Laptop Security Harvard Townsend IT Security Officer

advertisement
Laptop Security
SIRT IT Security Roundtable
Harvard Townsend
IT Security Officer
harv@ksu.edu
May 2, 2008
Laptops are risky business…
2
Agenda






Physical security
Protection while traveling
Information security
Recording identification information
Tracking and Recovery software
Wireless security





Public WiFi hotspots
Home wireless
VPN service
Useful freeware tools demo’d throughout
USB thumb drive security
3
Physical Security – Theft
Prevention




Never leave unsecured laptop unattended
Lock your doors (reshall room, apt., office)
Lock it in a cabinet
Use a locking security cable






Room/office
Hotel room
Public locations
Conferences, training sessions
Cost $15-$50, combination or key lock
Use strong password on all accounts
4
Traveling



Don’t let it out of your sight when you travel
Be particularly watchful at airport security
checkpoints
Always take it in your carry-on luggage




Never put it in checked luggage
Use a nondescript carrying case
Be careful when you take a nap in the airport
Don’t leave it in view in your vehicle

Don’t trust the trunk - remember the quick
release lever inside the vehicle?
5
Information Security


DON’T store confidential data on mobile
devices
If you must, encrypt it






Beware of managing encryption keys
Work with temporary copies on the laptop – keep
original file(s) on secure server
Backup data regularly


Whole-disk encryption best
File or folder encryption reasonable
Demo TrueCrypt (open source, Win/Linux/Mac –
http://www.truecrypt.org )
Imaging is a lovely tool
Diligently manage the security of the device
(patches, antivirus software, firewalls, etc.)
6
Finding Confidential Data




Don’t assume you don’t have any
confidential data on your laptop
“Spider” from Cornell useful for finding
confidential data
http://www.cit.cornell.edu/security/tools
Searches files for SSNs and credit
card numbers
Lots of false-positives but still very
useful
7
Preventing Recovery of
Deleted Files

Deleted files easily recovered


“Eraser” freeware tool to securely delete
files (http://www.heidi.ie/eraser/)





Even after you empty the Recycle Bin
“Erase” Recycle Bin
“Erase” a file instead of delete it
“Erase” free space on hard drive
“Erase” a USB flash drive
“Media Sanitization” when disposing media
8
Record Identification Information



Record make, model, serial number
Take pictures of it
Label it with ownership and contact info





Engrave cover
Tamper-proof asset tag
Write on it with permanent marker
Distinctive symbols, art
Record network “MAC addresses”
9
How To Find Your MAC Address
In Microsoft Windows XP/Vista

Get a Command Prompt window




Select Start, then Run, then type cmd.exe
In the command prompt window, type
ipconfig /all
Look for the “Physical Address”, which is the
MAC address
For other operating systems, see
http://www-dcn.fnal.gov/DCG-Docs/mac/index.html
10
MAC address
11
Tracking & Recovery Software



If stolen, the computer contacts the company
who traces it and contacts law enforcement to
recover it
Computrace LoJack for Laptops from Absolute
Software (www.absolute.com) is an example
Pre-installed in BIOS on many laptops




Dell
HP
Have to buy the license to activate
Costs about $30-$50 per year
12
Wireless Safety



K-State, home, hotels, public “hot spots”
Rule of thumb – FEAR WIRELESS!
K-State information:
http://www.k-state.edu/infotech/networks/wireless/

General wireless security:
http://www.onguardonline.gov/wireless.html

Wireless terminology:
http://www.onguardonline.gov/wireless.html#glossary
13
Wireless Safety

Use encryption




WEP (weak)
WPA (strong coming to campus
soon)
VPN
Don’t work with
sensitive data in
public hot spot
14
Wireless Safety

Securing wireless at home
http://www.k-state.edu/infotech/news/tuesday/archive/2006/10-24.html#sectip



Use strongest encryption possible – WPA2
Restrict access to specific computers by
MAC address
Change default settings



Admin password for configuration interface
SSID
Do not broadcast SSID
15
Default SSID
No Encryption
16
Default SSID
Strong
Encryption
Weak
Encryption (WEP)
Default SSID
17
18
19
Virtual Private Network (VPN)




Encrypts all network traffic between your
computer and the K-State border
Makes your computer appear to be on
campus to get access to restricted
resources
Does NOT necessarily encrypt everything
that goes to the Internet (“split tunneling”)
Also does not encrypt traffic on campus
20
21
Virtual Private Network (VPN)


Must install “VPN Client” software
Information and software available at:
http://www.k-state.edu/infotech/networks/vpn/


Cannot use it on campus yet (to secure your
wireless, for example); will be able to soon.
If can get to Internet but not K-State, modify
the “Transport” configuration:


Enable Transparent Tunneling
IPSec over TCP
22
Disconnected
Connected
23
USB Flash Drive Security

No confidential data!





Too easy to lose, easy target of theft
Don’t use it as a backup device
“Erase” files so they aren’t recoverable
Encrypt files on it with TrueCrypt or Encrypted USB flash drives


Ironkey very popular https://www.ironkey.com/
View demo?
24
More Information…

K-State’s “Mobile Device Security
Guidelines:
http://www.k-state.edu/infotech/security/mobile.html
25
What’s on your mind?
26
Download