Health & Safety

October 10, 2013

Be more vigilant: Protect passwords, government systems

Brandice J. O’Brien
Tinker Public Affairs

TINKER AIR FORCE BASE, Okla.  – In an era when identities can be easily stolen and networks compromised, Air Force Sustainment Center officials are urging its network users to be more careful. By adhering to two requests, the number of attempted hacker intrusions and virus downloads can be drastically reduced.

Officials stress that network users should never plug non-government USB devices including cell phones and MP3 chargers into the system. Also, if user names and passwords must be sent via email, send them in separate and encrypted messages. That way if someone does hack into a message, he doesn’t have both the user name and the password. Air Force systems include the Air Force Portal, My Pay, Thrift Savings Plan and the Employee Benefits Information System.

“USB devices can easily spread malicious logic,” said Staff Sgt. Ryan Gebert, 78th Air Base Wing Network Security noncommissioned officer in charge.

Prinston Wilson, 72nd ABW/SC Information Assurance officer who also handles network violations and credential disclosures, agreed.

“We pick up a lot of things on our cell phones. If you’re using your phone as a flash drive and saving to it, and it picks up a virus; once it gets into our system it work its way up,” Mr. Wilson said. “Credential disclosures have become a growing problem. Hackers can do a lot with your information. They can take your social security number, job history and personal data, put the data together and use it to gain access into other systems.”

In August, there were 12 reported AFSC violations, three for USB incidents and nine for account credential disclosures, or ACDs.

Mr. Wilson said oftentimes a credential disclosure occurs when a user is in a rush and sends their list of user IDs and passwords unencrypted through email to their personal email address. When these user IDs and passwords are sent unencrypted, they can easily be picked up by hackers and used to gain unauthorized access to government systems.

“Usually people keep the same password for a lot of systems and when hackers find out one password, they can figure out access into other systems,” he said.

If a USB violation or credential disclosure is found on a government system, the account is disabled and only a commander – colonel or above – can unlock the account. The commander will also have to fill out a memo explaining the incident and actions that were taken.

“USB violations have been reduced dramatically over the past eight months due to Group Policy Object capability being implemented,” said Ryan Moorman, AFSC Logistics Portal Content manager at Wright-Patterson Air Force Base, Ohio. “Robins Air Force Base, Ga., implemented this capability first and has had no USB violations since.”

The GPO capability is a policy that forces a computer to block a driver from being loaded when a flash device is plugged in. The driver is the necessary component that lets an operating system and flash drive communicate. Without a driver, a computer won’t read a USB, Mr. Moorman said.

“There is no steady trend of ACDs based off the statistics of the past six months, however due to the sudden rise in August, leadership looked to create awareness on the issues across the center,” Mr. Moorman said.




All of this week's top headlines to your email every Friday.


 
 

 
(U.S. Air Force photo/Senior Airman Brett Clashman)

“Solicit help; don’t hide”

Over the years, the term “Wingman” has evolved in the Air Force. The traditional military definition of a Wingman refers to the pattern in which fighter jets fly. There is always a lead aircraft and another which flies off ...
 
 

Adaptability a ‘must’ in today’s Air Force

LUKE AIR FORCE BASE, Ariz. – Three years ago, I entered the Air Force as a general dentist. After completing four challenging years of dental school, I was eager to serve in the Air Force and use my newly developed skills to provide quality care to Airmen. What I quickly came to realize was the misconception that...
 
 

Local Briefs July 18, 2014

355th FW to hold active shooter training exercise July 29, 7 p.m. The 355th Fighter Wing will be conducting an active shooter training exercise starting at approximately 7 p.m. local, Tuesday, July 29. Multiple facilities and locations on base will be affected, but the overall impact to normal operations will be minimal for those who...
 

 
PilotForADay_pict3

Pilot for a Day: Trevor Pahl

. D-M firefighters help Trevor Pahl spray a fire truck. D-M has been supporting the Pilot for a Day program, which was designed to focus on children who have serious or chronic health conditions, for more than 10 years. Airman ...
 
 

Existing tools help users reduce PII breaches

JOINT BASE SAN ANTONIO-LACKLAND, Texas (AFNS) – Members of 24th Air Force are refurbishing an old email tool to help Air Force users reduce breaches of personally identifiable information, or PII. The Digital Signature Enforcement Tool, or DSET, which currently prompts users to provide a digital signature when an email contains an active hyperlink or attachment,...
 
 
Loft_pict

The Loft: a way to connect, serve, grow

Are you looking for a way to connect, serve, and grow? Come visit the DMAFB Airman’s Ministry Center, more commonly known as “The Loft!”  The Loft is a center for DM single airmen located on the second floor of building ...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin