• No results found

Mobile Device Security

N/A
N/A
Protected

Academic year: 2021

Share "Mobile Device Security"

Copied!
27
0
0

Loading.... (view fulltext now)

Full text

(1)

T

SECURITY

SERVICES

Mobile Device Security

Dr. Charles J. Antonelli

Information Technology Security Services School of Information

The University of Michigan June 11,2009

(2)

T

SECURITY

SERVICES

Why we’re here

Discuss best practices in safe use of

mobile devices

Help users self-manage devices

!

HEADLINES?

HAVE YOU THOUGHT ABOUT YOUR

RESEARCH

(3)

T SECURITY SERVICES

Agenda

Motivation

Threats to data

Scanning data

Securing data

Not covered here PDAs

Cell phones

(4)

T

SECURITY

SERVICES

Motivation

•  Protecting the confidentiality, integrity, and availability of an organization’s information assets is not only good business …

… it is required by federal and state laws and by contractual requirements

(5)

T

SECURITY

SERVICES

Recent news items

Date Made Public Name Type # Records

Aug 4, 2008 Arapahoe College, CO Flash drive 15,000

Aug 5, 2008 TSA Laptop 33,000

Aug 7, 2008 Harris County Hospital, TX Flash drive 1,200

Aug 28, 2008 Reynoldsburg, SD Laptop 4,259

Aug 30,2008 RIT Laptop 13,800

Sep 12, 2008 Tennessee State University Flash drive 9,000

Oct 7, 2008 University of North Dakota Laptop 84,000

Nov 9, 2008 Charlottesville, NC 2 laptops 25,000

Nov 24, 2008 Starbucks, Seattle Laptop 97,000

Feb 18, 2009 Rio Grande Food Project, NM Laptop 36,000

Mar 12, 2009 Dezonia Ambulance (Chicago) Laptop 63,000

Apr 13, 2009 Moses Cone Hospital, NC Laptop 14,380

Apr 23, 2009 Oklahoma Dept of Human Services Laptop 1,000,000

Apr 29, 2009 Oklahoma Housing Finance Agency Laptop 225,000

(6)

T SECURITY SERVICES

Threats to data

•  Type of data   Research   Patient

  Human subject (IRB)   Administrative   Proprietary   Contractual   Confidential •  Threats   Compromise   Corruption   Loss of device   Theft of device

  Theft of data (by malware)   Loss of encryption key

  Import/export/use restrictions on encryption Fundamental threats Loss of confidentiality Loss of integrity Loss of availability

(7)

T

SECURITY

SERVICES

Scanning data

•  Scan data at rest (in permanent storage)

•  Freely available tools

  SENF http://www.utexas.edu/its/products/senf/ http://senf.security.utexas.edu/wiki/SenfReadme http://www.colorado.edu/its/docs/security/privatedata/ senfuse.html •  Cornell Spider http://www2.cit.cornell.edu/security/tools/

•  Pattern matching ASCII data

(8)

T

SECURITY

SERVICES

Scanning data

•  These tools can detect some sensitive data but cannot prove its absence

  False positives

 Unrelated data

  False negatives

(9)

T

SECURITY

SERVICES

Securing data

•  Secure data at rest (in permanent storage)

  Encryption

•  Secure data in transit (moving through a network)

  Encryption

•  Secure the mobile device

  Physical security

(10)

T

SECURITY

SERVICES

Securing data at rest

Data in permanent storage

  Disk, tape, flash, CD/DVD

Standards-based solutions:

  Strong encryption

 Accept no substitutes

  Renders data inaccessible without a digital key

(11)

T

SECURITY

SERVICES

Securing data at rest

•  Free & built-in encryption:

  Windows Vista (Enterprise and Ultimate)  BitLocker

  Windows XP

 Encrypting File System (EFS)

  Mac OS X

 Encrypted disk image (Disk Utility)  FileVault

  Linux

(12)

TECHNOLOGY

SECURITY

SERVICES

BitLocker

Windows Vista

•  Encrypts all data on drive

•  System-selected recovery password

  Store it in a safe place

•  Use conditions

  Requires special hardware in the laptop   Requires two disk partitions

 Otherwise use Encrypting File System (EFS)   While enabling or disabling, can access disk

  Encrypts everything on the disk  Files, directories, registry, …

(13)

TECHNOLOGY

SECURITY

SERVICES

Encrypting File System (EFS)

Windows Vista or XP

•  Encrypts specified folder contents

•  System-selected encryption key

 Store it in a safe place •  Use conditions

  When enabling/disabling, can’t access volume

  Encrypted files and directories shown in green

(14)

TECHNOLOGY

SECURITY

SERVICES

FileVault

Mac OS X

•  Encrypts user home volume contents

•  User-selected master password

  Unlocks all home volumes

  Store it in a safe place

•  Use conditions

  When enabling/disabling, can’t access volume

  Requires free space equal in size to volume

  Does not play well with Sophos AV & TimeMachine

(15)

TECHNOLOGY

SECURITY

SERVICES

Encrypted disk image

Mac OS X

•  Create an encrypted volume

•  User-selected password

  Store it in a safe place

•  Use conditions

(16)

T

SECURITY

SERVICES

Securing data in transit

Data moving through a network

Standards-based solutions:

  Strong encryption

 Accept no substitutes

  Renders network data inaccessible to compromise or corruption without possession of a digital key

(17)

T

SECURITY

SERVICES

Securing data in transit

•  Free encryption

  VPN

 Cisco VPN client (ITCom)

http://www.itcom.itd.umich.edu/vpn/

 Built-in Mac OS X VPN client configuration files

http://www.engin.umich.edu/caen/network/wireless/docs/ macosvpn/

  SSH, SFTP, SCP

 SSH Secure Shell (U-M Blue Disc)

https://www.itcs.umich.edu/bluedisc/

 PuTTY

(18)

T

SECURITY

SERVICES

Securing the mobile device

•  Secure the device

  Lock it up, lock it down, out of sight

•  Secure the data on the device

  Password protect the laptop

  Data encryption

 See “protecting data at rest”

•  Be aware of travel-related restrictions

  Importing/exporting/use of crypto

http://www.research.umich.edu/policies/federal/ export_proc10-23-2008.html

(19)

T

SECURITY

SERVICES

Final Note

(20)

T

SECURITY

SERVICES

Demonstrations

(21)

TECHNOLOGY

SECURITY

SERVICES

Flash encryption demo

Lexar Secure II Jump Drive

Encrypted container on the flash drive

Software on flash drive encrypts and

decrypts data in the container on the fly

User-supplied password

  Store it in a safe place

Excellent documentation:

http://www.safecomputing.umich.edu/tools/download/ securityshorts_encrypt_thumbdrive.pdf

(22)

TECHNOLOGY

SECURITY

SERVICES

BitLocker demo

Windows Vista

• 

Control Panel | BitLocker Drive Encryption

Select Turn on BitLocker

  Initialize TPM (if necessary)

  Save recovery password  Make multiple copies

  Turn on disk encryption & reboot

Excellent documentation:

http://www.safecomputing.umich.edu/tools/download/ securityshorts_encrypt_docs_with_Bitlocker.pdf

(23)

TECHNOLOGY

SECURITY

SERVICES

EFS demo

Windows Vista or XP

Select folder or group of folders to be

encrypted

Properties | Advanced

  Check ‘Encrypt contents to secure data’

  Click OK in both dialogs

  Check ‘Apply changes to this folder, subfolders, and files’

Back up file encryption key

(24)

TECHNOLOGY

SECURITY

SERVICES

FileVault demo

Mac OS X

System preferences | Security | FileVault

Set master password if none exists

  Store it in a safe place

Select Turn On FileVault…

Documentation:

http://safecomputing.umich.edu/tools/download/

(25)

TECHNOLOGY

SECURITY

SERVICES

Encrypted disk image demo

Mac OS X

Applications | Utilities | Disk Utility

File | New | Blank Disk Image

Specify 128 or 256-bit AES encryption

Specify other options as usual

  E.g. sparse image

Specify a password when prompted

  Store it in a safe place

(26)

TECHNOLOGY SECURITY SERVICES

VPN demo

All platforms •  Free encryption   VPN

 Cisco VPN client (ITCom)

http://www.itcom.itd.umich.edu/vpn/

 Built-in Mac OS X VPN client configuration files

http://www.engin.umich.edu/caen/network/wireless/docs/ macosvpn/

  SSH, SFTP, SCP

 SSH Secure Shell (U-M Blue Disc)

https://www.itcs.umich.edu/bluedisc/

 PuTTY

(27)

TECHNOLOGY

SECURITY

SERVICES

Scanning demo

Mac OS X

•  SENF (Sensitive Number Finder)

http://www.utexas.edu/its/products/senf/

•  Download and unpack ZIP archive

•  Double-click on SEnF.jar

•  Set preferences

  Root scan path   Set filters

 Allow/deny list

 Minimum # of matches  Max file size

References

Related documents

computer security (COMPUSEC) Measures and controls that ensure confidentiality, integrity, and availability of information system assets including hardware, software, firmware,

Theoretically, the result of this study aimed to measure the effect of using word wall technique toward students’ vocabulary mastery at eight graders of MTs

1. Practice the sequencing and coordination of the Comprehensive Physical Exam of the Adult Patient, focusing only on the systems listed below in this lesson. Identify the

When the Board denied the said motion in its Order dated July 16, 1991, 13 petitioner filed with the Court of Appeals another petition for certiorari, contending that the

13 Click the parallel line with the right mouse button, select Delete on the shortcut menu and press ESC to quit the tool.. 14 Click Parallel Lines (Draft flyout) and activate

Create portraits, drawings of one person, groups of people, people in scenes and even sculptures of people using abilities you will learn about in the class including proportion,

Qatar University shall implement the minimum appropriate set of baseline controls required to ensure the confidentiality, integrity, and availability of QU information

availability and confidentiality of health care information, and protect against reasonably foreseeable threats to the security or integrity of the information... Focus of