[IS&T Security-FYI] SFYI Newsletter, November 30, 2009
Monique Yeaton
myeaton at MIT.EDU
Mon Nov 30 16:13:48 EST 2009
In this issue:
1. Flaws in Browsers
2. Preventing Data Loss on Web 2.0
--------------------------
1. Flaws in Browsers
--------------------------
Watch out when browsing! Firefox and Internet Explorer 6, 7 and 8 all
have flaws that were reported in the past week.
Firefox was found to have some poorly written extensions that could be
exploited to install malware on a victim's computer:
<http://blogs.techrepublic.com.com/security/?p=2710&tag=nl.e036>
A cross-site scripting (XSS) vulnerability can be exploited in
Internet Explorer 8 to allow attacks on web pages that are otherwise
safe:
<http://www.theregister.co.uk/2009/11/20/internet_explorer_security_flaw/
>
Microsoft also confirmed the existence of a zero-day flaw in older
versions of Internet Explorer. Proof-of-concept exploit code for the
vulnerability has been posted on the Internet; an attack could crash
vulnerable systems or allow arbitrary code execution:
<http://www.computerworld.com/s/article/9141363/Microsoft_confirms_IE6_IE7_zero_day_bug
>
----------------------------------------------
2. Preventing Data Loss on Web 2.0
----------------------------------------------
Everyone is using Web 2.0 these days. From advertising to and
communicating with your constituents via social media such as blogs,
Facebook and Twitter, to using tools such as webmail and Google for
managing your email and other documents, businesses are all using some
form of the newest Web 2.0 applications.
Sharing all this data on the World Wide Web makes communication so
much easier, but also comes with increased data risk, compliance
failure and loss of intellectual property. How can you prevent data
loss when you can't turn off social media?
What happens if, using a Web 2.0 application, a faculty member posts
the PII (personally identifiable information) of his or her students
to a public Internet site? Or what if an employee uses their Facebook
account to discuss confidential research information? Do you have any
controls over this information and any means to remediate its
exposure? Is the Institute liable?
In a Web 2.0 world, organizations want to look at how to ensure
regulatory compliance, with the focus on risk assessment and
implementing security controls that respond to the threats they face,
such as the situations described above.
Other than technical solutions, there should be policies and business
practices in place, outlining regulatory compliance for data
protection. Should employees handling sensitive data be allowed to
access social media on the same computer they use for work? Rather
than sharing files through Google Docs or other types of document
sharing websites, are there safer ways to share files containing
sensitive data? Asking and answering some of these questions could
just prevent the next big data breach.
Here are just a few examples of universities who have had their data
exposed through the Internet in the past few months:
<http://www.latimes.com/news/local/la-me-cal-poly16-2009nov16,0,503569.story
>
<http://www.chaminade.edu/infosecure/>
<http://www.ktla.com/news/landing/ktla-csula-computer-breach,0,1880242.story
>
<http://www.kentucky.com/latest_news/story/947409.html>
To learn more about protecting information at MIT, visit <http://web.mit.edu/infoprotect/
>.
The IT Security Services team (security at mit.edu) has also been teaming
up with Allison Dolan from the Program to Protect Personally
Identifying Information to share with the community best security
practices and the newest laws and regulations for protecting sensitive
information.
If you are interested in an informational session, please contact
Monique Yeaton (myeaton at mit.edu) or Allison Dolan (adolan at mit.edu).
They will be giving several of these sessions to the public during IAP
2010 as well: <http://student.mit.edu/iap/nsis.html>
=
=
=
========================================================================
Find current and older issues of Security FYI Newsletter: <http://kb.mit.edu/confluence/x/ehBB
>
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://ist.mit.edu/security
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.mit.edu/pipermail/ist-security-fyi/attachments/20091130/ab77fad4/attachment.htm
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 1846 bytes
Desc: not available
Url : http://mailman.mit.edu/pipermail/ist-security-fyi/attachments/20091130/ab77fad4/attachment.bin
More information about the ist-security-fyi
mailing list