News and Views October 1999 |
||||||||||||||||||||
| "I touch the future, I teach." Christa McAuliffe | Vol. II No. II | |||||||||||||||||||
From the Executive Board ChairWe have all been extremely busy since our last issue went out, especially as the end of the fiscal and calendar years approached. The end of the fiscal year brought opportunities to complete current activities in the training area, and for planning (and budgets!) The end of the calendar year closes out a millennium (how many times do you plan to do that?!), and brings along the baggage associated with Y2K activities. In addition to normal training and awareness activities, many of us have been able to influence additional training and awareness for Y2K security related issues, and for critical infrastructure protection initiatives. AWARENESS becomes the watchword now as the century comes to a close and we begin anew with year 2000. Our objective should be to recognize and take action whenever a new opportunity arises where we can be effective with computer/cyber security and information protection awareness messages. Personally, I've been so swamped with work relating to new policy and guidance issuance, participating in the training initiative I mentioned in the last newsletter, and overseeing the Department's computer incident response team (DOE/CIAC) that there's hardly time to do anything else, and meetings usually eat up the rest of the time available. The training initiative at the Department of Energy is underway. The first sessions were held at Headquarters the week of October 4 for NT and Unix systems administrators; web server and e-mail administrators; and for managers. After these sessions are completed, we take the training to the field where we will be delivering training and awareness to about 1000 participants by the end of this calendar year. After that, we will embark on Phase II of the plan to deliver training to the rest of the DOE community over the next several years, all of this being dependent upon favorable budgets and backing from the highest management at the Department. As I get feedback from the training assessment forms I should be able to put together an overall assessment of the effectiveness of our training, and also develop additional needs for future training. This will be made available as a lesson learned paper or presentation at our conference in March. It's been difficult for all FISSEA board members to find the time for the volunteer activities that keep our organization going, and I express my appreciation and gratitude for the work being done by the newsletter editor, the contributors of articles, and especially to Peggy Himes at NIST without whom this newsletter and many other things would not get accomplished. The conference committee has also been working hard and carrying out their activities to provide you with a great conference next March, and I appreciate their effort to keep moving ahead even when I could not participate in some of the planning sessions. We will be issuing another newsletter prior to the March conference, and certainly will appreciate any and all submissions. Those who have completed study and passed the Certified Information Systems Security Professional examination, and those who continue to study for the next exam, are to be applauded (see Pauline's article). Primarily, becoming a CISSP at this time provides you with a certain amount of pride and accomplishment. In the near future the CISSP designation will be more meaningful as the computer security/information protection profession becomes more widely recognized as a job specialty. What better way is there to prepare you as a computer security trainer, or manager of that function, than to be knowledgeable in so many different domains in this area? Go for it! In closing, I wish you all a happy and safe winter, and hope your holiday seasons are peaceful! Philip L. Sibert, CISSPOffice of the Chief Information Officer U. S. Department of Energy
CISSP UpdateBy Pauline BowenAfter the 1999 FISSEA Conference, a self-help study group was formed to aid members in studying for the CISSP exam (basic information is available at http://www.isc2.org). Approximately 10-13 individuals have been showing up at the Alexandria, VA, meeting place, each Saturday (except for holiday weekends) from 1-3pm, since March 21, 1999. Participants take turns presenting the chapters, sharing ideas, test materials (when available) and providing encouragement and inspiration. Though domain eight is about to be wrapped-up, to review previous chapters and catch new people up on the various domains, we also spend some time on old material. A list serve has been created so that anyone interested may join in the group, on-line. The web site is: http://www.onelist.com/subscribe/CISSPStudy_1. We currently have 104 members on the list serve and of these, 8-15 participate in the Saturday study group. Many members in the group are planning to take the November 14, 1999-exam. Since others will not be able to take this exam, NEW GROUP MEMBERS ARE ALWAYS WELCOME! People invest their time and energy, but the study group does not cost any money. The idea is to help each other understand the ten security domains, share experiences, motivate each other, and demonstrate our knowledge by passing the CISSP exam. If you run out of time during the week, you can still sleep in and read enough to participate on Saturday afternoon. Should you be unable to attend one session just come the following week and you won't get far behind. E-Mails will be exchanged with any
interested people and assistance provided to other self-help study
groups. Here is the web site for the 1999 handbook which we plan to
use as primary resource information in our study group:
It gives us pride to announce that as of May 12, 1999, four of the study group participants have passed the exam and received their CISSP. Two of these individuals are still participating and sharing expertise with those who have not yet taken the exam.
Call for FISSEA Conference ExhibitsFISSEA will host its 13th Annual Conference on March 14- 16, 2000 at the Gaithersburg Hilton.The highlight on Wednesday, March 15 (the middle day of this three-day event), will be the Technology Exposition. The purpose of the exposition is to bring government and industry together. In the past, attendees have enjoyed seeing new products hands-on and learning about emerging technologies. This time, there will be opportunities for exhibitors to sponsor a morning break and a luncheon that will be held in the exhibit area. If you would like to exhibit or would like to recommend a company/product for the exhibition, please contact Liz Hood at The Federal Business Council, (301) 206-2940 ext.227 or e-mail liz@fbcdb.com. Your feedback is greatly appreciated!
Editor's Column: Travel Based TrainingBy Louis M NumkinI propose that the acronym for Computer Security is "CS" which should also stand for Common Sense. This somewhat clever phrase needs something to make it a teaching point. So, I usually relate how while doing a survey of computer security implementation in our organization, I found an employee who wanted to help herself meet the requirement to change her password every 60-days. To do so, she had taken a Government- issued cardboard-backed three month wall calendar for the upcoming year and dutifully written her planned passwords every 60-days, thereon. The teaching point, of course, is to not write down one's password and if done, don't put it where others can casually observe, especially in advance of its use. The segue is that the rest of this article will deal with common sense computer security awareness observed in an analogous situation. For two weeks, I have been on travel for my agency. The first week, spent inspecting a facility, and this week presenting computer security awareness training to personnel in different locations around the country. So, you ask, what can be learned from business travel that might be worth sharing with FISSEA? Always be prepared, CS, carpe diem (seize the day), include appropriate humor, teach the newbies, people watching, and crossword puzzles. During the inspection, I found that the computer security training device which the facility employed was ten years old. This in itself would not be of concern except it included out of date information. Checking further, I determined that they had begun drafting a replacement manual months ago, but that the effort was overtaken by events and had been placed on the back burner. Needless to say, noting it in my inspection report returned it to a position of prominence on their "To be done" list. The moral to this story is that just routinely presenting computer security awareness training year after year leads to out of date information being passed on to the audience. We should try to keep it interesting as well as educational by populating it with current events and appropriate happenings. And remember, as was apparent in this case, "Security is not costly . . . but Procrastination is." Carpe Diem (seize the day) - yesterday, while meeting with some of our far-flung employees, we had to drive for over an hour to our all-day work sight. On the trip out we discussed the purpose and plan for the day ahead. But, on the way back, since no earlier opportunity availed itself, I pulled out my trusty laptop and provided the carload with their computer security awareness training. Though I was unable to project my slides onto a screen as earlier in the week it was presented to larger audiences, with passenger approval, I depleted some of the laptop's battery while offering this captive audience the mandatory periodic presentation. In the Army it was called "hip pocket training" (when Sergeants carried already-prepared lesson plans "in their hip pockets" for unexpected opportunities to educate personnel). Now, we could simply say that as educators, we need to seize any chance to provide further computer security education. Punch it up! After seeing many different renditions of the safety briefing given by flight attendants at the start of a flight, I have found that the vast majority of passengers do not pay attention. It has become so mundane and repetitive that few even look up from their reading . . . that is, unless you fly (and I have no stock in this company) Southwest Airlines. Their attitude is to be less stuffy and rehearsed - as their uniforms are nonconformists, so to they include good- natured humor in their briefing which causes passengers to take notice. Now, I know that explaining what to do in the event of an emergency is not to be taken lightly, but - Injecting something unusual (eg.: stories, jokes, tangential but related material or even using audience members to exemplify subject matter) will benefit your efforts to enliven your sessions, gain and hold your audience' attention, and give them something to remember. Teaching the newbies, as a topic, comes from a pleasant interchange I had while awaiting a connecting flight to DC, from St. Louis. Quite unexpectedly, the young lady sitting next to me was, as she said, "fresh off the farm." She was moving to DC to work with the State Department, having just graduated from Peperdine. After chatting for a short while, it became apparent to me just how much personal information we had shared. This causes me to recommend that when giving new employees their computer security in-brief, be sure to include information about Social Engineering - and of course, this form of intelligence gathering can also be carried out by a listener (someone who is sitting nearby and overhearing another's conversation). "People watching" is what one does (when they have no newspaper and don't want to pull out their office work) while sitting in an airport terminal. There are so many different types of folks passing through, some "dressed to the nines" and others in tee shirts and cut offs; some carrying offspring and others barely able to move themselves and their baggage; some downing what appears to be their last (and certainly most expensive) meal while others hang out in the nearest bar to their departure gate. It's the carry-on luggage which comes to mind, here. Remember to educate your employees about laptop theft. It is still occurring and costing the Government and industry valuable equipment as well as the data stored, thereon. Especially include any incidents directly related to such occurrences in your agency, and real stories tend to make more impact. When I fly, I enjoy trying my hand/mind at the airplane magazine's crossword puzzle. However, my bane is flying at the end of the month when someone has already marked answers in ahead of me . . . and they're in ink! On the chance that I can't find a virgin copy, I proofread what has been done before. If I find an error, then I whip out my trusty whiteout and set to correcting the unknown prior's misteak . . . or is that mestake. Anyway, the final point to make is that when you have to educate someone who comes to your agency/organization from somewhere else, you sometimes have to modify their preconceived notions about computer security - how serious "you versus they" take it, what you feel is important versus what they feel is unnecessary - etc. Policies, procedures, and awareness may help you to solve this puzzle.
FISSEA Members Invited to CSI GalaJohn O'Leary and Pam Salaway of the Computer Security Institute (CSI) warmly invite their FISSEA friends to join them for food and beverages at the CSI NovemberFest on Sunday evening, November 14th from 4:00-8:00pm at the Marriott Wardman Park in Washington, DC. NovemberFest is the kick-off event for CSI's 26th Annual Computer Security Conference and Exhibition which runs in the same hotel from November 15-17. More than 150 vendors of computer security products/services will be looking to meet you but you are sincerely requested to stop by the CSI booth and say hello to John and Pam, who have been longtime attendees, presenters, and supporters at FISSEA Conferences. Admission to the NovemberFest (on Sunday) and the Sunday-Tuesday exhibits will be complimentary though pre-registration is recommended via CSI's web site at http://www.gocsi.com or by calling CSI at 415/905-2626.
Join FISSEAMembership is open to information systems security professionals, trainers, educators, and managers who are responsible for information systems security training programs in federal agencies. Contractors of these agencies and faculty members of accredited educational institutions are also welcome. There are no membership fees; all that is required is a willingness to share your products, information, and experiences. Send an e-mail to peggy.himes@nist.gov.
FISSEA Web Page HitsMark Wilson informed the FISSEA Executive Board that Patrick O'Reilly, FISSEA's Web Administrator, has captured the hits per month on the FISSEA web site since it went online in January 1998. The following numbers reflect hits on the homepage, not including hits on any of the subsequent pages (e.g., Newsletters, About FISSEA, FISSEA Executive Board, etc.) 1999: 1,895 hits (through August)
{Thanks for the info, Mark and Patrick. Ed.}
Security Educational Material Resource OnlineICSA's Mich Kabay, PhD, forwarded this worthwhile E- mail:
This web site began approximately one year ago by the students of the Information System Security program at Algonquin College, Ottawa Ontario. This is a one year certification program that covers all the materials that are tested for the CISSP certification. You could say that it is an all-encompassing course of study, touching on all aspects of security. But enough about the course of a program at Algonquin . . . The web site features more than 10,000 hand-picked links, articles, FAQs, tutorials and materials to assist the students of the Information System Security program and as well to any other security professional seeking to acquire knowledge on a specific area of interest in the security field. The web page is set up in a manner similar to a 'Security Officers' dream home page. All links to the most important sources of information are available directly off the main index page. Suffice to say that this web site is the security officers equivalent to Disneyland, in that it is not possible in one day to fully explore and drill through all the material that can be found on this web site. Fortunately, the editors at Yahoo, Excite, Hotbot, DMOZ, About.com and other significant search engines have stumbled on this web site and have ranked it on par with COAST, CERT etc. for the valuable source of educational security materials contained on it. The test of the pudding would be to visit yourself to determine if this web site is worthy of inclusion in your mailings. Best wishes,
Book Review:
|
||||||||||||||||||||
| In closing, we would like to invite our readers to submit items
for inclusion in our next issue of FISSEA News and Views. Please
E-Mail lmn@nrc.gov with
submissions, thoughts, or suggestions. Remember, this is our
communication source, and everyone benefits from what each of us has
learned along the way.
Thanks, Louis |
![]()
Back to FISSEA Homepage
Back to Newsletter Index
Back to CSRC Homepage
Please send comments or suggestions to
webmaster-csrc@nist.gov.
Last Modified: July 25, 2001.