[ISN] Comm squadron fights 'cyber' war every day
InfoSec News
isn at c4i.org
Mon May 24 03:20:36 EDT 2004
Forwarded from: William Knowles <wk at c4i.org>
http://www.dcmilitary.com/airforce/beam/9_20/features/29187-1.html
by Mike Campbell
11th Wing Public Affairs
May 21, 2004
The 11th Communications Squadron and the Network Control Center guard
wing computers 24/7 and remain vigilant as malicious computer viruses
and Internet worms continue to attack personal, business and military
computers worldwide.
Contrary to what many might think, September 11 and its aftermath did
not have any significant negative affect on computer security in the
11th Wing, according to Philip Hom, information assurance specialist
with 11th CS.
Mr. Hom says the real threat to wing computers comes from hackers'
ability to develop new and ever-more elusive viruses that can
penetrate even relatively secure and well-monitored networks such as
Bolling's.
"They design viruses that are very well-hidden," he said. "In a couple
of the viruses I've seen, there was no interaction [with the user]
required. The virus just comes on your network and users don't have to
click on anything."
He noted that the last time the Bolling network had to be shut down
because of a virus was the spring of 1999, when the Melissa virus,
which replicated itself through e-mail, emerged from nowhere to
overwhelm commercial, government and military computer systems. Since
then, improved detection techniques and the vigilance of the Air Force
Computer Emergency Response Team have kept Bolling's network free from
major disruptions.
Besides guarding against new viruses by updating and installing
anti-virus "patches" designed to render them harmless throughout the
network, the 11th Wing Information Assurance Flight is constantly
researching new, Internet-based software that may be attractive, but
potentially harmful to users. Some of this software can contain
invisible computer programs called "spyware," which allow the
programs' originators to gain users' personal information after they
unwittingly install the spyware by activating "Trojan Horse" programs
by simply opening attachments.
"Usually it's going to be [free or e-mailed] games that look cool or
funny, and meant more for enjoyment; those tend to be the biggest
culprits," said Staff Sgt. Benjamin Milton, an 11th CS information
assurance specialist. While the user is busy playing the game, the
malicious software imbedded in the game is doing its damage. "Every
time they play it, they install the program," which Sergeant Milton
said can, in some cases, lead to complete "identity theft" of the
user.
With malicious hackers lurking everywhere on the Internet and
unsolicited e-mail and "spam" hitting e-mail inboxes in record
numbers, everyone on base needs to be smart about protecting and
maintaining the security and integrity of the Bolling network
Sergeant Milton said that when it comes to computer security, getting
smart begins with the individual user faithfully locking their
computer every time they leave the keyboard. "That prevents [others]
from being able to tamper with your system when you're gone," he said.
Other basic precautions he suggests are not downloading trial, free or
other online software without going through the workgroup manager to
ensure there is nothing wrong with the software. He also cautions
users that software additions must be thoroughly checked out and
undergo an accreditation process before the software can be authorized
to be installed on a wing computer.
Sergeant Milton emphasized that units' workgroup managers are the
first point of contact for any questions users may have about computer
security.
*==============================================================*
"Communications without intelligence is noise; Intelligence
without communications is irrelevant." Gen Alfred. M. Gray, USMC
----------------------------------------------------------------
C4I.org - Computer Security, & Intelligence - http://www.c4i.org
================================================================
Help C4I.org with a donation: http://www.c4i.org/contribute.html
*==============================================================*
More information about the ISN
mailing list