Cybersecurity Awareness Month 2022

October is Cybersecurity Awareness month! The month was originally created by the National Cyber Security Alliance and the Department of Homeland Security. Feel free to check out the events and resources listed below.

Giveaway: Win a $50 UCI Bookstore (“The Hill”) Gift Card!

Complete the quick security quiz and be entered into a drawing for one of three $50 UCI Bookstore (“The Hill”) gift cards! Winners will be picked at random at the end of the October and contacted through email. Participants must have a UCI Gmail account and can only enter in once. You do not have to get all the questions right in order to participate in the drawing and you must be UCI-affiliated to win. Quick Security Quiz Link

Events

Cal-CSIC Presentation – “Education Sector: Back-to-School for Cyber Criminals Too”

Description: The presentation will cover an introduction to Cal-CSIC, the current cyber threat landscape for the education sector for both K-12 and higher education, and go over some current threat trends with a part on mitigation.

Yu Chao is currently a Cyber Threat Warning Analyst with the California Cyber Security Integration Center (Cal-CSIC) embedded with the Los Angeles Joint Regional Intelligence Center (LAJRIC). In addition, he is a Cyber Threat Intelligence (CTI) analyst with the California Army National Guard’s (CAARNG) 171 Cyber Protection Team (CPT). Yu has over 19 years of experience in the military; bringing a wealth of knowledge from assignments focused on Signals Intelligence (SIGINT), all-source fusion analysis at various eschelons, to Emergency Management support through Defense Support of Civilian Operations (DSCA) operations. Yu holds a B.S. in Diplomacy and International Relations from Seton Hall University, and is currently pursuing a Masters In Cybersecurity Engineering at the University of San Diego.

Registration Link

FBI Presentation – “Cyber Threats and Trends in 2022”

Description: The presentation will cover significant cyber activity and trends, threat actors and their motivations, what the FBI’s role is, and ways to protect your business and yourself.

Supervisory Special Agent (SSA) Bryan Willett has been an FBI Special Agent for over 18 years.  He has spent the majority of this time investigating cyber violations and has worked in two FBI field offices and at FBI Headquarters, Cyber Division.  He is a licensed attorney and has earned several IT Security certifications, including the CISSP.  He currently works in the FBI’s LA Field Office where he is the Supervisory Special Agent for FBILA’s Orange County based Cyber Squad.

Registration Link

Data Disposal Day 10-26-22

Date: Wednesday, October 26, 2022

Time: 8:00 AM- 12:00 PM

Location: Parking Lot 12A near the Natural Sciences buildings

Properly disposing of e-waste is an important component of cybersecurity. Improper disposal, donation, or recycling of e-waste may inadvertently disclose sensitive information, which could be exploited by cyber criminals. Each of us is responsible for the security of information assets with which we work. 

Much like e-waste, keeping paper records with sensitive information that no longer need to be maintained under the UC Records Retention Schedule is both a security and privacy risk. Good document hygiene includes shredding unnecessary paper and deleting e-records with sensitive information that is consistent with the UC University Records Management Program (BFB-RMP-1) and the UC Records Retention Schedule.

Southern California Shredding will be on campus to shred both paper and e-waste products on October 26.

For more information, please visit: Data Disposal Day 10-26-22

Orange County DA Presentation – “You Are The Gatekeeper”

Description: The presentation will cover various types of cybercrimes handled by the DA’s office and how to identify and protect yourself from becoming a victim. It will also cover basic cryptocurrency tips to protect yourself from scammers and phishing attacks.

DDA DEBORAH KWON

Deborah Kwon has been serving the public as a criminal prosecutor since 2015. She graduated from the Pepperdine University School of Law with a certificate in Criminal Law. She is also certified in Alternate Dispute Resolution by the Straus Institute for Dispute Resolution. Deborah started her career as a Deputy District Attorney at the Tulare County District Attorney’s Office, where she handled countless cases involving serious and violent crimes. In Tulare, she specialized in prosecuting child abuse, animal abuse, sex offender registration failures, gangs, and crimes against peace officers. In 2018, she transferred to the Orange County District Attorney’s Office, where she continued to handle serious and violent crimes. She is currently in the Major Fraud Unit, specializing in Cryptocurrency fraud. Deborah is currently working with various branches of law enforcement to develop the investigative infrastructure to handle matters involving blockchain technology, non-fungible tokens, and all things metaverse.

DDA ANTHONY SCHLEHNER

Anthony Schlehner has been a Deputy District Attorney since 2013 and has devoted his entire career to being a criminal prosecutor. After graduating as his law school’s valedictorian and joining the California bar, he immediately began working for the Orange County District Attorney’s office where he is now part of the Major Fraud Unit specializing in Cyber Crime and Fraud. Throughout his career, he has prosecuted serious and violent felonies, domestic violence, gang crimes, identify theft, narcotics, real estate fraud, and numerous other areas of criminal activity. Anthony is a member of the International Association of Financial Crimes Investigators and is currently working with branches of local law enforcement and the Federal government to develop investigative tactics relating to cryptocurrency fraud.

Registration Link

Security Topics

Multi-Factor Authentication:

  • Use Multi-factor (Two-factor) authentication for your online accounts. This method uses two or more factors for authentication and includes but is not limited to: Something You Have, Something You Know, and something You Are. 

Password Security:

  • Create a long and different password for each online account with a minimum of 8 characters. Use a mixture of different sets of characters and use a password management tool to help store passwords.

Phishing/E-mail Scams:

  • Look out for phishing/email scams asking for your information. Some senders may masquerade as someone you know or a legitimate organization. Their aim may be to acquire personal or financial information among other items.

Backups:

  • Be sure to automatically backup your data and apply the latest security patches. Doing so will keep your software current and helps to address security vulnerabilities.

Remote Security:

  • Enable session timeouts and lock screens with strong passwords to keep other people from accessing your data if you’re away from your device. This will help to keep your data from being changed by a malicious individual and/or seen by those without the correct clearance.

 

Zoom Backgrounds

 

Resources:

UC-wide Cybersecurity Awareness Month Events

CISA: National Cyber Security Awareness Month

DHS: Department of Homeland Security Be Cyber Smart

NIST: National Institute of Standards and Technology (Cybersecurity)

SANS: SysAdmin, Audit, Networking, and Security

Have I Been Pwned: Password Compromise Checker

Krebs on Security

Security Now Podcast

FTC Recognizing and Avoiding Phishing Scams

Log4j Critical Vulnerability Information

(last updated 1/11/2022)

Issue

On 12/9/2021, a critical vulnerability was reported in a widely used Java software called Log4j.  Log4j is not an application itself, but a software component commonly used by many commercial, open-source, and UCI-developed applications.  The following morning an alert with recommendations was sent to IT Leadership and Unit Information Security Leads across campus. 

Impact

Any system using vulnerable versions of Log4j can be remotely exploited by an attacker without requiring a login.  The exploit can result in the entire system being taken over and controlled by the attacker, data copied and/or deleted, ransomware installed, other accounts compromised, backdoors installed, and used to pivot to additional systems on the network.

Action Required

Product owners and IT staff on campus should identify and patch software within their units that are vulnerable to this Log4j exploit as soon as possible.  This may involve reaching out to your commercial software suppliers, open-source software projects, and/or UCI software developers to check for applications using a vulnerable Log4j component and update them appropriately.  More technical details in the FAQ section below.

Please contact your Unit Information Security Lead or security@uci.edu if you have any questions.

FAQ

Which versions of Log4j are vulnerable?

Which version of Log4j do I need to update to?

  • Currently Log4j 2.17.1 is the most secure version to use.  However, keep checking this page regularly as reviews of the software continue and new issues may be discovered requiring another upgrade.

Is Log4j 1.x also vulnerable?

  • CVE-2021-4104 involves an untrusted deserialization flaw affecting Log4j version 1.2. This issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2.x as it addresses numerous other issues from the previous versions. The impact to confidentiality, integrity and availability is high, but the attack complexity is much higher for a successful exploitation as it requires a non-default configuration.

How do I know if my system is affected?

What is OIT doing to help?

  • Scanning the network with multiple tools to identify vulnerable systems and notify owners.  Note: we cannot rely solely on the results of these automated scans to act upon due to the wide array of software on our network and unique scenarios each can be exploited by this vulnerability.
  • Blocking known bad IP addresses from the Internet who are attempting this exploit on other systems.  Note: we cannot rely solely on these lists as bad actors keep changing.
  • Monitoring network activity using signatures to detect and block exploit attempts from the Internet.  Note: we cannot rely solely on this protection as much of this activity is encrypted using HTTPS and invisible to our monitoring tools.
  • Updating all OIT services that are using vulnerable Log4j components.
  • Reporting the existence of vulnerable Log4j files on systems of managed clients.  Note: existence of these files alone may not lead directly to an exploit, however they can be a clue to where they are used in a vulnerable application and good practice to cleanup anyway.
  • Collaborating with other UC locations, sharing information, and checking for malicious activity reported by other institutions.

What if OIT determines my system is exploitable before I can fix it?

  • OIT Security will do its best to contact the owner of the system as a warning, however due to the urgency of the risk to campus and the long holiday break, a system that is at risk of exploit will be blocked from the network until it can be fixed.

Where can I find additional resources to learn more?

Cybersecurity Awareness Month 2021

October is Cybersecurity Awareness month! The month was originally created by the National Cyber Security Alliance and the Department of Homeland Security. Participate in the drawing, attend the events, or spread the word to celebrate.

Giveaway: Win a $25 Amazon Gift Card!

Complete the quick security quiz and be entered into a drawing for one of four $25 Amazon gift cards! Winners will be picked at random at the end of the October and contacted through email. Participants must have a UCI Gmail account and can only enter in once. You do not have to get all the questions right in order to participate in the drawing and you must be UCI-affiliated to win. Quick Security Quiz Link

 

Events

FBI Presentation: Cyber Threatscape

Date: October 26th, 2021 @ 11am

Description:  Understanding what the cyber threats are to UCI Faculty and Students.  The FBI will share their perspectives on the cyber threat landscape, and will provide tips to protect themselves from these threats.

Supervisory Special Agent (SSA) Michael Sohn is currently leading a squad at the FBI Los Angeles Field Division that is responsible for investigating computer and high-technology crimes. His investigative experience includes cyber terrorism, nation-state and criminal cyber intrusion matters.  Prior to his employment with the FBI, he worked as a Cyber Counterintelligence Officer for the Department of the Army, a Counter Terrorism officer for the Defense Intelligence Agency, a consultant at Booz Allen Hamilton and a U.S. Army Officer.  Mr. Sohn received a Bachelor of Science in Computer Science from the United States Military Academy, West Point and a Master of Science in Computer Information Systems from Boston University, Boston.

Registration Link

Data Disposal Day

Date: Wednesday, October 27, 2021

Time: 8:00 AM- 12:00 PM

Location: Parking Lot 12A near the Natural Sciences buildings

Properly disposing of e-waste is an important component of cybersecurity. Improper disposal, donation, or recycling of e-waste may inadvertently disclose sensitive information, which could be exploited by cyber criminals. Each of us is responsible for the security of information assets with which we work. 

Much like e-waste, keeping paper records with sensitive information that no longer need to be maintained under the UC Records Retention Schedule is both a security and privacy risk. Good document hygiene includes shredding unnecessary paper and deleting e-records with sensitive information that is consistent with the UC University Records Management Program (BFB-RMP-1) and the UC Records Retention Schedule.

Data Disposal Day Page

Security Topics

Multi-Factor Authentication:

  • Use Multi-factor (Two-factor) authentication for your online accounts. This method uses two or more factors for authentication and includes but is not limited to: Something You Have, Something You Know, and something You Are. 

Password Security:

  • Create a long and different password for each online account with a minimum of 8 characters. Use a mixture of different sets of characters and use a password management tool to help store passwords.

Backups:

  • Be sure to automatically backup your data and apply the latest security patches. Doing so will keep your software current and helps to address security vulnerabilities. 

Phishing/E-mail Scams:

  • Look out for phishing/email scams asking for your information. Some senders may masquerade as someone you know or a legitimate organization. Their aim may be to acquire personal or financial information among other items.

 

Zoom Backgrounds:

Resources:

CISA: National Cyber Security Awareness Month

DHS: Department of Homeland Security Be Cyber Smart

NIST: National Institute of Standards and Technology (Cybersecurity)

SANS: SysAdmin, Audit, Networking, and Security

Have I Been Pwned: E-mail Compromise Checker

Krebs on Security

Security Now Podcast

FTC Recognizing and Avoiding Phishing Scams

UC-Wide CSAM Events

Cyber Security Bingo

Play Cyber Security Bingo

Timeline: November 14th – January 11th, 2019 @5pm

DOWNLOAD: UCI 2018 Bingo Cybersecurity Bingo Card

Complete this bingo card and turn into the Help Desk at Aldrich Hall 115 by January 11th, 2019 at 5pm to be entered into a drawing. There are three different ways to play (see below). Each drawing will have a different prize based on the complexity of the bingo type. Every individual who turns in a bingo card will receive a small security gift.

Three Ways to Play: (Put a mark on each task when completed)

  • Four Corners – Complete each task in each of the four corners of this bingo card.
  • Inside Square – Complete each task within the inside square of this bingo card.      
  • Black Out – Complete every task on this bingo card.

Cybersecurity Tips for Using Social Media

How to review privacy setting

Social Media Privacy Settings:

Mobile Phone Privacy Settings:

What to do if impacted by a data breach

Passwords and 2-Factor Authentication

Protect Yourself from Scams:

Avoiding Online shopping Scams

Avoiding Fake Job Offer Scams

Phishing YouTube Videos

Cybersecurity tips while traveling

Meltdown and Spectre Information Page

Issue

Recently-published research articles have demonstrated a new class of vulnerabilities (dubbed “Meltdown” and “Spectre”) that exist in most modern computer processors. At best, the vulnerabilities could be leveraged by malware and hackers to more easily exploit other security bugs.  At worst, they could be abused by programs and logged-in users to read the contents of your computer’s memory (such as passwords).

You should be aware of these attacks because your computer is probably affected, but there is no need for alarm. This is a technical issue that will be addressed as software and operating system providers release updates which can then be installed on your computer.

Recommendations

The best protection from the new vulnerabilities is continuing to maintain good security practices – especially to ensure your operating system, browser, and antivirus software are kept up to date with the latest vendor software patches.

Specifically:

Summary Articles and Useful Links