secure your computer now

58
Secure Your Computer Now How to keep your face off the evening news for compromising 98,000 student records Paul Waterstraat Geology Department University of California, Davis

Upload: mia-schultz

Post on 31-Dec-2015

36 views

Category:

Documents


0 download

DESCRIPTION

Secure Your Computer Now. How to keep your face off the evening news for compromising 98,000 student records. Paul Waterstraat Geology Department University of California, Davis. Disclaimer. Secure Your Computer Now. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Secure Your Computer Now

Secure Your Computer Now

How to keep your face off the evening news for compromising

98,000 student recordsPaul Waterstraat

Geology DepartmentUniversity of California, Davis

Page 2: Secure Your Computer Now

Secure Your Computer Now

Warning. This presentation is only a guide containing recommended security settings. It is not meant to replace well-structured policy or sound judgment. Furthermore this guide does not address site-specific configuration issues. Care must be taken when implementing these recommendations to address local operational and policy concerns.

DisclaimerDisclaimer

Page 3: Secure Your Computer Now

UCLA laptop theft exposes ID infoRepresentatives of the University of California, Los Angeles, are warning 145,000 blood donors they could be at risk for identity theft due to a stolen university laptop.

June 10, 2004

UCLA laptop theft exposes ID infoRepresentatives of the University of California, Los Angeles, are warning 145,000 blood donors they could be at risk for identity theft due to a stolen university laptop.

June 10, 2004

Ripped from the headlines...

Boston College reveals alumni data breachBoston College is fighting against an attack on its fund-raising databases, which may have exposed the personal data of more than 100,000 alumni.

March 17, 2005

Boston College reveals alumni data breachBoston College is fighting against an attack on its fund-raising databases, which may have exposed the personal data of more than 100,000 alumni.

March 17, 2005

ChoicePoint data loss may be higher than reportedChoicePoint could have leaked information on far more than 145,000 U.S. citizens, the data collector's latest filing to the Securities and Exchange Commission suggests.

March 10, 2005

ChoicePoint data loss may be higher than reportedChoicePoint could have leaked information on far more than 145,000 U.S. citizens, the data collector's latest filing to the Securities and Exchange Commission suggests.

March 10, 2005

Laptop theft puts data of 98,000 at riskThe University of California, Berkeley, is warning more than 98,000 people that the theft of a laptop from its graduate school admissions office has exposed their personal information.

March 29, 2005

Laptop theft puts data of 98,000 at riskThe University of California, Berkeley, is warning more than 98,000 people that the theft of a laptop from its graduate school admissions office has exposed their personal information.

March 29, 2005

UCD computer hacked into from InternetThe names and Social Security numbers of about 1,100 UC Davis students, faculty, visiting speakers and staff may have been compromised when someone hacked into a main computer in the university’s plant biology section last month.

April 5, 2005

UCD computer hacked into from InternetThe names and Social Security numbers of about 1,100 UC Davis students, faculty, visiting speakers and staff may have been compromised when someone hacked into a main computer in the university’s plant biology section last month.

April 5, 2005

Page 4: Secure Your Computer Now

To help protect against identity theft, California enacted a new law (SB 1386) requiring businesses and government agencies beginning July 1, 2003, to notify consumers if hackers gain entry to computers that contain unencrypted personal information such as credit card numbers, pass codes needed for use of personal accounts, Social Security numbers or driver’s license numbers.

Page 5: Secure Your Computer Now

UC Davis Cyber-Safety Program

I. Purpose and Scope

This policy establishes that devices connected to the UC Davis electronic communications network must meet UC Davis security standards or seek exception authorization. Campus units may develop and implement more rigorous security standards.…

Section 310-022

Policy and Procedure Manual

http://manuals.ucdavis.edu/ppm/310/310-22.htm

Page 6: Secure Your Computer Now

UC Davis Cyber-Safety Program

III. Policy

C. Campus units must annually report to their respective Dean, Vice Chancellor or Vice Provost, the extent to which unit operations are consistent with the campus security standards. Where compliance is not complete, the report must document a compliance plan…

Section 310-022

Policy and Procedure Manual

Page 7: Secure Your Computer Now

UC Davis Computing Standards

•Annual checklist includes14 Standards

✓7 Level 1 Practices: “Highest priority” standards that apply to all computers on the network

✓7 Level II Practices: “Secondary priority” standards, some of which apply to servers or system administrators

http://manuals.ucdavis.edu/ppm/310/310-22a.htm

Your

MissionYour

Mission

Page 8: Secure Your Computer Now

Computing Security Standards

•I-A. Software Patch Updates

Computing hosts connected to the campus network must use an operating system and application software for which the publisher maintains a program to release critical security updates. Campus units must apply all currently available critical security updates within seven calendar days of update release or implement a measure to mitigate the related security vulnerability. Exceptions may be appropriate for patches that compromise the usability of an operating system or application or for patches for which the installation is prohibited by regulation.

Page 9: Secure Your Computer Now

Computing Security Standards

•I-A. Software Patch Updates

Page 10: Secure Your Computer Now

Computing Security Standards

•I-A. Software Patch Updates

Page 11: Secure Your Computer Now

Computing Security Standards

•I-A. Software Patch Updates

Page 12: Secure Your Computer Now

Computing Security Standards

•I-A. Software Patch Updates

Page 13: Secure Your Computer Now

Computing Security Standards

•I-B. Anti-virus software

Anti-virus software must be running and updates must be applied within no more than 24 hours of update release for computing hosts connected to the campus network. This standard applies to computing hosts connected to the campus network which are subject to virus infection. Networked devices subject to virus infection that are unable to use anti-virus software must be protected from malicious network traffic.

Page 14: Secure Your Computer Now

Computing Security Standards

•I-B. Anti-virus software

Page 15: Secure Your Computer Now

Computing Security Standards

•I-B. Anti-virus software

Page 16: Secure Your Computer Now

Computing Security Standards

•I-C. Insecure Network Services

If a computer service/process that provides a computing host access to network services (e.g, Telnet, FTP, POP) is not necessary for the intended purpose or operation of the network-connected device, that service/process shall be disabled. Where inherently insecure network services are needed, their available encrypted equivalents must be used

Page 17: Secure Your Computer Now

Computing Security Standards

•I-C. Insecure Network Services

Page 18: Secure Your Computer Now

Computing Security Standards

•I-C. Insecure Network Services

Page 19: Secure Your Computer Now

Computing Security Standards

•I-D. Authentication

Campus electronic communications service providers must have a suitable process for authenticating users of shared electronic communications services under their control.1) No campus electronic communications service user account shall exist without passwords or other secure authentication system, e.g. biometrics, Smart Cards.

Page 20: Secure Your Computer Now

Computing Security Standards

•I-D. Authentication - Passwords

Page 21: Secure Your Computer Now

Computing Security Standards

•I-D. Authentication - Passwords

Page 22: Secure Your Computer Now

Computing Security Standards

•I-D. Authentication - Passwords

2) Where passwords are used to authenticate users, a password must be configured to enforce password complexity requirements, if such capability exists.

Page 23: Secure Your Computer Now

Computing Security Standards

I-D-2. Password Complexity

Page 24: Secure Your Computer Now

Computing Security Standards

I-D-2. Password Complexity

Mac OS X 10.4 “Tiger” offers a password assistant when setting or changing passwords that can offer suggestions and rate passwords for complexity and strength.

Page 25: Secure Your Computer Now

Computing Security Standards

I-D-2. Password Complexity

Page 26: Secure Your Computer Now

Computing Security Standards

I-D-2. Password Complexity

Page 27: Secure Your Computer Now

Computing Security Standards

•I-D. Authentication - Passwords

3) All default account passwords for network-accessible devices must be modified upon initial use.

Page 28: Secure Your Computer Now

Computing Security Standards

•I-D. Authentication - Passwords

4) Passwords used for privileged access must not be the same as those used for non-privileged access.

Page 29: Secure Your Computer Now

Computing Security Standards

•I-D. Authentication - Passwords

5) All campus devices must use encrypted authentication mechanisms unless an exception has been approved by the appropriate department head or campus administrative official. Unencrypted authentication mechanisms are only as secure as the network upon which they are used. Any network traffic may be surreptitiously monitored, rendering unencrypted authentication mechanisms vulnerable to compromise.

Page 30: Secure Your Computer Now

Campus units must identify departmental computing systems and applications that house personal information (personal name along with Social Security number, California driver identification number, or financial account information). Personal information must be removed from all computers for which it is not required.

Computing Security Standards

•I-E. Personal Information

Note from Paul: Use “Secure Empty Trash!”

Page 31: Secure Your Computer Now

What’s in your computer?

Computing Security Standards

•I-E. Personal Information

Note from Paul: Use “Secure Empty Trash!”

Page 32: Secure Your Computer Now

Computing Security Standards

•I-E. Personal Information

Page 33: Secure Your Computer Now

Computing Security Standards

•I-F. Physical Security

Unauthorized physical access to an unattended computing device can result in harmful or fraudulent modification of data, fraudulent email use, or any number of other potentially dangerous situations. In light of these risks, where possible and appropriate, devices must be configured to “lock” and require a user to re-authenticate if left unattended for more than 20 minutes. Portable storage devices must also not be left unattended and be protected from data theft or unauthorized data modification or deletion.

Page 34: Secure Your Computer Now

Computing Security Standards

•I-F. Physical Security

Page 35: Secure Your Computer Now

Computing Security Standards

•I-F. Physical Security

Page 36: Secure Your Computer Now

Computing Security Standards

•I-F. Physical Security

Page 37: Secure Your Computer Now

Computing Security Standards

•I-F. Physical Security

Page 38: Secure Your Computer Now

Computing Security Standards

•I-F. Physical Security

Page 39: Secure Your Computer Now

Computing Security Standards

•I-F. Physical Security

.... Portable storage devices must also not be left unattended and be protected from data theft or unauthorized data modification or deletion.

Page 40: Secure Your Computer Now

Carjackers swipe biometric Merc, plus owner's fingerA Malaysian businessman has lost a finger to car thieves impatient to get around his Mercedes’ fingerprint security system. Accountant K Kumaran, the BBC reports, had at first been forced to start the S-class Merc, but when the carjackers wanted to start it again without having him along, they chopped off the end of his index finger with a machete.

April 4, 2005

Carjackers swipe biometric Merc, plus owner's fingerA Malaysian businessman has lost a finger to car thieves impatient to get around his Mercedes’ fingerprint security system. Accountant K Kumaran, the BBC reports, had at first been forced to start the S-class Merc, but when the carjackers wanted to start it again without having him along, they chopped off the end of his index finger with a machete.

April 4, 2005

Ripped from the headlines...

Page 41: Secure Your Computer Now

Computing Security Standards

•I-F. Physical Security

Use DiskUtility to create an Encrypted disk image

Page 42: Secure Your Computer Now

Computing Security Standards

•I-F. Physical Security

Use the “i ” info button to show password strength

Page 43: Secure Your Computer Now

Computing Security Standards

•I-G. Firewall Services

Firewall services, whether provided by a network hardware device or through operating system or add-on software, must be restrictively configured to deny all traffic unless expressly permitted.

Page 44: Secure Your Computer Now

Computing Security Standards

•I-G. Firewall Services

Page 45: Secure Your Computer Now

Computing Security Standards

•I-G. Firewall Services

Page 46: Secure Your Computer Now

Computing Security Standards

•I-G. Firewall Services

Page 47: Secure Your Computer Now

Computing Security Standards

•I-G. Firewall Services

Page 48: Secure Your Computer Now

Computing Security Standards

•II-A. No Open E-mail Relays

Devices connected to the campus network must not provide an active SMTP service that allows unauthorized third parties to relay email messages, i.e., to process an e-mail message where neither the sender nor the recipient is a local user

Page 49: Secure Your Computer Now

Computing Security Standards

•II-B. Proxy Services

An unrestricted proxy server for use from non-university locations is not allowed on the campus network. Use of an unauthenticated proxy server is not permitted on the campus network unless approved as an exception to the campus security standards by the appropriate department head or campus administrative official.

Page 50: Secure Your Computer Now

Computing Security Standards

•II-C. Audit Logs

Campus units must develop and implement a policy defining the use, inspection and retention of audit logs.  Audit log inspection may permit the identification of unauthorized access to sensitive electronic communication records. The use of audit logs should be extended to document activities such as account use and the network source of the login, incoming and outgoing network connections, file transfers and transactions.

Page 51: Secure Your Computer Now

Computing Security Standards

•II-D. Backup and Recovery

All critical and sensitive university electronic communication records residing on electronic storage shall be backed up on a regular and frequent basis to separate backup media. The backup media must be protected from unauthorized access and stored in a location that is separate from the originating source. The backup media must be tested on a regular basis to ensure recoverability from the backup media.

Page 52: Secure Your Computer Now

Computing Security Standards

•II-D. Backup and Recovery

Page 53: Secure Your Computer Now

Computing Security Standards

•II-E. Training for Users, Administrators and Managers

A technical training program must be documented and established for all systems staff responsible for security administration. In addition, campus unit administrators and users handling critical and/or sensitive university electronic communication records must receive annual information security awareness program training regarding university policy and proper information handling and controls.

Page 54: Secure Your Computer Now

Computing Security Standards

•II-F. Anti-Spyware Software

The use of programs to identify and remove spyware programs is strongly advised to help to maintain the privacy of personal information and Internet use. The use of an anti-spyware program must be accompanied by installing program updates on regular basis to ensure the ability to detect and remove new spyware or adware programs

Page 55: Secure Your Computer Now

Computing Security Standards

•II-G. Release of Equipment with Electronic Storage

All data must be removed from electronic storage prior to being released or transferred to another party. Data removal must be consistent with physical destruction of the electronic storage device, degaussing of the electronic storage or overwriting of the data at least three times. A “quick” format or file erasure is insufficient.

Page 56: Secure Your Computer Now

Computing Security Standards

•II-G. Release of Equipment with Electronic Storage

Page 57: Secure Your Computer Now

Questions?

Page 58: Secure Your Computer Now