Define a set of policies and procedures that would allow educational institutions to limit vulnerabilities while still allowing students access to academic systems.

Define a set of policies and procedures that would allow educational institutions to limit vulnerabilities while still allowing students access to academic systems.

UC Berkeley Case Study

Financial and government organizations store a good deal of personal information, such as Social Security numbers, birth dates, and addresses. As a result, they have been attractive targets for hackers. Because most of these institutions have improved their access controls, hackers may choose instead to attack organizations with similarly valuable data but lower security.

Read the Case Study at the end of Chapter 5. Perform the following and present the results in a 1- to 2-page report:

· Define a set of policies and procedures that would allow educational institutions to limit vulnerabilities while still allowing students access to academic systems.

· Determine who should be ultimately accountable for ensuring that a security policy is in place and is enforced.

· Identify the person at your school who is responsible for maintaining the security policy and prepare your recommendations as a memo to him or her.

Your report should be written in APA style.

Case Study: The Hack at UC Berkley

Hackers broke into a computer at the University of California at Berkley recently and gained access to 1.4 million names, social security numbers, addresses, and dates of birth that were being used as part of a research project. The FBI, the California Highway Patrol, and California Department of Social Services were investigating the incident. Security personnel were performing a routine test of intrusion detection when they noticed that an unauthorized user was attempting to gain access to the computer. A database with a known security flaw was exploited, and a patch was available that would have prevented the attack. The negligence in attending to the known security flaw appears to be a common mistake among institutes of higher learning in the state. Banks, government agencies, and schools are known to be the top targets for hackers. Hackers may attack financial institutions in an effort to profit from the crime, and government agencies to gain notoriety. Private companies generally have made at least some effort to ensure that data is secure, but hackers attack institutes of higher learning often because there are frequent lapses in security. This not only presents a problem for the university, but also is a danger to other entities, since denial of service attacks may be generated from the compromised university computers. One of the problems at universities may be the lack of accountability or of an overarching department that has authority to oversee all systems, and limit modifications. In the name of learning, many less qualified individuals, sometimes students, are given authority to make modifications to operating systems and applications. This presents a continuing problem for administrators and represents a threat to all who access the Internet.

Research:

1. Perform quarterly Vulnerability scans of networking devices and servers “A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures.” The report provided from a Vulnerability scan can help direct the IT staff to most critical risks within their network A policy should be created that states that any critical items on the vulnerability scan report should be fixed before the next scan.

2. Internal monitoring of network through SIEM Security Information and Event Management. SIEM’s collect security related event logs from servers, security and   networking devices. These logs are put together and through data analysis can look for patterns that may identify an ongoing breach or suspicious activity.

3. Network segmentation – place databases of student information on a different segment than the guest internet. Place firewall between the two segments to prevent unauthorized users from gaining access.

4. 2 Factor authentication – In 2 factor authentication, not only will you provide a password, but you will need a second authentication factor that is physically in your possession such as a token or a smartphone.

 

I believe an Information Security Officer sitting within the IT organization should be ultimately responsible.

 

Walden U is lucky because they don’t many, if any guest users connecting to their network.

 

What is network vulnerability scanning? – Definition from WhatIs.com. (2018). SearchSecurity. Retrieved 14 June 2018, from https://searchsecurity.techtarget.com/definition/vulnerability-scanning?src=itke+stub

 

What is security information and event management (SIEM)? – Definition from WhatIs.com. (2018). SearchSecurity. Retrieved 14 June 2018, from https://searchsecurity.techtarget.com/definition/security-information-and-event-management-SIEM

 

Metivier, B. (2018). The Security Benefits of Network SegmentationSagedatasecurity.com. Retrieved 14 June 2018, from https://www.sagedatasecurity.com/blog/the-security-benefits-of-network-segmentation

 

What is two-factor authentication (2FA)? – Definition from WhatIs.com. (2018). SearchSecurity. Retrieved 14 June 2018, from https://searchsecurity.techtarget.com/definition/two-factor-authentication

Research #2

Here is also what I’ve come up with

Define a set of policies and procedures that would allow educational institutions to limit vulnerabilities while still allowing students access to academic systems.

1. Provide access control within the system so the appropriate information is accessed to authorized individuals.

2. Insure that the physical security of the network is in-place to prevent any harm to the systems hardware and software.

3. Provide authentication by using passwords and login id’s to insure the correct person is accessing their information.

4. Insure that encryption is used to protect the integrity of the data that’s being transmitted.

5. Provide information on how security will be enforced and what the penalties and violations are if violated.

6. Provide security training to staff and students to insure they know the proper use of the system.

7. Provide an incident and response plan so that users know what to do if the is an intrusion.

Determine who should be ultimately accountable for ensuring that a security policy is in place and is enforced.

The university is responsible for implementing a security policy because they are ultimately responsible for the safeguarding of the confidentiality, availability and privacy of all information.

Identify the person at your school who is responsible for maintaining the security policy and prepare your recommendations as a memo to him or her.

At Walden University the Security Policy is within the student handbook and falls within the Technology Policy for Security of Information. The contact person for this policy is:

Office of General Counsel   Laureate Education, Inc.   650 S. Exeter Street   Baltimore, MD 21202

Here is my memo:

6/14/2018

Subject: Security Policy

Hello,

I would like to discuss with you some recommendations that I think will benefit the Walden University’s security policy in the future. To insure the security of the system at the university, I recommend that there’s an emphasis placed on access control, physical security, authentication, encryption, compliance, training and an updated response plan to ensure that information is protected.

Please feel free to contact me if you have any questions. I appreciate your time and consideration.

Sincerely,


Comments are closed.