69 lines
3.1 KiB
Plaintext
69 lines
3.1 KiB
Plaintext
**********************************************************************
|
||
DDN Security Bulletin 04 DCA DDN Defense Communications System
|
||
23 Oct 89 Published by: DDN Security Coordination Center
|
||
(SCC@NIC.DDN.MIL) (800) 235-3155
|
||
|
||
DEFENSE DATA NETWORK
|
||
SECURITY BULLETIN
|
||
|
||
The DDN SECURITY BULLETIN is distributed by the DDN SCC (Security
|
||
Coordination Center) under DCA contract as a means of communicating
|
||
information on network and host security exposures, fixes, & concerns
|
||
to security & management personnel at DDN facilities. Back issues may
|
||
be obtained via FTP (or Kermit) from NIC.DDN.MIL [26.0.0.73 or
|
||
10.0.0.51] using login="anonymous" and password="guest". The bulletin
|
||
pathname is SCC:DDN-SECURITY-nn (where "nn" is the bulletin number).
|
||
|
||
**********************************************************************
|
||
|
||
HALLOWEEN PRECAUTIONARY NOTE
|
||
|
||
Halloween is traditionally a time for tricks of all kinds. In order
|
||
to guard against possible benign or malevolent attempts to affect the
|
||
normal operation of your host, the DDN SCC staff suggests taking the
|
||
following easy precautions:
|
||
|
||
1. Write a set of emergency procedures for your site and keep it up
|
||
to date. Address such things as:
|
||
|
||
- What would you do if you had an intruder (either a human or
|
||
a computer virus)?
|
||
|
||
- Who would you call for help? HINT: Read the top of this
|
||
bulletin! Also, for 24 hour assistance:
|
||
|
||
MILNET Trouble Desk -- (A/V) 231-1713 or (800) 451-7413
|
||
|
||
- Who is in charge of security at your site?
|
||
|
||
- How would you apply a hardware/software fix if needed?
|
||
|
||
2. Save your files regularly, and make file back-ups often. Put
|
||
the distribution copies of your software in a safe place away
|
||
from your computer room. Don't forget where they're stored!
|
||
|
||
3. Avoid trivial passwords and change them often. (See the "Green
|
||
Book" (Department of Defense Password Management Guideline),
|
||
CSC-STD-002-85, for information on the use of passwords.)
|
||
|
||
4. Check to make sure your host has no unauthorized users or
|
||
accounts. Also check for obsolete accounts (a favorite path for
|
||
intruders to gain access).
|
||
|
||
5. Restrict system ("superuser", "maint", etc.) privileges to the
|
||
minimum number of accounts you possibly can.
|
||
|
||
6. Well publicized accounts including "root", "guest", etc. AND the
|
||
personal account for the system administrator should NOT have
|
||
system privileges. (Past experience has shown that these IDs
|
||
are more susceptible to successful intruder attacks.)
|
||
|
||
7. Keep your maintenance contracts active.
|
||
|
||
Of course, these steps should be taken throughout the year as part of
|
||
your regular operating procedure.
|
||
|
||
**********************************************************************
|
||
|