laptop security sirt it security roundtable harvard townsend it security officer [email protected] may 2,...

26
Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer [email protected] May 2, 2008

Upload: london-bramblett

Post on 29-Mar-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

Laptop SecuritySIRT IT Security Roundtable

Harvard TownsendIT Security [email protected] 2, 2008

Page 2: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

Laptops are risky business…

2

Page 3: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

Agenda

Physical security Protection while traveling Information security Recording identification information Tracking and Recovery software Wireless security

Public WiFi hotspots Home wireless VPN service

Useful freeware tools demo’d throughout USB thumb drive security 3

Page 4: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

4

Physical Security – Theft Prevention

Never leave unsecured laptop unattended Lock your doors (reshall room, apt., office) Lock it in a cabinet Use a locking security cable

Room/office Hotel room Public locations Conferences, training sessions Cost $15-$50, combination or key lock

Use strong password on all accounts

Page 5: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

5

Traveling

Don’t let it out of your sight when you travel Be particularly watchful at airport security

checkpoints Always take it in your carry-on luggage

Never put it in checked luggage Use a nondescript carrying case Be careful when you take a nap in the airport Don’t leave it in view in your vehicle

Don’t trust the trunk - remember the quick release lever inside the vehicle?

Page 6: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

6

Information Security DON’T store confidential data on mobile

devices If you must, encrypt it

Whole-disk encryption best File or folder encryption reasonable Demo TrueCrypt (open source, Win/Linux/Mac –

http://www.truecrypt.org ) Beware of managing encryption keys Work with temporary copies on the laptop – keep

original file(s) on secure server Backup data regularly

Imaging is a lovely tool Diligently manage the security of the device

(patches, antivirus software, firewalls, etc.)

Page 7: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

Finding Confidential Data

Don’t assume you don’t have any confidential data on your laptop

“Spider” from Cornell useful for finding confidential datahttp://www.cit.cornell.edu/security/tools

Searches files for SSNs and credit card numbers

Lots of false-positives but still very useful

7

Page 8: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

Preventing Recovery of Deleted Files

Deleted files easily recovered Even after you empty the Recycle Bin

“Eraser” freeware tool to securely delete files (http://www.heidi.ie/eraser/) “Erase” Recycle Bin “Erase” a file instead of delete it “Erase” free space on hard drive “Erase” a USB flash drive

“Media Sanitization” when disposing media8

Page 9: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

Record Identification Information

Record make, model, serial number Take pictures of it Label it with ownership and contact info

Engrave cover Tamper-proof asset tag Write on it with permanent marker Distinctive symbols, art

Record network “MAC addresses”9

Page 10: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

10

How To Find Your MAC AddressIn Microsoft Windows XP/Vista

Get a Command Prompt window Select Start, then Run, then type cmd.exe

In the command prompt window, typeipconfig /all

Look for the “Physical Address”, which is the MAC address

For other operating systems, seehttp://www-dcn.fnal.gov/DCG-Docs/mac/index.html

Page 11: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

11

MAC address

Page 12: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

12

Tracking & Recovery Software

If stolen, the computer contacts the company who traces it and contacts law enforcement to recover it

Computrace LoJack for Laptops from Absolute Software (www.absolute.com) is an example

Pre-installed in BIOS on many laptops Dell HP

Have to buy the license to activate Costs about $30-$50 per year

Page 13: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

13

Wireless Safety

K-State, home, hotels, public “hot spots” Rule of thumb – FEAR WIRELESS! K-State information:

http://www.k-state.edu/infotech/networks/wireless/

General wireless security:http://www.onguardonline.gov/wireless.html

Wireless terminology:http://www.onguardonline.gov/wireless.html#glossary

Page 14: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

14

Wireless Safety

Use encryption WEP (weak) WPA (strong -

coming to campus soon)

VPN

Don’t work with sensitive data in public hot spot

Page 15: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

15

Wireless Safety

Securing wireless at homehttp://www.k-state.edu/infotech/news/tuesday/archive/2006/10-24.html#sectip

Use strongest encryption possible – WPA2 Restrict access to specific computers by

MAC address Change default settings

Admin password for configuration interface SSID Do not broadcast SSID

Page 16: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

16

Default SSID

No Encryption

Page 17: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

17

Default SSID

Default SSID

StrongEncryption

WeakEncryption (WEP)

Page 18: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

18

Page 19: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

19

Page 20: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

20

Virtual Private Network (VPN)

Encrypts all network traffic between your computer and the K-State border

Makes your computer appear to be on campus to get access to restricted resources

Does NOT necessarily encrypt everything that goes to the Internet (“split tunneling”)

Also does not encrypt traffic on campus

Page 21: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

21

Page 22: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

22

Virtual Private Network (VPN)

Must install “VPN Client” software Information and software available at:

http://www.k-state.edu/infotech/networks/vpn/

Cannot use it on campus yet (to secure your wireless, for example); will be able to soon.

If can get to Internet but not K-State, modify the “Transport” configuration: Enable Transparent Tunneling IPSec over TCP

Page 23: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

23Disconnected Connected

Page 24: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

USB Flash Drive Security

No confidential data! Too easy to lose, easy target of theft

Don’t use it as a backup device “Erase” files so they aren’t recoverable Encrypt files on it with TrueCrypt or - Encrypted USB flash drives

Ironkey very popular - https://www.ironkey.com/

View demo?

24

Page 25: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

25

More Information…

K-State’s “Mobile Device Security Guidelines:http://www.k-state.edu/infotech/security/mobile.html

Page 26: Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer harv@ksu.edu May 2, 2008

What’s on your mind?

26