Commentary

May 17, 2012

Cyber Security important at home and the office

Commentary by Capt. Charles Lundine
355th Communications Squadron

Technological advancements utilized in the commercial market continue to gain leverage in the military and in our personal lives. Social networking, mobile electronics, and data availability offer opportunities to communicate more efficiently but pose some risk to the military and common users. With the proper education, device configuration, the latest patches and upgrades, and encryption, users can mitigate most known threats and communicate securely.

Social Networking provides Airmen the ability to communicate with friends, family and co-workers, and stay “connected” with interest groups and communities. Many web sites offer the consumer the ability to customize their page with applications and background data. In some instances these applications can contain malware and may infect a computer. Criminal organizations are shifting to social networking sites to host their malware and may allow users’ computers to be utilized in a “Botnet.” Botnets can be utilized to perform denial of service, spam, spyware, adware, fraud and scareware. With any software, users are encouraged to research the software to ensure it is from a reputable source to minimize risk.

Encryption offers another layer of security allowing users to protect critical or personal information and prevents unauthorized users from accessing and disclosure your data. As directed by the DoD Chief Information Officer all users must encrypt sensitive unclassified data on mobile government computing devices and removable storage media. Senior leaders and personnel who travel frequently with access to sensitive unclassified data on mobile devices/removable storage media are a priority for encryption use. Approved, free and easy-to-use software exists and is available. However, not all encryption software meets the DoD guidance. Please contact your Unit Software License Manager or the 355th CS Client Service Center for additional information about encryption software.

While cyber security is important in your personal life, it is imperative in our day-to-day government operations. All personnel have a critical role in defending our government network.

There are three quick and easy ways to you can protect our network:

– Never use unauthorized Universal Serial Bus devices (thumb drives, MP3 players, cameras and other types of portable flash media).

– Always manually virus scan media that is introduced to your computer.

– Educate one another on all do’s and don’ts in relation to those policies and mandates that are in existence and forthcoming.

For any security related questions, issues or concerns, contact your Unit Information Assurance Officer, Wing IA and/or the Information Protection Office. Another great source of Cyber security information is on the AF Portal in the Cyber tab.




All of this week's top headlines to your email every Friday.


 
 

 
(U.S. Air Force Photo by 2nd Lt. Lacey Roberts)

Arizona Airmen memorialize fallen Iraqi fighter pilot

Members of the Arizona Air National Guard’s 162nd Wing honored the life and memory of Iraqi Air Force Brig. Gen. Rasid Mohammed Sideeq Hasan during a memorial service here July 7. Hasan died June 24 after his F-16 Fighting Fa...
 
 

Deployed A-10s take to the skies

(U.S. Air Force photo by Staff Sgt. Christopher Ruano) An aircraft maintainer assigned to the 354th Expeditionary Fighter Squadron inspects the oil levels of an A-10 Thunderbolt II attack aircraft engine during a theater security package deployment to Lask Air Base, Poland, July 13. The U.S. and Polish air forces will conduct training aimed at...
 
 

Airmen leverage TFI concept

LUKE AIR FORCE BASE, Ariz. – Thirty-eight service members, including individuals from the 944th Civil Engineer Squadron explosive ordnance disposal section, participated in a Battlefield Forensics training course here at the end of June. Together, Senior Master Sgt. Stephen Hunter, 944th Civil Engineer Squadron EOD program manager and Joshua Nason, General Dynamics Information Technology ...
 

 

Celebration and education; Equal Opportunity

  In 1948, Ester Blake became the first enlisted female in the U.S. Air Force, pictures were still black and white, and families gathered around radios for the evening news. Since then, the U.S. Air Force has gone through many changes. The Davis-Monthan Equal Opportunity office specializes in making sure that everyone is treated equally...
 
 
DoD

Final rule puts more teeth into Military Lending Act

  WASHINGTON – The Defense Department today closed loopholes to protect U.S. men and women in uniform from predatory lending practices, President Barack Obama said this morning at the 116th Veterans of Foreign Wars National Convention in Pittsburgh, Pennsylvania. The heightened level of financial and consumer-rights protection against unscrupulous practices, called the final rule of...
 
 

AF continues to work with DOD, OPM on cybersecurity incident

WASHINGTON (AFNS) — The Air Force maintains its commitment to protect personal information from cyber threats by continuing efforts with the Defense Department and the Office of Personnel Management to assist those impacted by the recent cyber incident involving federal background investigation data. OPM and an interagency response team, including investigators from the FBI and...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>