![]() |
![]() |
![]() |
|
|
September 5, 2001 [Number 220]
|
|||||||||||||||||||||||||||||||
![]() |
Computer Security Tips for Everyone
Everyone has a responsibility to ensure that our computers and the data they contain are safe. Hopefully, these "security tips " in Interface will help users remain vigilant in safeguarding their dataand create a more secure IT environment at NIH. Today, private and government computer systems are constantly under attackand NIH is no exception. Hacking into computer systems seems to have become an international sport, with attempted break-ins a daily event. Because these attacks pose a constant threat, good security has become a critical element in the IT operations of all organizations. Intrusions & Malicious Software Adapted from the NIH Computer Awareness Training Webpage Intruders employ a variety of techniques to gain unauthorized access. Sophisticated tools are readily available and easy to use, even for the novice hacker. Password crackers use programs that repeatedly attempt to log onto a system by using a series of easily guessed passwords, or by using a dictionary as a source of potential passwords. This approach can be defeated, if users follow the guidelines for password selection and security. Intruders can take advantage of vulnerabilities (such as a configuration error) that grant file access to all users, or make use of "trap doors" originally inserted by system developers to facilitate system maintenance. NIH system administrators are constantly monitoring our computer systems for these types of threats. Network spoofing is a way for an intruder to gain access. An intruder sets up a program to trick a computer system into thinking it is being accessed by an authorized user. When the user attempts to log onto his or her system, the intruder’s program collects the user’s password and returns a message to the user that the system is unavailable. An intruder’s program can collect hundreds of valid passwords. Although NIH system administrators are continually on the lookout for intrusions, everyone should change the password on a regular basis to help protect against this type of intrusion. Trojan horse attacks pose one of the most serious threats to computer security, typically disguising themselves as something harmless. A Trojan horse can cause havoc in a number of ways, including sending itself to everybody on an email address book, erasing or modifying files, and downloading another Trojan horse program that steals passwords. Trojan horses can also, by remotely controlling a computer, perform denial of service attacks. How to Guard Against Intrusion Federal law prohibits the purposeful alteration, modification or falsification of information stored in NIH computer systems. Although these break-in activities are strictly illegal, legal actions can never restore critical information that has been lost. Protection of NIH computer resources is everyone’s responsibility. The following basic steps can help guard against illegal intrusion:
Computer viruses pose a substantial threat to computer system integrity. Viruses are programs that can "infect " other programs, damage hard drives, erase critical information, and take critical systems off-line. Symptoms of an infected system include:
Take Steps to Protect Against VirusesNow Once symptoms of infection appear, it may be too late to save your information. The following steps will help users protect against viruses:
NIH has site-licensed antivirus software downloadable from the Web [http://antivirus.nih.gov]. For information, consult your institute or center’s help desk, Information System Security Officer (ISSO), or TASC. |
![]() |
Published by Center for Information Technology, National Institutes of Health |
Interface Comments |
Accessibility |