Title: Computer Security Beyond the Serpentine Walls
1Computer Security Beyond the Serpentine Walls
- New Horizons Conference
- May 23rd, 2007
- Shirley Payne Marty Peterman
- UVa IT Security and Policy Office
2Agenda
- Vulnerabilities and Risks
- Tips and tools before you go
- Device Requirements on the road
- Checklist
- QA throughout
3Serious Security Vulnerabilities
- Out of date software
- Lack of effective anti-virus and anti-spyware
software
- Weak security settings on browsers
- Weak passwords
- Software firewalls not activated
4Serious Security Vulnerabilities - continued
- Unencrypted sensitive data
- Use of unsecured wireless
- Use of improperly maintained public computers
- Unattended mobile devices and electronic media
5Risk of Exploited Vulnerabilities Can Vary With
Location
- University provides
- More Secure Network that prevents certain
attacks
- Automatically updated software
- Encrypted wireless network (cavalier
jefferson)
- Encrypted wired connection to email, home
directory, and other services
6Contrast to.
7Or...
8Vulnerabilities Increase the Risk of
- Mobile devices being stolen
- Computer being rendered unusable by virus or
worm
- Private data being captured by stealth,
keylogging software
- Sensitive data being copied, modified or deleted
by or exposed to unauthorized individual
9Risk To Sensitive Data Is Huge!
- A total of 1.9 billion reported compromised
records from 1980-2006¹
- Trend is toward
- More sophisticated criminal attacks
- Increasing of incidents where motive is exploit
of personal data for profit
- However, there are many steps individuals can
take to prevent such attacks
¹Source Phil Howard Kris Erickson, University
of Washington study, March 12, 2007
10Before You Go, Secure Your System
- Configure operating system, browser, word
processing and other software to automatically
update.
- Obtain free anti-virus and anti-spyware software
for office and home computers. Configure for
automatic update and regular device scans.
- Set security settings in browser to medium-high
or high
11Before You Go, Secure Your System - continued
- Properly configure the firewall
- Use strong passwords
- Tips for securing systems - http//www.itc.virgini
a.edu/security/device-requirements.html
12Before You Go, Secure Your Data
- Delete or de-identify non-essential sensitive
data
- Common sense tips - http//www.itc.virginia.edu/se
curity/
- Examples of legally protected data
-http//www.itc.virginia.edu/security/
- Tool - Spider will search for hard drive data
appearing to be SSNs or credit card s -
https//www.itc.virginia.edu/security/identityfind
er
13Before You Go, Secure Your Data - continued
- Encrypt sensitive data that cannot be removed
- Encryption Guidance - http//www.itc.virginia.edu/
security/mobile/encryption.html
- Create data backup and store in safe place
14Before You Go, Prep for Secure Remote Access
- Install UVA-Anywhere to enable
- Remote use of the Home Directory Service
- Access to UVa-licensed online databases, news
resources, and software
- Encrypted data transmission
- Access to UVa Email server without
reconfiguration
- Tips and tool - http//www.itc.virginia.edu/networ
k/vpn/
15Off You Go!
16When On The Road,
- Be wireless wary. Prevent unintentional
connections to untrustworthy wireless networks
- Disable file and print sharing
- Device Requirements - http//www.itc.virginia.edu/
security/
17When On The Road,
- Never key passwords or other sensitive
information into public computers that may not be
properly secured. Hidden software that captures
every keystroke may be installed. - Keep mobile devices and electronic media with you
at all times or under lock and key
- Call UVa if you suspect or know your password or
sensitive data have been stolen or otherwise
compromised
18Checklist
- Software up to date
- Anti-virus and anti-spyware software installed
- Strong security settings on browser
- Strong passwords
- Software firewall activated
19Checklist - continued
- Sensitive data purged or encrypted
- Data backup stored in safe
- Got UVa-Anywhere
- Choosing wireless networks carefully
- Steering clear of improperly maintained public
computers
- Watching mobile devices and electronic media like
a hawk
20IT Security and Policy Office it-spo_at_virginia.edu