Air Force

August 1, 2014

Existing tools help users reduce PII breaches

1st Lt. Meredith Hein
JB San Antonio-Lackland, Texas

New buttons will show up on Outlook e-mails as part of the new Digital Signature Enforcement Tool roll out. DSET helps users protect personally identifiable information by flagging possible PII in e-mails and attachments.

 
Members of 24th Air Force are refurbishing an old e-mail tool to help Air Force users reduce breaches of personally identifiable information.

The Digital Signature Enforcement Tool, which currently prompts users to provide a digital signature when an e-mail contains an active hyperlink or attachment, is being reconfigured to scan e-mails and attachments for PII. DSET was first introduced to Outlook in 2009 by the Air Force Life Cycle Management Center.

“DSET was originally designed to mitigate risk from socially-engineered e-mail or phishing attacks. Now, it provides some protection of messages transmitting PII,” said Alonzo Pugh, cyber business system analyst for 24th AF. “The tool provides awareness for users of risks before the e-mail leaves the workstation, giving users the chance to correct the identified risk.”

PII includes items such as an individual’s social security number, driver’s license information and financial information. Breaches occur when this information is inadvertently released. User awareness is one of the biggest issues associated with PII breaches, according to Pugh.

“When users release PII that is not protected, that puts information at risk for being intercepted by adversaries. These adversaries can then use that information to target users to gain access the network,” said Pugh. “Air Force network users must do their due diligence when sending an e-mail containing PII. They need to make sure the information is protected.”

DSET capability should encourage users to be more involved in the process of preventing PII breaches, said Pugh. “The user is afforded the ability to take action in checking their e-mails to make sure they are not inadvertently releasing PII, and given the opportunity to protect it. DSET makes users more aware that they need to double check their e-mails and ensure that they are in accordance with policy; the responsibility for preventing breaches ultimately falls on them.”

The tool itself is straightforward to use, said Pugh, and will give users simple prompts to follow in sending e-mails. In addition, there is a function allowing information which was falsely identified as PII to still be sent.

“While our software solution will support the Air Force’s efforts to reduce PII breaches, it is still important for personnel to be aware and vigilant with their handling of documents containing PII,” said Col. Eric Oliver, 24th AF director of cyber systems.

The tool’s new usage is still in its initial stage, focusing on social security numbers. Developers hope that DSET will ultimately be able to scan for a variety of PII to prevent future breaches.

“It is imperative that we protect one another as we move each Air Force mission forward,” said Maj. Gen. J. Kevin McLaughlin, 24th Air Force commander. “Avoiding the release of PII is part of being a good wingman, but it is also part of protecting the network and accomplishing the Air Force mission.”

In preparation for the release of DSET, you can access training for the new tool using the following link https://afpki.lackland.af.mil/assets/files/OE-15-40-064_QRG-DSET_v0001.pdf.

Additional training on how to encrypt Microsoft Office documents can be accessed at www.24af.af.mil/shared/media/document/AFD-140701-064.pdf.

Users have multiple tools at their disposal to protect PII if encrypting e-mail is not feasible, but if electronic transmission of sensitive PII is operationally required, users can leverage approved Department of Defense file exchange services at https://safe.amrdec.army.mil/safe/.




All of this week's top headlines to your email every Friday.


 
 

 

News Briefs April 24, 2015

“Edwards Got Talent” contest April 24 Edwards Family Advocacy will hold an “Edwards Got Talent” competition at the Oasis Community Center April 24. The show starts at 5:30 p.m. and will end at 7:30 p.m. Anyone with access to Edwards AFB and their family members are invited to come and show off their talent! The...
 
 
Courtesy photograph by Liz Jacobson

Ten seconds later and that picture still exists

Courtesy photograph by Liz Jacobson Teenagers may feel a false sense of anonymity and security when using Internet apps, which can lead to an increasing number of teenagers sending inappropriate content. Irresponsible sharing o...
 
 
NASA photograph by Ken Ulbrich

Second X-56A MUTT makes first flight

NASA photograph by Ken Ulbrich NASA researchers are using the X-56A, a low-cost, modular, remotely piloted aerial vehicle, to explore the behavior of lightweight, flexible aircraft structures. Researchers at NASA’s Armstrong ...
 

 
afaf

AFAF campaign extended

Air Force photograph by Rebecca Amber The Edwards Air Force Base 2015 Air Force Assistance Fund Campaign has been extended an additional two weeks to May 15. If you would like to donate, contact your Unit Project Officer. For q...
 
 
Air Force photograph by Samuel King Jr.

An Edwards NCO’s journey to wounded warrior mentorship

Air Force photograph by Samuel King Jr. Tech. Sgt. Ryan Delaney, an Air Force Wounded Warrior mentor, watches Tremayne Maxwell, an Air Force Wounded Warrior athlete, perfect his wheelchair basketball rolling skills during the f...
 
 
Air Force photograph by Jet Fabara

F-22 test squadron recognizes decorated squadron member, Vietnam hero

Air Force photograph by Jet Fabara William Freckleton, 412th Range Squadron lead F-22 range control officer, poses before his F-16D incentive flight April 21. Freckleton is the only decorated Vietnam veteran at the 411th Flight...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>