Users play vital role in cyber surety Published Jan. 21, 2010 By Staff Sgt. Rachel Martinez 35th Fighter Wing Public Affairs MISAWA AIR BASE, Japan -- Targeting, attacks, viruses, malicious intent - all these things are happening on an emerging battlefield and it's not Afghanistan or Iraq. This new battlefront is the computer domain and every network user is on the frontline. As more routine operations take place on a computer system and the variety of threats grows, security of the cyber domain is vital to the mission. "Our biggest threat is lack of user education," said Master Sgt. Thomas Parker, 35th Communications Squadron NCOIC of wing cyber surety. "As much as (the communications squadron) does to secure the network, it's up to the end user. We rely on users to let us know when something is different. We do what we can, but we can't be everywhere at once." Cyber surety education efforts include annual training, and information assurance radio and television spots. The communications squadron also has some alternative methods to help educate users. "It's all about education -- Blue Team scams are part of that," said Sergeant Parker. The 35th CS Blue Team is responsible for enforcing and enhancing network security. Trained to think and act like cyber enemies, members of the Blue Team send out phishing or false e-mails testing user knowledge on the appropriate way to respond to such suspicious e-mails. To stay on top of the ever-changing threats, Pacific Air Forces and the 35th CS regularly push patches to every computer on the network. "We push hundreds of patches a year trying to stay one step ahead," said Sergeant Parker. "All it takes is one user to open up a hole in the network." Cyber surety does not stand alone. Much of it ties in with operational security, including the protection of open-source information, said Sergeant Parker. Information protection becomes involved once data leaves the network and is stored on a device, such as a hard drive or disc. Along with OPSEC and INFOSEC, cyber surety relies on computer security. "COMPUSEC is not just about what you do on the computer," said Sergeant Parker. "It's also about unidentified people working on communications cabinets, unattended computers, and common access cards. Everyone is supposed to secure their assets." Sergeant Parker offers a few key tips users should follow to help secure the cyber domain: Don't open email attachments or embedded links from people you do not know. Check to see that e-mails are digitally signed. Never post sensitive information or provide it to strangers; safeguard personal, unit, and mission information at all times. Don't use flash memory devices on DoD computers and follow strict procedures for moving data from one computer to another. Keep your home anti-virus up-to-date. The government provides a free version for home use. "If people get a suspicious e-mail, let us know," said Sergeant Parker. "If you think your computer is acting different, call it in to the comm. focal point. We'd rather get a hundred calls about something we did than miss that one call about a legitimate threat." Overall, Sergeant Parker urges users to be aware. "My one piece of advice is to pay attention," he said. "We are so inundated now with e-mail and other technology, but you have to pay attention - the end user, both at home and at work, is a frontline target." For more information or to report a suspicious threat, call the 35th CS wing cyber security office at 226-2001. Suspicious e-mails should be mailed as an attachment to the information assurance office at 35fw.InformationAssurance@misawa.af.mil.