This quarter’s Shield newsletter focuses on one of the foundations of good cyber safety— keeping systems current and patched. Keeping Systems Current How Can I Tell That My System Is Patched? By Sam Adams - Cyber Security Administrator One of the easiest ways to protect your computer from malware is by simply having your computer patched and up-to-date. Most operating systems have processes in place to make sure this is done automatically and even tools that can identify any vulnerabilities in your system that may need to be patched. In the James Bond movie, Tomorrow Never Dies, one of the villain’s henchmen reports that as planned, their software will be sold to the public full of bugs so the users will have to pay to upgrade in two years. In the real world, software bugs aren’t added to increase revenue, they’re present because little human mistakes in logic can accumulate into big programming glitches that allow the skilled attacker unintended access to data or programs. Software companies have moved from denying problems exist with their applications to refining their products before they reach the market. They now react quickly to programming errors by releasing revised versions of the errant codes in their programs so end users can patch them. Bad Guys and Bugs Since the beginning of computer programing, some users for fun or malice have tried to find ways to exploit buggy code to bend a program to their wills. Today’s hackers exploit computer bugs to make millions using data stolen from users’ bank accounts and credit cards. They can carry out nationally-sponsored cyber-attacks against critical infrastructure targets like power generating plants or power transmission and distribution control systems. Cyber criminals even Why should you care? The “bad guys” have come up with increasingly more creative ways to attack and exploit the vulnerabilities of your system. Coupling that with an always-on Internet connection, your computer has a greater chance of being infected. With new security flaws in common applications being discovered every day, it is important to stay current with security updates designed to patch those security holes. If you are unsure of where to start, it is always a safe bet to have Automatic Updates enabled. Automatic Updates will automatically download and/or install critical updates to your computer. In the Windows Update site, you can also install less critical patches that the Automatic Updates do not cover. You can find these options by accessing the Control Panel (Windows) or System Preferences (Mac) and clicking the Security Center (Windows) and Software Update (Mac). There is a free tool offered by Microsoft, called Microsoft Baseline Security Analyzer (MSBA) that scans your Windows operating system, identifies any vulnerability the system may have and provides solutions to correct them. Continued on page 3 Keeping Systems Current—continued from page 1 sell each other ways to exploit program flaws on illicit web sites. Cyber criminals command top dollar for flaws unknown to the software developers. Malicious programming that takes advantage of these obscure flaws is called a zero-day attack, named because software companies have zero days to prepare software patches to combat them. Zero-day attacks allow cyber criminals to install their software for weeks or months before their attacks are detected and patched. In response, some software companies now offer bounties for turning in zero-day bugs, hoping to entice the software bug hunters away from the dark side of coding these attacks. Rather than rely on employees to install their own patches, businesses have automated ways of receiving and installing patches to operating systems like Microsoft Windows, Apple OS X, and Linux, and major programs like Microsoft Office. These patches are delivered at least once a month and distributed via the corporate network. That way, any computers connected to a business network will keep their software up-to-date with the latest patches. Consequently, users should turn on seldom used computers to ensure that these patches are installed. The challenge for mobile computer users is to insure that their laptops are back in the office often enough to be patched so they aren’t attacked when outside the company network. Home users should also be aware of the general monthly schedule followed by software vendors. Microsoft releases patches on the second Tuesday of every month, via a service called Windows Update. Apple OS X Macintoshes use a service called Software Update that can check weekly for patches. Linux distributions all have the same kind of updating service. Other software vendors may announce their patches via email, but no one ever distributes software bug fixes via email, since it is so easy for cyber crooks to disguise malicious software as a bug fix. MSRT is your friend The Microsoft MSRT (Malicious Software Removal Tool) is a monthly patch for Windows that removes malicious software (malware). Introduced in 2005, the MSRT has been highly successful in combating computer viruses and Trojan horses. It is available for all currently supported versions of Windows. While not intended to replace anti-virus products that keep malware from infecting a PC, it does fill a gap in detecting and removing some types of malicious software that Microsoft believes are widespread. If MSRT detects malicious software it quietly removes it. The next time someone logs into the computer as the computer administrator, a balloon notification will appear to tell the computer administrator that malicious software has been removed. Third Party Patches Software manufactured by someone other than the operating system vendor is called “third party” software. Examples of third party software include Adobe Reader, Adobe Flash, and various distributors of Java. Third party products usually depend on either voluntary patching where an update program tells a user a patch is available. Users frequently ignore these updates. A list of frequently exploited third-party programs as compiled by the computer security company Secunia is shown below. According to Secunia, the average PC user in the USA has 73 programs installed with 28 from Microsoft and the remaining 45 from third party vendors. Secunia has a list of the top ten vulnerable programs, of which only one is part of Microsoft Windows. Microsoft XML Core Services Sun Java JRE 1.6.x/6.x Adobe AIR 2.x Apple QuickTime 7.x Adobe AIR 3.x Adobe Flash Player 11.x Oracle Java JRE SE 1.7.x/7.x Adobe Reader X 10.x Adobe Shockwave Player 11.x VLC Media Player 2.x Check your PC to see if any of these are installed and then patch them. “How Can I Tell That My System Is Patched?” Keeping Windows security software current In addition to checking a variety of security software settings, the Windows Security Center application and the Windows Action Center can help home users see if Windows Update is properly working and that your computers antivirus software is installed and updated. This includes the Microsoft Windows Defender, available with Windows 7 and Windows 8 default installations. The Windows Security Center is present in Windows XP SP2 and Windows Vista. Beginning with Windows 7, the Windows Security Center functions were rolled into the Windows Action Center. By default, these applications will present alerts on the task bar when a problem is encountered. Continued from page 1 The tools described above will check for patches associated with the operating system or programs closely associated to the operating system. There are other commonly used applications such as your Internet browser (Google Chrome, Mozilla Firefox, etc.), Java and Flash that could need patches, that these tools would not cover. Typically, these applications will notify you of any updates but there are tools out there that can manage all your applications in a single pane. Patching and updating your computer should not take the place of an anti-virus program. They should be used in tandem to increase the security of your system. Get reputable malware protection from a vendor you trust. If your PC came with an anti-virus product, consider renewing the subscription when it comes due. Or choose from a list of Microsoft partners who provide anti-malware software often for Windows, Macs, and Linux PCs at microsoft.com/ windows/antivirus-partners. Otherwise there are free alternatives for Windows, Mac OS, and Linux. For example, Microsoft Security Essentials offers free real-time protection against malware. Sophos provides a free Mac OS AV product called Sophos for the Mac, and the open source ClamAV can be used for Linux PCs. Windows Security Center The most important rule to remember when keeping your system up-to-date is to not ignore any notifications to patch your system. Patches typically deal with vulnerabilities that are widely known and it is best to take care of it as soon as possible. If you want to learn about how to best secure your computer, there are numerous articles on the Internet about this subject. Sources: Bradley, Tony. "How Can I Keep My Computer Patched and Up To Date?" About.com Internet / Network Security. N.p., n.d. Web. 16 Sept. 2013. Windows Action Center Cyber Security—Our Shared Responsibility Cyber Mobility— Cyber Workforce— Online Safety and Security Training Next Generation Leaders We all enjoy the benefits and convenience that cyberspace provides us as we shop online from home, bank online using our smart phones, or interact with friends through social networks. However, we need to remember that mobile devices have unique security challenges. For one thing, they are easy to misplace, potentially compromising any unencrypted sensitive data or applications stored on the device. How can you protect your mobile device? Use the same tactics you employ on your laptop, plus “wireless protection.” Restrict access to your home wireless network, by only allowing authorized users access to your network. When accessing the Internet from a Wi-Fi hotspot, assume there is no security at all, meaning avoid unfamiliar websites, and sites requiring you to log in. In 2013, you’d be hard pressed to find many people who are truly computer illiterate. Perhaps they can’t program in special languages, but they interact with computers on their cable boxes, gaming systems, phones, in cars, and even on many appliances in our homes. In fact, teenagers starting college in 2013 have always known flat screen televisions and have always been able to read books on electronic screens. Keep your security applications up-to-date. Change any and all preconfigured passwords. Keep the anti-virus software on your mobile device updated. Always use caution when downloading or clicking on unknown links. Download only trusted applications from reputable sources or marketplaces Make sure when you log in to any financial sites, the URL reads "https://", which means the site takes extra measures to help secure your information. Remember, "http://" is not secure. That’s encouraging for the future of cyber security. Kids are growing up with computers and understand security issues as one aspect in their overall technology education. If you feel like you need help in knowing the basics or explaining the concepts to your children, visit the StaySafeOnline web site. It contains age-appropriate resources for understanding cyber security. For the post-secondary learners, the Omaha area has three institutions designated by the National Centers of Academic Excellence in the study of Information Assurance. In Nebraska, the University of Nebraska at Omaha and Bellevue University earned that designation. In Iowa, Iowa State University owns that designation. Finally, if you need help determining what kind of training is available or needed for a cyber security position, the National Institute for Cybersecurity Careers and Studies offers many resources designed with for professional cyber security administrators. Everyone has to play a role in cyber security. Constantly evolving cyber threats require the engagement of the entire nation — from government and law enforcement to the private sector and most importantly, from the public. Cyber Security—Our Shared Responsibility Cyber Crime Critical Infrastructure New Faces on an Old Problem Cyber Protection According to the Federal Communications Commission, theft of digital information has become the most commonly reported fraud, surpassing physical theft. Mobile technology accounts for some of the increase seen in reported fraud. As of 2011, global smartphone shipments exceeded personal computer shipments for the first time in history. Along with more wireless access, more wireless transactions are taking place. Their growing numbers make users targets for traditional security risks (e.g. viruses, spam, Trojans and worms) as well as sophisticated new forms of attacks. Like any kind of mobile device, the use of third-party and wireless networks and short-range networks like Bluetooth introduce additional vulnerabilities that must be mitigated to access the web safely. Wireless connectivity (sometimes advertised as a Wi-Fi hotspot) allows users to by-pass the secure Trusted Internet Connection (TIC) and connect directly to the Internet and other untrusted sources. At OPPD, we take our responsibility to provide electricity to our customers seriously, very seriously. We know how expensive an outage can be for those without power. As recently as 2013, OPPD’s Energy Plaza experienced a blackout along with many downtown Omaha businesses. Energy Plaza employees and downtown workers were unable to work. We understand the cost to business. Only connect to the Internet over secure, passwordprotected networks. Do not click on links or pop -ups, open attachments, or respond to emails from strangers. Do not respond to online requests for Personally Identifiable Information (PII); most organizations – banks, universities, companies, etc. – do not ask for your personal information over the Internet. Password protect all devices that connect to the Internet and user accounts. Limit the amount of personal information you post. Do not post information that would make you vulnerable, such as your address or information about your schedule or routine. If your friend posts information about you, make sure the information is something that you are comfortable sharing with strangers. Take advantage of privacy and security settings. Use site settings to limit the information you share with the general public online. Be wary of strangers and cautious of potentially misleading or false information. At most OPPD locations, employees are seeing more and more regulations, requirements and training involving cyber security. It’s not the latest management fad if that’s what you’re thinking. It’s the result of previous security analyses of our nation’s entire infrastructure. The 2013 outage resulted from an equipment failure, not a security problem. It was accidental. It is those outages caused by premeditated actions and intentional damage we need to improve our protection against. As recently as March of this year the U.S. Director of National Intelligence called the cyber security attacks tops on the list of threats facing the country. According to a classified US Department of Homeland Security (DHS) report, Chinese-linked cyber espionage campaigns targeted 23 US natural gas pipeline operators between December 2011 and June 2012. The companies were targeted through spear phishing attacks. OPPD employees play an instrumental role in the cyber defense for our utility. It’s only a matter of time before some campaign is mounted against the national, regional or local electric grid. Following the prescribed security standards helps us keep our defense solid. North American Electric Reliability Corporation (NERC) Quarterly Update OPPD’s NERC CIP Cyber Security Policy CIP-003-3 R1 OPPD’s NERC CIP Cyber Security Policy represents OPPD’s commitment and ability to secure NERC CIP related assets and cyber assets. As required by NERC, OPPD’s NERC CIP Cyber Security identifies OPPD’s responsibilities pertaining to security and compliance actions in relation to the following NERC CIP Requirements: Cyber Security - Critical Cyber Asset Identification, CIP-002 Cyber Security – Security Management Controls, CIP-003 Cyber Security – Personnel and Training, CIP-004 Cyber Security – Electronic Security Perimeter(s), CIP-005 Cyber Security – Physical Security of Critical Cyber Assets, CIP-006 Cyber Security – Systems Security Management, CIP-007 Cyber Security – Incident Reporting and Response Planning, CIP-008 Cyber Security – Recovery Plans for Critical Cyber Assets, CIP-009 OPPD employees and contractors with authorized NERC CIP Access can locate a hard copy of the OPPD NERC CIP Cyber Security Policy in or around NERC CIP Physical Security Perimeters. For OPPD employees, the OPPD NERC CIP Cyber Security Policy is located on the Cyber Infrastructure webpage page of the OPPD intranet. Finally, all OPPD authorized personnel who have completed the required annual NERC CIP Security Training are required view and adhere to all requirements identified within the OPPD NERC CIP Cyber Security Policy. OPPD’s NERC CIP Cyber Security Policy is annually reviewed and approved by OPPD’s Vice President of Energy Delivery and Chief Compliance Officer, Mr. Mohamad I. Doghman. OPPD’s Reliability Compliance Department recommends that all OPPD employees and OPPD contractors with authorized NERC CIP Access be familiar with this policy and to reference the policy for any questions or concerns there may be relation to OPPD NERC CIP assets and cyber assets. References: North American Electric Reliability Corporation (NERC) – Cyber Infrastructure Protection (CIP) Standards: http://www.nerc.com/ pa/Stand/Pages/CIPStandards.aspx Midwest Reliability Organization: http://www.midwestreliability.org/ If you have any questions or require any additional information regarding this subject please contact Michael Nickels – OPPD Reliability Compliance Specialist, manickels@oppd.com.