An official website of the United States government
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

ARTICLE SEARCH

Cyber Security Awareness

  • Published
  • By Senior Airman Samantha Krolikowski
  • 92nd Air Refueling Wing, Public Affairs
Everybody plays an important role in maintaining the security of the network and the information on it, in order to ensure cyber security, especially to protect Personally Identifiable Information and Privacy Act Information.

Cyber security is defending the confidentiality, integrity, availability and accountability of information on the network. Every user needs to be aware when on the network.

"Users can accomplish this by ensuring their emails are sent correctly," said Airman 1st Class Nicholas J. Leggett, 92nd Communication Squadron assistant wing Information Assurance manager.

To correctly send an e-mail containing PII, like putting For Official Use Only, (FOUO), in the subject line, have the Privacy Act statement at the beginning of the letter and sign and encrypt the email with credentials, said Leggett. Access should only be granted to authorized personnel with a Need to Know.

"Users play an important part in maintaining the security of the network and the information on it," said Leggett. "Following rules and guidelines outlined in the Network User Agreement that all users sign is a good start."

Each organization on Fairchild has an Information Assurance Officer. All suspicious activity should be reported to these individuals. Users should also have the virus reporting procedures checklist, which outlines how to avoid and fix viruses.

"Scan all removable media and don't plug personal devices into the government's network," said Leggett. "Beware of phishing, be suspicious of emails and calls coming from unknown sources. Report any suspected viruses or phishing attempts to your IAOs. Don't share usernames/passwords, and remove your Common Access Card to lock your workstation when leaving your work area."

Viruses can be prevented by not downloading any suspicious looking content.

If someone believes they have a virus, they should unplug their computer from the network, but make sure to leave it on, said Leggett.

To make sure that computers are fighting viruses, each member should make sure that their systems, applications and anti- virus software are always up to date.

For further information on Cyber Security Awareness, contact Airman 1st Class Nicholas J. Leggett at 509-247-1034.

According to Pennsylvania State University, the top ten security myths about mobile devices are the following:

1. "Brand new devices are safe." - False, new devices need updated anti-virus software.

2. Passwords are annoying. - True, but just a standard password/PIN will secure information from the everyday thief.

3. "The system is secure." - False, no operating system is 100% secure, even Apple.

4. "I won't have issues I know what I'm doing."-False, you can be a victim of a sophisticated targeted attack.

5. My phone is trustworthy. -False, smart phones are computers. Online banking on a phone without proper encryption and anti- virus software is just like using an unprotected computer.

6. Criminals aren't interested in me. - False, cybercriminals receive data in large batches from multiple devices affected in an attack.

7. "Carriers and manufacturers offer protection."-True, however there is only so much that they can do, and have to do, legally speaking. The manufacturer can provide software updates but does not have to provide software updates to fix security holes.

8. "All Wi-Fi is safe."- False, wary of any unprotected network and only consider those secured with a password. That is still a possible avenue for attack. The Wi-Fi in the local Starbucks is secured with a password, but that doesn't mean that everyone connected to it is a legitimate user. Use VPN when connected to an untrusted Wi-Fi network.

9. "All apps can be trusted." -False, malware attached to working apps is increasing exponentially.

10. Everyone is who they say they are- It's nice that Macy's sends reminders to pay bills before they're over due. But paying over the phone is one of the most common phishing routines.