Page 1141 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1141

when traveling. These risks include the following:

               Sensitive Data Ideally, the devices should not contain any sensitive
               data. This prevents the loss of data if the devices are lost or stolen. If

               an employee needs this data while traveling, it should be protected
               with strong encryption.

               Malware and Monitoring Devices There have been many
               reported cases of malware being installed on systems while employees
               were visiting a foreign country. Similarly, we have heard firsthand
               accounts of physical monitoring devices being installed inside devices
               after a trip to a foreign country. People might think their devices are

               safe in a hotel room as they go out to a local restaurant. However, this
               is more than enough time for someone who otherwise looks like hotel
               staff to enter your room, install malware in the operating system, and
               install a physical listening device inside the computer. Maintaining
               physical control of devices at all times can prevent these attacks.

               Additionally, security experts recommend that employees do not bring
               their personal devices but instead bring temporary devices to be used
               during the trip. After the trip, these can be wiped clean and reimaged.

               Free Wi-Fi Free Wi-Fi often sounds appealing while traveling.
               However, it can easily be a trap configured to capture all the user’s
               traffic. As an example, attackers can configure a Wi-Fi connection as a
               man-in-the-middle attack, forcing all traffic to go through the

               attacker’s system. The attacker can then capture all traffic. A
               sophisticated man-in-the-middle attack can create a Hypertext
               Transfer Protocol Secure (HTTPS) connection between the client and
               the attacker’s system and create another HTTPS connection between
               the attacker’s system and an internet-based server. From the client’s
               perspective, it looks like it is a secure HTTPS connection between the
               client’s computer and the internet-based server. However, all the data

               is decrypted and easily viewable on the attacker’s system. Instead,
               users should have a method of creating their own internet connection,
               such as through a smartphone or with a Mi-Fi device.

               VPNs Employers should have access to virtual private networks
               (VPNs) that they can use to create secure connections. These can be
               used to access resources in the internal network, including their work-
   1136   1137   1138   1139   1140   1141   1142   1143   1144   1145   1146