22
IT Security IT Security Challenges Challenges In In Higher Education Higher Education Steve Schuster Steve Schuster Cornell University Cornell University

IT Security Challenges In Higher Education Steve Schuster Cornell University

  • View
    215

  • Download
    1

Embed Size (px)

Citation preview

Page 1: IT Security Challenges In Higher Education Steve Schuster Cornell University

IT Security ChallengesIT Security ChallengesInIn

Higher Education Higher Education

Steve SchusterSteve Schuster

Cornell UniversityCornell University

Page 2: IT Security Challenges In Higher Education Steve Schuster Cornell University

Questions I’d like to AnswerQuestions I’d like to Answer

►Why do we care about IT security?Why do we care about IT security?►What are some of our universities What are some of our universities

biggest challenges?biggest challenges?►What can universities do to address What can universities do to address

these challenges?these challenges?

Page 3: IT Security Challenges In Higher Education Steve Schuster Cornell University

Why Do We Care?Why Do We Care?

►Current federal and state lawCurrent federal and state law Family Educational Rights and Privacy Act Family Educational Rights and Privacy Act

(FERPA)(FERPA) Health Insurance Portability and Health Insurance Portability and

Accountability Act (HIPAA)Accountability Act (HIPAA) Gramm-Leach-Bliley Act (GLBA)Gramm-Leach-Bliley Act (GLBA) Compromise notification lawsCompromise notification laws

►12 states12 states►NYS Breech of Security Bill -- December, 2005NYS Breech of Security Bill -- December, 2005

Page 4: IT Security Challenges In Higher Education Steve Schuster Cornell University

Why Do We Care?Why Do We Care?

►Growing social expectations due to Growing social expectations due to rise in identity theft awarenessrise in identity theft awareness

►Reputational concernsReputational concerns►Growing possibility for lawsuitsGrowing possibility for lawsuits

Page 5: IT Security Challenges In Higher Education Steve Schuster Cornell University

Why Do We Care?Why Do We Care?► NY State Breech of Security BillNY State Breech of Security Bill

Personally identifiable informationPersonally identifiable information► Social security numberSocial security number► Drivers license numberDrivers license number► Account number of credit/debit card with pinAccount number of credit/debit card with pin

Must notify if data was “reasonably believed to have been Must notify if data was “reasonably believed to have been acquired by a person without valid authorization“acquired by a person without valid authorization“

NotificationNotification► PersonalPersonal► If NY residentIf NY resident

NYS Attorney General – Internet BureauNYS Attorney General – Internet Bureau NYS Attorney General – The CapitolNYS Attorney General – The Capitol NYS Consumer Protection BoardNYS Consumer Protection Board NYS Office of Cyber Security and Critical Infrastructure Protection NYS Office of Cyber Security and Critical Infrastructure Protection

Consequences of Non-complianceConsequences of Non-compliance► NYS can sue for damages on behave of individualNYS can sue for damages on behave of individual► Civil suites up to $150,000Civil suites up to $150,000

Page 6: IT Security Challenges In Higher Education Steve Schuster Cornell University

Why Do We Care?Why Do We Care?

► First half of this year had 72 reported compromisesFirst half of this year had 72 reported compromises Education – 37Education – 37 Business – 23Business – 23 Government – 7Government – 7 Healthcare – 5Healthcare – 5

► Causes of the compromisesCauses of the compromises Hacking – 40Hacking – 40 Stolen property – 16Stolen property – 16 Lost property – 6Lost property – 6 Insider – 5Insider – 5 Fraud/social engineering – 2Fraud/social engineering – 2 Email – 1Email – 1 Web – 1Web – 1

Page 7: IT Security Challenges In Higher Education Steve Schuster Cornell University

Why Do We Care?Why Do We Care?

Page 8: IT Security Challenges In Higher Education Steve Schuster Cornell University

Why Do We Care?Why Do We Care?

Page 9: IT Security Challenges In Higher Education Steve Schuster Cornell University

Why Do We Care?Why Do We Care?

Page 10: IT Security Challenges In Higher Education Steve Schuster Cornell University

Why Do We Care?Why Do We Care?

Page 11: IT Security Challenges In Higher Education Steve Schuster Cornell University

Our Biggest ChallengesOur Biggest Challenges

► Not ending up on the front page of the NY TimesNot ending up on the front page of the NY Times► Changing/emerging law Changing/emerging law ► Growing social expectations and requirementsGrowing social expectations and requirements► General “openness” of universities can make us an General “openness” of universities can make us an

easier targeteasier target► Creating a common understanding about what data Creating a common understanding about what data

needs to be protectedneeds to be protected► Complexity due to decentralized IT support complicates Complexity due to decentralized IT support complicates

the identification of critical or sensitive resources/datathe identification of critical or sensitive resources/data► Timely and accurate response to security incidentsTimely and accurate response to security incidents► Institutional-level questions are difficult to get Institutional-level questions are difficult to get

answeredanswered

Page 12: IT Security Challenges In Higher Education Steve Schuster Cornell University

Challenge: Not ending up on the Challenge: Not ending up on the front page of the NY Timesfront page of the NY Times

►ResponseResponse A combination of A combination of everythingeverything we do we do PrayPray

Page 13: IT Security Challenges In Higher Education Steve Schuster Cornell University

Challenge: Changing/Emerging Challenge: Changing/Emerging LawLaw

►ResponseResponse Make friends with University CounselMake friends with University Counsel Develop a clear understanding and Develop a clear understanding and

communicate what data needs to be protectedcommunicate what data needs to be protected Periodic security awareness for at least those Periodic security awareness for at least those

handling regulated data handling regulated data Never miss a “learning” opportunityNever miss a “learning” opportunity

►User/department notificationUser/department notification Make sure policy reflects current requirementsMake sure policy reflects current requirements

►Data Security/Management policyData Security/Management policy

Page 14: IT Security Challenges In Higher Education Steve Schuster Cornell University

Challenge: Growing Social Challenge: Growing Social Expectations and RequirementsExpectations and Requirements►ResponseResponse

Prepare your legal defense nowPrepare your legal defense now►Participate in internal and external auditsParticipate in internal and external audits►Show consistent improvementsShow consistent improvements►Work to establish at least state-of-the-practice Work to establish at least state-of-the-practice

security technology, processes and proceduressecurity technology, processes and procedures►Develop analysis and incident handling Develop analysis and incident handling

standards and practicesstandards and practices

Page 15: IT Security Challenges In Higher Education Steve Schuster Cornell University

Challenge: University Challenge: University “Openness”“Openness”

►ResponseResponse Implement a security strategy that meets Implement a security strategy that meets

the business needs of the unitthe business needs of the unit Build trust and understanding across the Build trust and understanding across the

communitycommunity Rise to the challengeRise to the challenge

►Protected infrastructures DO NOT hinder Protected infrastructures DO NOT hinder researchresearch

Page 16: IT Security Challenges In Higher Education Steve Schuster Cornell University

Challenge: Understanding What Challenge: Understanding What Data Needs to be ProtectedData Needs to be Protected

► ResponseResponse Data categories can helpData categories can help

►Regulated, Confidential and PublicRegulated, Confidential and Public Map specific data elements into each categoryMap specific data elements into each category Work toward the identification of all IT resources Work toward the identification of all IT resources

that house each categorythat house each category CommunicateCommunicate

►AwarenessAwareness►PolicyPolicy►““Educational” opportunitiesEducational” opportunities

The Audit Office can certainly help hereThe Audit Office can certainly help here

Page 17: IT Security Challenges In Higher Education Steve Schuster Cornell University

Challenge: Complexity Due to Challenge: Complexity Due to DecentralizationDecentralization

►ResponseResponse Building and maintaining trust is not an Building and maintaining trust is not an

optionoption Establish best practices and strong Establish best practices and strong

recommendationsrecommendations Gain the support of the University Audit Gain the support of the University Audit

OfficeOffice Support university-wide outreachSupport university-wide outreach

►IT Security CouncilIT Security Council►Monthly Security Special Interest Group (SIG)Monthly Security Special Interest Group (SIG)

Page 18: IT Security Challenges In Higher Education Steve Schuster Cornell University

Challenge: Timely and accurate Challenge: Timely and accurate response to security incidentsresponse to security incidents

►ResponseResponse Develop processes and procedures in Develop processes and procedures in

advanceadvance Ensure the procedures are universally Ensure the procedures are universally

availableavailable Provide response training to local unitsProvide response training to local units Ensure the central IT Security Office is Ensure the central IT Security Office is

involved with the incidentinvolved with the incident Automate as much of the response process Automate as much of the response process

as possibleas possible Establish a Data Loss Response TeamEstablish a Data Loss Response Team

Page 19: IT Security Challenges In Higher Education Steve Schuster Cornell University

Challenge: Answering Challenge: Answering Institutional QuestionsInstitutional Questions

►ResponseResponse Do not ask abstract questionsDo not ask abstract questions Work real world situations requiring action Work real world situations requiring action

and decisionsand decisions Create a Data Loss Response TeamCreate a Data Loss Response Team

Page 20: IT Security Challenges In Higher Education Steve Schuster Cornell University

Responding to IncidentsResponding to Incidents

► Clearly distinguish between IT security and data Clearly distinguish between IT security and data securitysecurity

► Data Loss Response TeamData Loss Response Team Established to ensure the university responds appropriatelyEstablished to ensure the university responds appropriately MembersMembers

► University AuditUniversity Audit University CounselUniversity Counsel► Public RelationsPublic Relations VP of ITVP of IT► Risk ManagementRisk Management University PoliceUniversity Police► Data StewardsData Stewards Local UnitLocal Unit

Two meetings of this team per incidentTwo meetings of this team per incident► First meeting establishes understanding of incident and First meeting establishes understanding of incident and

provides specific directionprovides specific direction► Second meeting weighs evidence and determines appropriate Second meeting weighs evidence and determines appropriate

actionsactions

Page 21: IT Security Challenges In Higher Education Steve Schuster Cornell University

Responding to IncidentsResponding to Incidents

►Data Loss Response Team benefitsData Loss Response Team benefits Helps answer tough questions for the universityHelps answer tough questions for the university Provides a balanced and effective decision Provides a balanced and effective decision

making processmaking process Helps establish minimum standards for analysis Helps establish minimum standards for analysis Weighs in on established practices and Weighs in on established practices and

proceduresprocedures Establishes a more thorough understanding of Establishes a more thorough understanding of

IT security challengesIT security challenges

Page 22: IT Security Challenges In Higher Education Steve Schuster Cornell University

Questions?