Los Alamos National Laboratory
 
 
News

CONTACTS

Currents banner logo

April 09 Issue - Employee Monthly Magazine

Goal: Implement an information security system that reduces risk while providing exemplary service and productivity

Emergency exercise tests Lab’s IT security

Hourglass graphic

Monique Sanchez and Dale Leschnitzer prepare an emergency exercise. Photo by Richard C. Robinson

It’s any organization’s worst nightmare: a malicious insider infects its operational systems with a worm that diverts funds to a bogus bank account, leaks confidential employee information to outsiders, and then causes a total system shutdown. Far fetched? Not really.

Worms that corrupt databases, exploit default accounts and passwords, create false accounts with far-reaching privileges, and communicate with off-site servers are more common than we’d like to believe, said the Lab’s Information Technology Contingency Planning Coordinator Dale Leschnitzer.

Leschnitzer, whose nickname is “Master of Disaster,” recently led a desktop emergency exercise to safeguard the Lab’s information security and protect the integrity and functionality of its business systems. The National Nuclear Safety Administration requires the exercise annually.

“The Contingency Planning for Business Systems Drill is vital, not just for compliance purposes, but to ensure continuity of business operations in the event of a disaster,” said the Lab’s chief information officer, Thomas Harper.

The exercise allowed participants to build emergency response skills by playing out a fictitious scenario wherein a malicious insider had corrupted the Lab’s Oracle system. Critical services and activities, such as employee payroll, security badging, staff information systems, and accounts payable, were jeopardized.

Monique Sanchez of Emergency Planning and Preparedness coordinated the drill at the Laboratory’s Emergency Operations Center. “We discussed how emergency operations would operate without these important systems,” she said.

The scenario was based on real events, Leschnitzer added. “New Mexico Tech recently had funds diverted to false but legitimate-sounding bank accounts,” he said. “And the City of San Francisco’s network was hijacked for months by a malicious insider.”

About 70 participants and observers from the Associate Directorate for Business Services, Associate Directorate of Engineering, Chief Financial Officer, Information Resource Management, Cyber Security Incident Response Team, Communications and Government Affairs, Emergency Response, Security, Desktop Support, Los Alamos Site Office, National Nuclear Security Administration, and Sandia National Laboratories attended the event.

--Tatjana K. Rosev

Other Headlines



Issues

2009

Aug 09 cover July 09 cover June 09 cover    

August
html | pdf

July
html | pdf

June
html | pdf

   
May 09 cover April 09 cover March 09 cover    

MAY
html | pdf

APR
html | pdf

MAR
html | pdf

 
February 09 cover January 09 cover    

FEB
html | pdf

JAN
html | pdf

 

   

2008

December 08 cover November 08 cover October 08 cover    

DEC
html | pdf

NOV
html | pdf

OCT
html | pdf

   
September 08 cover August 08 cover July 08 cover    

SEP
html | pdf

AUG
html | pdf

JUL
html | pdf

   
June 08 cover MAY 08 cover APR 08 cover    

JUN
html | pdf

MAY
html | pdf

APR
html | pdf

   
MAR 08 cover FEB 08 cover

MAR
html | pdf

FEB
html | pdf

Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA
Inside | © Copyright 2008-09 Los Alamos National Security, LLC All rights reserved | Disclaimer/Privacy | Web Contact