts to customers of current threats: The COT Security Administration Branch is constantly researching trends and threats in order to stay informed of security issues on the horizon. The branch is involved in cooperative efforts for preparedness and information sharing with other state and federal government entities.
Enterprise security policies: COT Security analysts assist in the development and maintenance of enterprise policies to provide the latest security best practices and guidelines to our customers.
Vulnerability assessments: The COT Security Administration Branch can assist customers by identifying, quantifying, and prioritizing the vulnerabilities in a system by scanning with automated tools.
Password audits: We perform a quarterly audit for consolidated agencies at no cost. The COT Security Administration Branch performs password audits for agencies by using automated password cracking tools that can identify weak passwords and passwords that do not comply with enterprise standards. This can be useful in ensuring security and integrity through password compliance.
Application security – automatic and manual: COT provides risk assessments to identify weaknesses or vulnerabilities in applications. Interpretations of the assessment findings and assistance in necessary remediation are included in the service.
Infrastructure security consulting: The COT Security Administration Branch provides consulting services to evaluate proposed or existing infrastructure for vulnerabilities and to improve or ensure an adequate security posture.
Disaster recovery services for COT maintained systems: COT coordinates disaster recovery testing of COT-maintained systems.
Computer forensics investigations: Investigation of security incidents can involve computer forensics to aid agencies in securing systems, recovering data, discovering evidence of misuse or enforcing policy.
Firewall and Virtual Private Network (VPN) Services
The Firewall and Virtual Private Network (VPN) services are a fully managed solution for customers interested in an additional layer of security for their network. Firewall services are provided by COT’s Firewall Team and provide access control and standards-based encryption technology as the foundation for secure, high performance, data communications. The Tier I Firewall Service is designed to meet the needs of larger agencies that desire maximum proactive security services. The Tier II Firewall Service is designed to meet the security needs of small to medium sized agencies or to serve as a department firewall behind an agency’s Tier I Firewall.
VPN services are provided by COT Network Operations and can be used to secure communications with remote offices or individual users.