Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004
The Troubles We’ve Seen Viruses, Worms, and other Malware I have an interesting issue that I would appreciate any insight you have to offer. This bounced appearing to have been sent from my home account. The issue is that I did not send the and worse, attached to the was a copy of my 2002 tax return …(also included an attachment your_details.zip and a “movie”) The virus spreads by ing some text, a copy of itself, and a randomly selected file from xxxxx’s computer to everyone on xxxxx’s mailing list. In this case the file contained a report about an individual with yyyyy syndrome. The file included the name, date of birth, parents names, evaluation, follow up, and information about medical services for other family members as well.
Viruses, Worms, and Trojans Most common problem is confidential information is shared as attachments Less common – but potentially more damaging – hacker discovers the mother lode
The Mother Lode Welcome to My Nightmares March 2003, Georgia Tech. Stolen name, address, phone number, addresses, and credit card numbers March 2003, University of Texas at Austin – 50,000 names and social security numbers of students, staff, and other January 2003 – University of Kansas- Sevis Datbase – 1,450 foreign students – social security numbers, birth date, passpot number, country of origin
Minimize the Risk Minimize exposure to private information –Remove confidential data – e.g. once your taxes are done back up and remove tax info –Don’t keep shadow copies –Leave system off network when you’re away for extended periods –Beware of public systems Use good Hygiene –Use Antivirus software and keep it updated –Patch often Get regular checkups
Surplused Media February 19, 2004 N&O “…many state computers are not wiped clean of information such as Social Security and bank account numbers before they are offered for public sale. Some of those computers are refurbished by state inmates for use in public schools or other state agencies.” “…many state computers are not wiped clean of information such as Social Security and bank account numbers before they are offered for public sale. Some of those computers are refurbished by state inmates for use in public schools or other state agencies.”
Stolen Media December Computer hard drives storing the private records of 500,000 military personnel and their families were stolen last month from Department of Defense health-care contractor TriWest Healthcare Alliance. UNC Chapel Hill A 01/28/ /22/2003 Computer equipment 13 Laptop computer 26 Desktop computer 19 Computer equipment 13 Laptop computer 26 Desktop computer 19
Minimize Risk Lock down laptops Think about what you store on laptops and PDA’s Wipe all media before disposal
Minimize the Risk (continued) Manage your passwords –Try one for work, one for confidential personal information, one for play –Change your password periodically – and when important life changes happen Think about the media –Should I really put this in ? –What if I lost my PDA? –Can I keep track of my usb drive?