54
1 New Technology New Threats “ Approved for Army release as a Training and Security Awareness product by CIO/G-6 "

Awareness

Embed Size (px)

Citation preview

Page 1: Awareness

1

New Technology

New Threats

“ Approved for Army release as a Training and Security Awareness product by CIO/G-6 "

Page 2: Awareness

2

New technology poses oses new threats to security!new threats to security!

USB Pen USB Pen DriveDrive

USB Memory USB Memory WatchWatch

Thumb DriveThumb Drive

USB EUSB E--Pen Pen

MiniaturizationMiniaturization

Video Video DevicesDevices

Scanning DevicesScanning Devices

Casio Watch Casio Watch CameraCamera Digital MediaDigital Media

Audio Audio Recorders Recorders with USB with USB

connectivityconnectivity

Page 3: Awareness

3

Dimensions (inches)1/8" x 1-7/16" x 1-11/16"

Readily Available!

InexpensiveInexpensive

Huge Huge Storage Storage CapacityCapacity

Page 4: Awareness

4

Small size - -- - Great impact!

8000 thick books, or8000 thick books, or

= 4,000,000 pages4,000,000 pages

or

or

or

If each page If each page were laid end were laid end to end, it to end, it would extend would extend for 694 milesfor 694 miles

1-7/16”

1-11/16”Less than 1/8“ thick

Page 5: Awareness

5

Just outside the main gate of Just outside the main gate of the huge U.S. military base in the huge U.S. military base in BagramBagram, Afghanistan, , Afghanistan, shopkeepers at a bazaar peddle shopkeepers at a bazaar peddle a range of goods, including a range of goods, including computer drives with sensitive computer drives with sensitive —— even secret information even secret information ——stolen from the base.stolen from the base.

American investigators have paid thousands of dollars to buy back the stolen drives, according to shopkeepers outside the major military base here..

…. By Paul Watson, Los Angeles Times | April 15, 2006 A handful of of memory sticks are displayed by an Associated Press reporter at the bazaar outside the U.S. military base in Bagram. - (Shoaib Amin / AP)

About 2K Afghans are employed as office staff and laborers at the Bagram base

Getting yourself in the News!

Page 6: Awareness

6

…even in Bagram, Afghanistan…even in Bagram, Afghanistan

Thumb drives and media everywhere!

Page 7: Awareness

7

One flash memory drive, sold for $40, holds the One flash memory drive, sold for $40, holds the names, photos and phone numbers of people names, photos and phone numbers of people described as Afghan spiesdescribed as Afghan spies working for the military. working for the military. Other thumb drives have been found to contain:Other thumb drives have been found to contain:……Social Security numbers listed next to the names of Social Security numbers listed next to the names of

hundreds of Soldiershundreds of Soldiers……names of senior Afghan ministers whom US intelligence names of senior Afghan ministers whom US intelligence

agencies believe to be drug smugglersagencies believe to be drug smugglers……list of 12 provincial officials the US reportedly wants list of 12 provincial officials the US reportedly wants

removed from officeremoved from officeOne shopkeeper said, One shopkeeper said, ““They were all stolen from They were all stolen from offices inside the base by the Afghans working offices inside the base by the Afghans working there,there,”” he said. he said. ““I get them all the time.I get them all the time.””

“Convenience Kills” - GEN Schoomaker, CSA

Magnetic Media Kills!- - New technology poses

new threats

Page 8: Awareness

8

1. Computer disc must reflect the highest level of classification contained on the disc

2. Standard labels should be used for all levels of classification - if none available - - make your own.a. SF706 - Top Secretb. SF707 - Secretc. SF708 - Confidentiald. SF709 - Classifiede. SF710 - Unclassifiedf. SF711 - Data Descriptorg. SF712 - Classified SCI

3. No standard form (SF) and/or label(s) exist for Compact Discs (CDs)a. The SF labels prescribed for removable storage media may

be used for the marking of classified CDs and their cases b. Classification must be conspicuously marked on the CD case

and the CD itself4. Personal drives - - must be marked personal!!

Mark it and safeguard it!- - Basic document markings apply to all Basic document markings apply to all

mediamedia

Security Education, Training and Awareness - - Do It!!

AR 380-5 is clear, it is the

users responsibility

to properly control, handle,

mark, and transport

information

FOUO

Page 9: Awareness

9

Take Away’sWhat else do I need to know?

Classify and label removable media IAW regulation and SOPUSB drives and other removable, portable media devices are mostly self starting and may bypass systems security bypass systems security featuresfeatures when plugged in (Example: bypass scanning for viruses)No approved method of sanitizing, downgrading and declassifying these devices - - Destroy when no longer usable USB and other portable devices improve productivity and increase risk increase risk -- --

Know the riskKnow the riskTake action to reduce risk Take action to reduce risk -- mark it, safeguard itmark it, safeguard itReport unauthorized use!Report unauthorized use!

Remember, the lives of your fellow Soldiers Remember, the lives of your fellow Soldiers are in your hands! are in your hands!

Page 10: Awareness

10

Questions and Thoughts?

Page 11: Awareness

11

New Technology

New Threats

“ Approved for Army release as a Training and Security Awareness product by CIO/G-6 "

Page 12: Awareness

Information Assurance Information Assurance Security Awareness Security Awareness

BriefingBriefing

After Slide Show starts, click your mouse or press the Page Down key on your keyboard to continueNote: THIS SLIDE SHOW WAS DONATED TO THE IA COMMUNITY BY:

Strategic Planning & InformationDISA Information Assurance Branch

(SI22)

Page 13: Awareness

OverviewOverview

• What is Information Assurance• General Security Guidance• Protecting Information• Reporting Violations• What can you do?

3

Page 14: Awareness

Are you the Problem or the Solution?Are you the Problem or the Solution?

4

Page 15: Awareness

What is Information Assurance?What is Information Assurance?

Information Assurance is:

“ Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation…providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.”

as defined by the CNSSI 4009, “ National Information Systems Security Glossary,” dated May 2003

5

Page 16: Awareness

What is Information Assurance?What is Information Assurance?

• Making sure the computer and the information is there when we need it (Availability).

• Making sure the information we use, transmit, process, or stored has not been corrupted or adversely manipulated (Integrity).

• Making sure we know who is using our computers and accessing our data (Authentication).

• Making sure the information is protected from disclosure (Confidentiality).

• Making sure the information is ‘tagged’ so when we send it – we know it got there, and the recipient knows who sent it (Nonrepudiation).

6

Page 17: Awareness

So, Why Are You Here?So, Why Are You Here?

7

• DOD policy requires annual information assurance awareness training

• Need to emphasize important security tasks and acceptable user practices

Page 18: Awareness

Your Mission…Should you decide Your Mission…Should you decide to accept it…to accept it…

• Recognize your computing responsibilities.

• Accept responsibility for protecting government information.

• Recognize the challenges and threats that can harm our National Security.

8

Page 19: Awareness

Do you know what “OK” means?Do you know what “OK” means?

When you click “OK” :• You acknowledge that the information system you use is

for “Official Government Use Only.”• Your computer and all of its information are subject to

inspection.• Your actions are subject to continuous audit.

9

Page 20: Awareness

General Workstation SecurityGeneral Workstation Security

10

• Protect your identity (User Id)• Use Strong Passwords

– Make passwords 8 characters or longer • use capital letters, numbers, and punctuation symbols

– Change passwords often• Always Lock your PC while leaving it unattended

– Press Control+ALT+Delete and click the “Lock Workstation” Button

• Use your Common Access Card (CAC) to digitally sign and encrypt your sensitive emails – Take your CAC with you when you leave your work area

You are responsible for the data on your system at all times!

Page 21: Awareness

Prudent Network Security and Prudent Network Security and Internet PracticesInternet Practices

11

• Email and Internet Use– Do not open emails from individuals that you do not recognize

• Report suspicious emails to the DISANet Help Desk and your security manager.

– Incidental personal use is permitted.• DISANet prohibits the use of Email or the Internet for:

• Chain letters• Private commercial activities• Accessing pornographic or gambling sites• Participating in online auction activity• Political Activity• Illegal fraudulent or malicious activities• Any use which reflects adversely on DISA or any other DOD element

• Virus Protection– Avoid attaching media from unfamiliar computing environments.– Ensure your workstation runs a daily virus scan.

“Trust, but Verify”

Page 22: Awareness

What is P2P and What is the Risk?What is P2P and What is the Risk?

• Peer-to-Peer file sharing is technology that allows users to typically share music/video files.

• It is risky! It bypasses security or control mechanisms.

• Opens DOD networks to attacks and intrusions!

12

Page 23: Awareness

What are the Dangers of P2P?What are the Dangers of P2P?

13

• The default settings of P2P applications share all documents and media files on your machine.– This causes the potential for disclosure of sensitive

information.• P2P applications create open doors that may be

remotely exploited to compromise DOD systems.• P2P software puts excessive strain on the

network resources.– This will overwhelm our infrastructure already operating

at 90% capacity.• P2P file exchanges generally violate international

copyright laws.

Page 24: Awareness

What should I do?What should I do?

14

Don’t Use it! • ASD (NII) Memo, Elimination of Unauthorized Peer-to-Peer File Sharing Applications Across DOD, 13 April

2004.

• There are many legal and security issues, and there is no mission essential aspect to P2P applications.

• DO NOT USE P2P software on government assets• Forbidden software includes (but is not limited to):

Napster ARES IRC Chat RelayKazaa Limewire BitTorrentMorpheus Gnutella

Page 25: Awareness

Got Wireless?Got Wireless?

• DOD Directive 8100.2, "Use of Commercial Wireless Devices, Services, and Technologies in the Department of Defense (DOD) Global Information Grid (GIG)," – This directive outlines the DOD wireless policy to

ensure a secure use of wireless technology throughout the agency.

15

Page 26: Awareness

Does this Apply to Me?Does this Apply to Me?

16

• This Policy Applies to all– DOD Personnel, Contractors, and visitors that have access to

DOD Information.– All (government owned/used) commercial wireless devices,

services and technologies including but not limited to:

• Laptops with WiFi• Cellular or PCS Devices• Audio/Video Recorders• Personal Data Assistants

• Messaging Devices• Any other wireless device

capable of storing, processing, or transmitting information

– Receive only pagers

– GPS Receivers

– Hearing Aids, Pace makers, other implanted medical devices or personal life support systems

–The Detection Segment of a PED•The signal between a barcode reader and receiver

•A TV remote and television

– RF Identification Tags (both Active and Passive)

Exempted are:

Page 27: Awareness

What are my Duties?What are my Duties?

17

• Do not process government information on personally owned laptops, PDAs, or cell phones.

• Do not attempt to connect personally owned wireless devices to government networks.

• Turn off camera phones and PDAs with camera modules in classified areas.

• Enable Wired Equivalent Privacy (WEP) on all laptops, PDAs and wireless access points.

• When computers are plugged into the network, disable any wireless cards.

• Enable Encryption on all wireless transmissions

• Turn off wireless devices in classified areas.

Employee Owned EquipmentEmployee Owned Equipment Government Owned EquipmentGovernment Owned Equipment

Never transmit CLASSIFIED data using a wireless device!

Page 28: Awareness

What is Information?What is Information?

18

• Information is: Any knowledge that can be communicated regardless of its physical form or characteristic.

• Information is classified by the degree of damage which would becaused if the information was revealed.

There are 3 levels of classification:– TOP SECRET - unauthorized disclosure could cause exceptionally

grave damage to national security.– SECRET - unauthorized disclosure could cause serious damage to

national security.– CONFIDENTIAL - unauthorized disclosure could cause damage to

national security.

• Sensitive Compartmented Information (SCI):• Requires more stringent security protection.• Protects intelligence sources and methods.

Page 29: Awareness

What is Information? (What is Information? (Con’tCon’t))

• “Controlled Unclassified Information” is the DOD term used to define sensitive information such as:– For Official Use Only (FOUO)– Contract Sensitive– Proprietary

19

Page 30: Awareness

Protection of Computerized Protection of Computerized InformationInformation

• At Rest• In Transit• In Process

20

Page 31: Awareness

Information At RestInformation At RestInformation can be stored on:

Printers with memory

WEB PagesHandheld Devices

Computer Hard Drives

CDs or Floppy Disks

Fax Machines

Backup Tapes

Printed Documents

21DOD treats all media as documents.

Page 32: Awareness

22

This medium is classified

TOP SECRET

PROPERTY OF THE US GOVERNMENTSF 706

This medium is

UNCLASSIFIED

PROPERTY OF THE US GOVERNMENT

SF 710 (1-87)

This med

ium is cla

ssifie

d

CONFIDENTIA

L

PROPERTY OF THE US G

OVERNMENT

SF 708

MARK STORAGE MEDIAMARK STORAGE MEDIAMark computer components and media with:

• SF 710 Unclassified• SF 708 - Confidential• SF 707 - Secret• SF 706 - Top Secret

This medium is

SECRET

PROPERTY OF THE US GOVERNMENT

SF 707

Page 33: Awareness

The Fundamentals of MarkingThe Fundamentals of Marking• Documents must be marked

according to Classification Level or Information Sensitivity.

• Markings must be conspicuous!– Large/Bold lettering – Use no abbreviations

• Classification/sensitivity of documents must “stand out” -either electronically or stamped manually.

• Mark top & bottom of each page.– FOR OFFICIAL USE ONLY (FOUO) is

marked on the bottom of page only– FOUO guidance please visit

https://datahouse.disa.mil/gc/fouo.html

• Paragraph, portion, and title markings may be abbreviated.

– (U) UNCLASSIFIED – (C) CONFIDENTIAL– (S) SECRET– (TS) TOP SECRET

23

OFFICE OF THE SECRETARY OF DEFENSE WASHNGTON ,DC

1. (U) This is an example of a document that contains originally classified information. Standard

a. (U) Portion marking(s) for each section of a document to reflect the classification of theinformation. When using subsections such as shown here, individual markings are used. Whensubsections are not marked, the information is protected at the level of protection shown by the

c. (U) A "Classified by" line that includes the name or personal identifier and Position Of the

If this paragraph contained "Secret" information, the portion would be marked with thedesignation "S" in parentheses. If the paragraph contained "Confidential" information, the portion

b. (U) Overall markings must be CONSPICUOUS AND LARGE/BOLD.

dateMEMORANDUM FOR DASD (I&S)

SUBJECT: Classification Markings (U)

markings are required for all documents as shown here. These markings include:

overall section.

originator.

d. (S) A reason for classification MUST BE USED.

e. (U) A "Declassify on" line that indicates the following:

(1) The date or event for declassification not to exceed 10 years.(2) The date that is 10 years from the date of the original decision.(3) An extension beyond the initial 10 years of classification.(4) An authorized and applicable exemption category( ies).

2. (S)

would be marked with the designation "C" in parentheses.

Classified by : Emmett Paige, Jr .ASD(C31)

Reason: 1.5 (a) and (d) *Declassify on: December 31, xxxx **

SECRET

SECRET

• Sample of paragraph marking

Page 34: Awareness

Marking Your IT EquipmentMarking Your IT Equipment

CLASSIFIED

DISA Form 205“No Classified”

THIS MEDIUM IS CLASSIFIED

SECRETPROPERTY OF THE US GOVERNMENT

Standard Form 707

24Keep ALL labels in clearly identifiable locations.

Page 35: Awareness

Information in TransitInformation in Transit

25

THE INTERNET IS ALWAYS WATCHING

HELLO

Use your Common Access Card (CAC) to:

• Digitally Sign Emails

• Encrypt Emails

• Decrypt Emails

Encrypt Email with CAC

Decrypt Email with CAC

Sign and Encrypt ALL sensitive DOD information!

HELLO

Page 36: Awareness

What’s a Spillage?What’s a Spillage?

26

• It is a form of System Contamination.

• It is the Improper storage, transmission or processing of CLASSIFIED information on an UNCLASSIFIED system or via a communications path.– Most common occurrence is transmission via email.

Page 37: Awareness

Why is Spillage a ‘Why is Spillage a ‘Hot TopicHot Topic?’?’• Can result in denial of service.• Handled incorrectly – can result in costly mistakes.• Agency numbers:

– FY 2002: 27– FY 2003: 21 – FY 2004: 25 (as of 2 Sep 04)

• Resource intensive.– It takes 3 weeks to close a spillage.

• Impacts the security of DOD missions.

27

Page 38: Awareness

Cost of Recovery: 1 IncidentCost of Recovery: 1 Incident

28Activities responsible for incidents will PAY for the cleanup!

Time Spent Researching Compromise 16 hours $ 418.4020 Mailboxes Involved; 15 minutes to Clear Each 5 hours $ 130.75Scrub Operations (first server only) 7 hours $ 366.10Additional Servers Scrubbed 6 hours $ 156.90*Daily Backups Lost 3 $1800.00**Additional Hours 19 hours $ 496.85***

TOTAL $3369.00

* Add .5 hours for each additional server** Tapes cost $65-$85 each (estimate 8 tapes per day)***Trouble Shooting/Additional Measures

Page 39: Awareness

Why is This Happening?Why is This Happening?

• Users are not reading Email completely.• Electronic media is not being marked properly. • File names or subject headers do not reveal

content sensitivity of information.• Rules for “data aggregation”/derivatively

classifying are not well understood.• Individuals are unaware of classification

guides/guidance. • Improper storage, transmission, processing of

classified information.• All DISA personnel are PERSONALLY responsible

for protecting sensitive and classified information.

29Bottom Line: THESE INCIDENTS MUST STOP!

Page 40: Awareness

Processing Classified InformationProcessing Classified Information

• Workstation allowed to process classified information if:– In approved open storage area.– Contains removable hard disk in unsecured area.– Not connected to unclassified Local Area Network/Wide Area

Network.• e.g., DISANet

• Ensure access is controlled.– use approved passwords and change periodically.

• Never transfer information from a classified to an unclassified system without authorization from the Chief Information Officer.

• Never use personally owned computers to process classified information.

30

Page 41: Awareness

Connecting to a CLASSIFIED NetworkConnecting to a CLASSIFIED Network

31

• Workstation must have a removable hard drive– This requirement can be waived if there is a proof of

“Open Storage”• Monitors must face away from any opening

– If this can not be accomplished, an approved privacy screen must be used

• All doors and windows near CLASSIFIED assets must be covered

• CLASSIFIED CPU’s should be at least 3 feet from UNCLASSIFIED CPU’s

Keep CLASSIFIED information from other’s view!

Page 42: Awareness

NEVER Take CLASSIFIED Material HomeNEVER Take CLASSIFIED Material Home

• If you do, you could:– Be subjected to an espionage investigation.– Lose your access or security clearance.– Lose your job.– Be prosecuted pursuant to statute(s).

CLASSIFIED

32

Page 43: Awareness

Safeguarding Safeguarding -- When Not in When Not in Secure StorageSecure Storage

• Keep CLASSIFIED material in your possession at all times until it is either passed to a trusted person or stored in an approved storage container.

• You must be an approved courier when transporting CLASSIFIED material outside of your building.– Ensure material is double-wrapped before leaving building.

• All documents must be properly marked and protected by cover sheets.

• NEVER leave classified information unattended.

33

• NEVER discuss classified information on non-secure telephones.

• NEVER discuss, read, or work with classified information in public places.

Page 44: Awareness

Security ContainersSecurity Containers

• Store and protect classified information in GSA-approved safes.

• Memorize combinations: they are classified and cannot be written down or carried on your person.

• SF 700, “Security Container Information” records emergency contact information of all individuals having access to safe.

34

Page 45: Awareness

DestructionDestruction

35

• Dispose all classified paper, diskettes, and other classified waste in “burn bags.”

• Cross-cut shredding also authorized method of destruction – must be on NSA list of approved shredders.

• TS requires destruction certificates.• Send Hard Drives to NSA:

Attn: CMC – degaussingSuite 368759800 Savage Rd.Ft George Meade, MD 20755

Page 46: Awareness

Reporting Computer Security IncidentsReporting Computer Security Incidents

36

Security Incident• An attempt to exploit a national security system; may involve

fraud, waste, or abuse; compromise of information; loss or damage of property or information; or denial of service. – Security incidents include:

• penetration of computer systems• exploitation of vulnerabilities• introduction of computer viruses or other forms of malicious

code. If an incident occurs:• Gather all pertinent information.

– time, details, person(s) involved, actions taken, etc.• Report it to the computer help desk.• Site administrators should notify NetDefense [DOD-CERT].• If a violation of law is evident or suspected, the incident must also

be reported to both security and law enforcement organizations for appropriate action.

Report ALL Suspicious Activity!!

Page 47: Awareness

Reporting Suspicious ActivitiesReporting Suspicious Activities

• Report suspicious persons or circumstances immediately to your supervisor, Facility Security Manager or the Security Division (MPS6).

• Be alert for: – surveillance attempts.– suspicious persons or activities. – individuals using unauthorized recording devices.

37

Page 48: Awareness

Let’s ReviewLet’s Review

38

Page 49: Awareness

To Improve our Security ProgramTo Improve our Security Program

39

• Be a strong link in the security chain!• Keep passwords safe! Adhere to password standards.• Separate government work from personal activities. • Working from home? Scan your removable media for

viruses when you come back to the office (if you are using your home computer). Keep your government work on government-provided media – don’t leave it on your home hard drive.

• Watch what you upload and download from the INTERNET or where you ‘travel’ on the WEB...your computer activity is subject to monitoring.

• Adhere to DISA email standards.

Page 50: Awareness

To Improve our Security Program (cont.)To Improve our Security Program (cont.)

• Separate classified from unclassified information. Use classification guidance when regrading classified information. Label your diskettes!

• Keep track of your removable media. Store them when not in use.

• Watch your file transmissions! Make sure the files you transfer or the email you send is appropriate for the sensitivity of that network!

• Turn on your screensavers and activate password protection. Keep your files and access to the network safe!

• Report anomalies. Requests for information from unknown sources (foreign countries), destroyed, infected or corrupted files, missing computer hardware, etc. Report this to your Information Assurance Manager and to the Help Desk.

• Traveling with a government computer? Keep track of it!

40

Page 51: Awareness

Conclusion Conclusion

• Strictly follow DOD and DISA security guidance. If you don’t know - ask!

• Contact your Security Manager, Information Assurance Manager (IAM), or the Security Division (MP6) for assistance.

• Pay Attention to Detail. • Be Alert. • Be Aware!

41Security is your responsibility!

Page 52: Awareness

42

We’re Almost Done!We’re Almost Done!

Page 53: Awareness

Do you want credit?Do you want credit?

I certify that I have read and understand the material presented in this slideshow.

I acknowledge that I am responsible for knowing and following the information presented in this guide.

43

Page 54: Awareness

End, IA