SlideShare une entreprise Scribd logo
1  sur  31
The IT Security Jungle of
Higher Education
Presented by Nicholas Davis, CISA, CISSP
WTA Conference, May, 2015
Overview
• Question: Why are security breaches in higher education
on the rise?
• How the environment in a university setting differs from
the private sector
• What happens when you try to do it like everyone else
• The approach of motivating rather than obligating, and
federating rather than centralizing
• Eduroam as an example of how higher education does
things differently (and in this case—better)
• Using outside influence, embracing differences
• Summary, question and answer session
Why Us?
Question: Why have there been security
breaches in the higher education
community?
Let’s take a look at the culture of academia
Academic Environment
• Highly decentralized in many cases, from
authority to funding to infrastructure
• Many smart people, who want to have
their say and who want to their research
freedom ensured
• Unique situations are the norm
• Funding is always a huge concern
Imagine This
• “Higher education is the only institution in
which a vote of 15 to 1 is defined as a tie”
– Unknown Author
• No forward movement until consensus is
achieved
• This often means that forward movement
depends upon everyone getting their
second choice, which nobody loves, but
nobody hates…..Often diluted solutions
Look at Our Technology
Infrastructure
Multiple variants
of Operating
Systems means
it is difficult to
have a
consistently
applied security
patch program
If You Thought Apple Was a
Challenge
• How does one go about securing
a Commodore 64, connected to
proprietary research equipment,
saving sensitive data to a network
drive, through a cassette tape I/O
port?
Funding Models
• Research grants provide a great deal of
revenue to a large public university
• Grants cover everything form staff salaries
to computer equipment
• The researchers buy what they like, and
use it as they like
• Difficult for central IT to manage what they
do not own
Private Sector Vs Higher
Education
• Private sector typically has standard
hardware and software builds, manages
end user machines, has rigid equipment
use guidelines, monitors usage, blocks
access to “dangerous” websites
• Higher education always has freedom in
the forefront of thoughts: Freedom from
standards, freedom from restricted use
Well, How Difficult Can It Be?
• No overall managed endpoint environment
• No centralized log collection
• Ambiguous perimeters of network, firewalls,
intrusion detection, intrusion prevention
• BYOD gone crazy!
• Central equipment inventory not available
• Equipment moving constantly
• Massive amounts of data, being used in many
non-standard ways
• Decentralized data management
Defining the Community
• Transient student population
• International students on campus
• American students overseas
• Visiting professors, not officially a
university employee
• Research taking place all over the globe
• Making network available for visitors
It’s Simple, Just Do What I Say
• Diverse structure of university
does not fit well with a top-down
model
• My primary allegiance is to those
who fund my research
• If I can’t do it my way, here, I
may go someplace else where I
have more freedom
From the Technical Side
• Decentralized firewall management makes
network assets unreachable
• Decentralized management prohibits
owning endpoints by a central authority
• Multiple types of OS and hardware makes
it difficult to manage
• Specialized software means that patching
is often not possible
The Secret Sauce
• We try to motivate rather than obligate
• Give the people information, let them
decide
• Authority and accountability
• Make it easy for them, make it
inexpensive
• Avoid client footprint whenever possible
• Thanks to the cloud, it is getting easier to
manage in the jungle
Instead of Controlling Others,
We Choose to Trust Them
• Centralized identity management is challenging
in our amorphous customer base
• Instead of owning everything, we set standards
of trust and we have confidence in others to
manage their individual systems better than they
could be managed centrally
• Mainstream is not the only way to achieve
success
• Let’s look at one example
Eduroam – Trust Through
Federation
• Eduroam (education roaming) is
an international roaming service
for users in research, and higher
education.
• It provides researchers,
teachers and students easy and
secure network access when
visiting an institution other than
their own.
Eduroam Introduction
https://www.youtube.com/watch?feature=player_embedded&v=TVCmcMZS3uA
How Eduroam Works
• Authentication of users is performed by
their home institution, using the same
credentials as when they access the
network locally, while authorization to
access the Internet and possibly other
resources is handled by the visited
institution. Users do not have to pay for
using eduroam.
Eduroam Has a Risk
• When placing trust in Eduroam,
you are placing trust in others,
who from time to time may not
meet the standards which you
were expecting
• The solution is to understand the
level of authentication provided
and that authentication should
not be synonymous with
authorization
Eduroam
• How does your business deal with
visitors from other companies?
• How do other companies deal with
granting you access when you are
on-site?
• Generic logins? No logins? Who is
on the network? Nobody knows!
• Have you ever seen a solution as
elegant, safe, flexible and useful as
Eduroam?
Eduroam
• Federation isn’t the industry standard, but it
certainly recognizes the reality of the world we
live in.
• The people in higher education might be on to
something here
• When you can’t own everything, you need to be
pragmatic
• Lack of rigidity, makes higher education very
innovative
Eduroam Makes Sense
Federation of Communities
It Is All About Trust
• Which do you trust more, Facebook, which gave an
account to my stuffed cow –or a home institution, with
more rigorous credential issuance policies and
procedures, such as a university?
Federation Does Not Mean
Loss of Control
• Federation with Eduroam handles
authentication, at LOA2’ish levels
• Eduroam reports-----you decide!
• Logging in with Facebook is more
LOA1’ish
A New World Order of
Centralized Identity
Management Is Highly Unlikely
• Not everyone in the world is going
to join Facebook
• Even if they did, the LOA of
Facebook sets the bar low to the
ground
• Do you really want Facebook to
own your organization’s
authentication?
• It is OK not to own everything, as
long as you know who to trust
Outside Influence Never Hurts
• HIPAA, PCI, FERPA
• “Sorry, it isn’t me, it is an external
requirement” is an extra ace in pocket!
• NIST 800-53 (federal government IT
security controls)
• “If you want your grant money, you must
first prove NIST 800-53 compliance”
Budget Constraints
• In the past, individual freedom was a top priority
• In the current environment, campuses are
looking to save money wherever possible and
become more efficient
• Redundancy in policy, process development and
deployment is being sought out and removed
wherever possible
Summary View
• IT Security in higher education is a greater
challenge than in the private sector
• You often have to work without the benefit
of the infrastructure and control which is
taken for granted in the private sector
• Freedom of choice is held as a core value
in academia
Jungles Are For Roaming
• Amazing things can happen in
the jungle
• Obligation is a dying breed of
animal in an interconnected
world
• The IT security jungle should be
appreciated, embraced and not
approached as something
which needs to be “controlled”
at all costs.
Questions & Comments
Nicholas Davis, CISA, CISSP
Chief Information Security Officer
UW-System
ndavis@uwsa.edu
facebook.com/nicholas.a.davis
https://www.linkedin.com/in/nicholascv
IT Security Challenges in Higher Education

Contenu connexe

Tendances

Group presentation show
Group presentation showGroup presentation show
Group presentation showNerakstar1
 
Elementary teacher applications show
Elementary teacher applications  showElementary teacher applications  show
Elementary teacher applications showNerakstar1
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalLea Bailey
 
E-safety advocates - working with young people to raise awareness by Emma Had...
E-safety advocates - working with young people to raise awareness by Emma Had...E-safety advocates - working with young people to raise awareness by Emma Had...
E-safety advocates - working with young people to raise awareness by Emma Had...CILIP ARLG
 
Information Architecture For Educators
Information Architecture For EducatorsInformation Architecture For Educators
Information Architecture For EducatorsMichael Zarro, Ph.D.
 
Electronic Security Issues for Schools
Electronic Security Issues for SchoolsElectronic Security Issues for Schools
Electronic Security Issues for SchoolsBrett Napier, MBA
 
Group presentation show
Group presentation showGroup presentation show
Group presentation showNerakstar1
 
Group presentation show
Group presentation showGroup presentation show
Group presentation showNerakstar1
 
Fluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to AssessmentFluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to AssessmentGail Matthews-DeNatale
 
The Long Road from Reactive to Proactive: Developing an Accessibility Strategy
The Long Road from Reactive to Proactive: Developing an Accessibility StrategyThe Long Road from Reactive to Proactive: Developing an Accessibility Strategy
The Long Road from Reactive to Proactive: Developing an Accessibility Strategy3Play Media
 
Rethinking the Role of Work, Technology, and Rural Healthcare
Rethinking the Role of Work, Technology, and Rural HealthcareRethinking the Role of Work, Technology, and Rural Healthcare
Rethinking the Role of Work, Technology, and Rural HealthcareStella Lee
 
Design Lab approach to redefining the Student Experience
Design Lab approach to redefining the Student Experience Design Lab approach to redefining the Student Experience
Design Lab approach to redefining the Student Experience Design Lab
 
Academic Integrity
Academic IntegrityAcademic Integrity
Academic IntegrityRodd Lucier
 
Digital professionalism workshop at AMEE 2010
Digital professionalism workshop at AMEE 2010Digital professionalism workshop at AMEE 2010
Digital professionalism workshop at AMEE 2010NOSM
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
Paivi rasi
Paivi rasiPaivi rasi
Paivi rasicremit
 
15 Years After an OCR Suit: NC State’s Accessibility Refresh
15 Years After an OCR Suit: NC State’s Accessibility Refresh15 Years After an OCR Suit: NC State’s Accessibility Refresh
15 Years After an OCR Suit: NC State’s Accessibility RefreshPatrick Loftus
 
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...i_scienceEU
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Researcheckchela
 

Tendances (20)

Group presentation show
Group presentation showGroup presentation show
Group presentation show
 
Elementary teacher applications show
Elementary teacher applications  showElementary teacher applications  show
Elementary teacher applications show
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 final
 
E-safety advocates - working with young people to raise awareness by Emma Had...
E-safety advocates - working with young people to raise awareness by Emma Had...E-safety advocates - working with young people to raise awareness by Emma Had...
E-safety advocates - working with young people to raise awareness by Emma Had...
 
Information Architecture For Educators
Information Architecture For EducatorsInformation Architecture For Educators
Information Architecture For Educators
 
Electronic Security Issues for Schools
Electronic Security Issues for SchoolsElectronic Security Issues for Schools
Electronic Security Issues for Schools
 
Group presentation show
Group presentation showGroup presentation show
Group presentation show
 
Group presentation show
Group presentation showGroup presentation show
Group presentation show
 
Fluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to AssessmentFluency with Information Technology: From rubric to Assessment
Fluency with Information Technology: From rubric to Assessment
 
The Long Road from Reactive to Proactive: Developing an Accessibility Strategy
The Long Road from Reactive to Proactive: Developing an Accessibility StrategyThe Long Road from Reactive to Proactive: Developing an Accessibility Strategy
The Long Road from Reactive to Proactive: Developing an Accessibility Strategy
 
Rethinking the Role of Work, Technology, and Rural Healthcare
Rethinking the Role of Work, Technology, and Rural HealthcareRethinking the Role of Work, Technology, and Rural Healthcare
Rethinking the Role of Work, Technology, and Rural Healthcare
 
Design Lab approach to redefining the Student Experience
Design Lab approach to redefining the Student Experience Design Lab approach to redefining the Student Experience
Design Lab approach to redefining the Student Experience
 
Second life
Second lifeSecond life
Second life
 
Academic Integrity
Academic IntegrityAcademic Integrity
Academic Integrity
 
Digital professionalism workshop at AMEE 2010
Digital professionalism workshop at AMEE 2010Digital professionalism workshop at AMEE 2010
Digital professionalism workshop at AMEE 2010
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Paivi rasi
Paivi rasiPaivi rasi
Paivi rasi
 
15 Years After an OCR Suit: NC State’s Accessibility Refresh
15 Years After an OCR Suit: NC State’s Accessibility Refresh15 Years After an OCR Suit: NC State’s Accessibility Refresh
15 Years After an OCR Suit: NC State’s Accessibility Refresh
 
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 

En vedette

Information Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access ControlInformation Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access ControlNicholas Davis
 
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 Nicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Nicholas Davis
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional CertificationsNicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Cloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) SecurityCloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) SecurityNicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 

En vedette (8)

Information Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access ControlInformation Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access Control
 
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Cloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) SecurityCloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) Security
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 

Similaire à IT Security Challenges in Higher Education

Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
saces-online tools for the classroom
saces-online tools for the classroomsaces-online tools for the classroom
saces-online tools for the classroomJessica Haas
 
1©McGraw-Hill Education. All rights reserved. Authorized o
1©McGraw-Hill Education. All rights reserved. Authorized o1©McGraw-Hill Education. All rights reserved. Authorized o
1©McGraw-Hill Education. All rights reserved. Authorized oTatianaMajor22
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsUniversity of South Africa (Unisa)
 
Ethics Update for School Counselors
Ethics Update for School CounselorsEthics Update for School Counselors
Ethics Update for School CounselorsJohn Gavazzi
 
DevOps Culture Level2 - IPExpo Manchester 2015
DevOps Culture Level2 - IPExpo Manchester 2015DevOps Culture Level2 - IPExpo Manchester 2015
DevOps Culture Level2 - IPExpo Manchester 2015Mandi Walls
 
Monroe Summer Learning Academy-PD-June 12, 2013
Monroe Summer Learning Academy-PD-June 12, 2013Monroe Summer Learning Academy-PD-June 12, 2013
Monroe Summer Learning Academy-PD-June 12, 2013mschirahagerman
 
What is federated single sign-on?
What is federated single sign-on?What is federated single sign-on?
What is federated single sign-on?OpenAthens
 
Digital Residents, Personal Learning Networks and a little bit on Open Badges...
Digital Residents, Personal Learning Networks and a little bit on Open Badges...Digital Residents, Personal Learning Networks and a little bit on Open Badges...
Digital Residents, Personal Learning Networks and a little bit on Open Badges...Joyce Seitzinger
 
Organizational Pathologies in Information Technology
Organizational Pathologies in Information TechnologyOrganizational Pathologies in Information Technology
Organizational Pathologies in Information TechnologyMandi Walls
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and BenefitsSteve Young
 
#ET4Online 2014 #ugstSTORY Workshop
#ET4Online 2014 #ugstSTORY Workshop#ET4Online 2014 #ugstSTORY Workshop
#ET4Online 2014 #ugstSTORY WorkshopLaura Pasquini
 
Myths, Truths and Futures of online learning
Myths, Truths and Futures of online learningMyths, Truths and Futures of online learning
Myths, Truths and Futures of online learningTerry Anderson
 
Integrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS EducationIntegrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS EducationGreg Friese
 
Machine Learning Applications in E-learning - Bias, Risks, and Mitigations
Machine Learning Applications in E-learning - Bias, Risks, and MitigationsMachine Learning Applications in E-learning - Bias, Risks, and Mitigations
Machine Learning Applications in E-learning - Bias, Risks, and MitigationsStella Lee
 

Similaire à IT Security Challenges in Higher Education (20)

Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
saces-online tools for the classroom
saces-online tools for the classroomsaces-online tools for the classroom
saces-online tools for the classroom
 
Learning Online
Learning OnlineLearning Online
Learning Online
 
1©McGraw-Hill Education. All rights reserved. Authorized o
1©McGraw-Hill Education. All rights reserved. Authorized o1©McGraw-Hill Education. All rights reserved. Authorized o
1©McGraw-Hill Education. All rights reserved. Authorized o
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
Ethics Update for School Counselors
Ethics Update for School CounselorsEthics Update for School Counselors
Ethics Update for School Counselors
 
Ethics Update for School Counselors
Ethics Update for School CounselorsEthics Update for School Counselors
Ethics Update for School Counselors
 
DevOps Culture Level2 - IPExpo Manchester 2015
DevOps Culture Level2 - IPExpo Manchester 2015DevOps Culture Level2 - IPExpo Manchester 2015
DevOps Culture Level2 - IPExpo Manchester 2015
 
Monroe Summer Learning Academy-PD-June 12, 2013
Monroe Summer Learning Academy-PD-June 12, 2013Monroe Summer Learning Academy-PD-June 12, 2013
Monroe Summer Learning Academy-PD-June 12, 2013
 
What is federated single sign-on?
What is federated single sign-on?What is federated single sign-on?
What is federated single sign-on?
 
Digital Residents, Personal Learning Networks and a little bit on Open Badges...
Digital Residents, Personal Learning Networks and a little bit on Open Badges...Digital Residents, Personal Learning Networks and a little bit on Open Badges...
Digital Residents, Personal Learning Networks and a little bit on Open Badges...
 
Organizational Pathologies in Information Technology
Organizational Pathologies in Information TechnologyOrganizational Pathologies in Information Technology
Organizational Pathologies in Information Technology
 
Iam it-summit-2015
Iam it-summit-2015Iam it-summit-2015
Iam it-summit-2015
 
Social Media: Risks and Benefits
Social Media: Risks and BenefitsSocial Media: Risks and Benefits
Social Media: Risks and Benefits
 
#ET4Online 2014 #ugstSTORY Workshop
#ET4Online 2014 #ugstSTORY Workshop#ET4Online 2014 #ugstSTORY Workshop
#ET4Online 2014 #ugstSTORY Workshop
 
Myths, Truths and Futures of online learning
Myths, Truths and Futures of online learningMyths, Truths and Futures of online learning
Myths, Truths and Futures of online learning
 
Integrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS EducationIntegrating Smartphones and Tablet Devices into EMS Education
Integrating Smartphones and Tablet Devices into EMS Education
 
Social Media Workshop
Social Media WorkshopSocial Media Workshop
Social Media Workshop
 
Module 1
Module 1Module 1
Module 1
 
Machine Learning Applications in E-learning - Bias, Risks, and Mitigations
Machine Learning Applications in E-learning - Bias, Risks, and MitigationsMachine Learning Applications in E-learning - Bias, Risks, and Mitigations
Machine Learning Applications in E-learning - Bias, Risks, and Mitigations
 

Plus de Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebNicholas Davis
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebNicholas Davis
 
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Nicholas Davis
 

Plus de Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep Web
 
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
 

IT Security Challenges in Higher Education

  • 1. The IT Security Jungle of Higher Education Presented by Nicholas Davis, CISA, CISSP WTA Conference, May, 2015
  • 2. Overview • Question: Why are security breaches in higher education on the rise? • How the environment in a university setting differs from the private sector • What happens when you try to do it like everyone else • The approach of motivating rather than obligating, and federating rather than centralizing • Eduroam as an example of how higher education does things differently (and in this case—better) • Using outside influence, embracing differences • Summary, question and answer session
  • 3. Why Us? Question: Why have there been security breaches in the higher education community? Let’s take a look at the culture of academia
  • 4. Academic Environment • Highly decentralized in many cases, from authority to funding to infrastructure • Many smart people, who want to have their say and who want to their research freedom ensured • Unique situations are the norm • Funding is always a huge concern
  • 5. Imagine This • “Higher education is the only institution in which a vote of 15 to 1 is defined as a tie” – Unknown Author • No forward movement until consensus is achieved • This often means that forward movement depends upon everyone getting their second choice, which nobody loves, but nobody hates…..Often diluted solutions
  • 6. Look at Our Technology Infrastructure Multiple variants of Operating Systems means it is difficult to have a consistently applied security patch program
  • 7. If You Thought Apple Was a Challenge • How does one go about securing a Commodore 64, connected to proprietary research equipment, saving sensitive data to a network drive, through a cassette tape I/O port?
  • 8. Funding Models • Research grants provide a great deal of revenue to a large public university • Grants cover everything form staff salaries to computer equipment • The researchers buy what they like, and use it as they like • Difficult for central IT to manage what they do not own
  • 9. Private Sector Vs Higher Education • Private sector typically has standard hardware and software builds, manages end user machines, has rigid equipment use guidelines, monitors usage, blocks access to “dangerous” websites • Higher education always has freedom in the forefront of thoughts: Freedom from standards, freedom from restricted use
  • 10. Well, How Difficult Can It Be? • No overall managed endpoint environment • No centralized log collection • Ambiguous perimeters of network, firewalls, intrusion detection, intrusion prevention • BYOD gone crazy! • Central equipment inventory not available • Equipment moving constantly • Massive amounts of data, being used in many non-standard ways • Decentralized data management
  • 11. Defining the Community • Transient student population • International students on campus • American students overseas • Visiting professors, not officially a university employee • Research taking place all over the globe • Making network available for visitors
  • 12. It’s Simple, Just Do What I Say • Diverse structure of university does not fit well with a top-down model • My primary allegiance is to those who fund my research • If I can’t do it my way, here, I may go someplace else where I have more freedom
  • 13. From the Technical Side • Decentralized firewall management makes network assets unreachable • Decentralized management prohibits owning endpoints by a central authority • Multiple types of OS and hardware makes it difficult to manage • Specialized software means that patching is often not possible
  • 14. The Secret Sauce • We try to motivate rather than obligate • Give the people information, let them decide • Authority and accountability • Make it easy for them, make it inexpensive • Avoid client footprint whenever possible • Thanks to the cloud, it is getting easier to manage in the jungle
  • 15. Instead of Controlling Others, We Choose to Trust Them • Centralized identity management is challenging in our amorphous customer base • Instead of owning everything, we set standards of trust and we have confidence in others to manage their individual systems better than they could be managed centrally • Mainstream is not the only way to achieve success • Let’s look at one example
  • 16. Eduroam – Trust Through Federation • Eduroam (education roaming) is an international roaming service for users in research, and higher education. • It provides researchers, teachers and students easy and secure network access when visiting an institution other than their own.
  • 18. How Eduroam Works • Authentication of users is performed by their home institution, using the same credentials as when they access the network locally, while authorization to access the Internet and possibly other resources is handled by the visited institution. Users do not have to pay for using eduroam.
  • 19. Eduroam Has a Risk • When placing trust in Eduroam, you are placing trust in others, who from time to time may not meet the standards which you were expecting • The solution is to understand the level of authentication provided and that authentication should not be synonymous with authorization
  • 20. Eduroam • How does your business deal with visitors from other companies? • How do other companies deal with granting you access when you are on-site? • Generic logins? No logins? Who is on the network? Nobody knows! • Have you ever seen a solution as elegant, safe, flexible and useful as Eduroam?
  • 21. Eduroam • Federation isn’t the industry standard, but it certainly recognizes the reality of the world we live in. • The people in higher education might be on to something here • When you can’t own everything, you need to be pragmatic • Lack of rigidity, makes higher education very innovative
  • 23. It Is All About Trust • Which do you trust more, Facebook, which gave an account to my stuffed cow –or a home institution, with more rigorous credential issuance policies and procedures, such as a university?
  • 24. Federation Does Not Mean Loss of Control • Federation with Eduroam handles authentication, at LOA2’ish levels • Eduroam reports-----you decide! • Logging in with Facebook is more LOA1’ish
  • 25. A New World Order of Centralized Identity Management Is Highly Unlikely • Not everyone in the world is going to join Facebook • Even if they did, the LOA of Facebook sets the bar low to the ground • Do you really want Facebook to own your organization’s authentication? • It is OK not to own everything, as long as you know who to trust
  • 26. Outside Influence Never Hurts • HIPAA, PCI, FERPA • “Sorry, it isn’t me, it is an external requirement” is an extra ace in pocket! • NIST 800-53 (federal government IT security controls) • “If you want your grant money, you must first prove NIST 800-53 compliance”
  • 27. Budget Constraints • In the past, individual freedom was a top priority • In the current environment, campuses are looking to save money wherever possible and become more efficient • Redundancy in policy, process development and deployment is being sought out and removed wherever possible
  • 28. Summary View • IT Security in higher education is a greater challenge than in the private sector • You often have to work without the benefit of the infrastructure and control which is taken for granted in the private sector • Freedom of choice is held as a core value in academia
  • 29. Jungles Are For Roaming • Amazing things can happen in the jungle • Obligation is a dying breed of animal in an interconnected world • The IT security jungle should be appreciated, embraced and not approached as something which needs to be “controlled” at all costs.
  • 30. Questions & Comments Nicholas Davis, CISA, CISSP Chief Information Security Officer UW-System ndavis@uwsa.edu facebook.com/nicholas.a.davis https://www.linkedin.com/in/nicholascv