Eight agencies plugged in and activated the USBs we left lying around
USBs we left lying around at eight agencies were plugged into agency networks and activated. The
USBs then ‘phoned home’. While our USBs did not pose a threat to the agency networks, the exercise
clearly demonstrated how this type of attack can provide unauthorised access to an agency network.
Significantly, it is also extremely difficult to detect once it has been established.
Eight of the 15 agencies had their network compromised by USBs that we left at agencies to test their
security practices. The USBs were found by agency staff and subsequently connected to their agency’s
networks. This exercise proved how easily existing security mechanisms can be undermined if staff are
not properly trained. It is also a highly dangerous form of attack because it allows a perpetrator to gain
direct access into the agency’s network, thereby providing control over information resources from the
Internet without detection.
Of the remaining USBs we deployed:
y three agencies found them and reported them internally as lost property
y several USBs found their way into home computers or the networks of private organisations and
were plugged in. As previously mentioned, they posed no threat and the software contained within
them could be easily deleted.
This aspect of our audit highlighted how important it is that agencies manage all the potential risks to
their systems. Agencies can address this particular risk through staff training. Software can also be used
to prevent or manage unauthorised USBs or other devices from being connected to their networks.
Agencies lack a risk based approach to computer security
The results of our audit highlight that agencies are not taking a risk-based holistic approach to managing
the security of their computer systems. They are failing to meet good practice guidelines and standards
for computer security.
We reviewed the policies and procedures of agencies to assess how well they have identified potential
risks to their networks and what controls are in place to manage those risks. We found that 12 of the 15
agencies had not considered cyber threats from the Internet or social engineering techniques in their
security policies.
Nine agencies had not carried out risk assessments to determine their potential exposure to external or
internal attacks. Without a risk assessment, agencies will not know their exposure levels and potential
impacts on their business.
Seven agencies did not have incident response plans or procedures for managing cyber threats from
the Internet and social engineering. Staff did not know how to respond to cyber threats and under what
circumstance they should escalate