Technology and the CEO: Information Security Technology

By Thomas Keith Meier

Some college presidents are well-versed in many of the internal aspects of information technology, while others, like me, merely admire the many benefits it offers. However, recent widespread and well-publicized security threats, as well as the opportunity to contribute this chapter, have raised my own level of awareness of information technology (IT), and I wish to thank two of my tutors in the field who are the principal contributors to this discussion: Scott Lowe, director of Information Technology, and Michael Rogers, director of Communications, both at Elmira College (NY).

There was once a day when a college could connect its campus—along with every student—to the Internet, and not have to worry much about security. The primary threat was from students who attempted to hack the college administrative systems in an effort to boost their (perhaps lackluster) grades. Those days are gone.

Of course, a college still needs to worry about the occasional computer-savvy underachiever, but today’s threats to campus information security are much more serious and sophisticated. Among the threats to college campuses today are:

Identity theft: a crime in which an imposter gains access to someone’s personal information and uses it to impersonate the innocent victim. This crime is of particular concern to college campuses, either due to historically lax policies or the use of unprotected social security numbers as student identification numbers.

Hacking and data theft: a crime in which a person gains unauthorized access to key systems, and steals sensitive data. This is sometimes followed up by actual identity theft.

Viruses and spyware: Viruses have been around for a long time, but spyware—generally, tracking software that watches what users do and reports activity to a home base—is a relatively new phenomenon that can have serious security consequences if left unchecked.

Because of these issues and the explosion of all things Internet, IT security has quickly moved from a back-burner, “would-be-nice-if” task to a critical and ongoing investment for any campus that relies on technology for its services. Information security often is compared to a war in which the allies need to stay one step ahead of the enemy. Presidents and other senior leaders must take steps to ensure that the college is always one step ahead. What are some ways to achieve this evermore elusive goal?

IT Security Goal: One Step Ahead

Probably the most important security goal is identifying the campus risk areas. Most college administrators have read about the unfortunate situation at George Mason University (VA) in early 2005. In short, attackers gained access to sensitive campus systems and may have snatched as many as 30,000 personal student and employee records, including social security numbers. This is not the kind of publicity that any institution seeks. In this case, one major risk area for George Mason was its administrative system’s use of the social security number as a student identifier. Ironically, the university was in the process of converting to an unrelated student identifier at the time of the security breach.

Key areas that need to go through a risk analysis include administrative servers, e-mail systems, institutional desktops, and the student residential network, for a start. The simple truth: Every area on campus that has stored electronic information needs to be secure. Even the office computer in the Department of Buildings and Grounds could be a risk. How? Consider this: Suppose a student submits a request to Buildings and Grounds and that department uses the student ID number to track the request. Further suppose that the institution still is using social security numbers as a student identifier— the conclusion is obvious.

Second, institutions need to make sure they have the appropriate policies in place and that those policies are enforced. For example, d'es the campus have an acceptable use policy as well as an enforced password policy? If not, those policies should be in place, and IT must have the means and the authority to enforce them. For help creating or revising such policies, Educause and the Cornell Institute for Computer Policy and Law have compiled hundreds of information policies from dozens of campuses and made them available on the Educause Web site.

Target Student and Employee Threats

A study conducted by the US Secret Service and the Carnegie Mellon Software Engineering Institute found that 78 percent of computer crimes carried out at financial institutions were accomplished by authorized users—that is, users who had the right to access the affected systems. While not operating a financial institution, colleges and universities do house information that is compelling for data thieves, including social security and credit card numbers.

An information security policy should limit access to key systems to only those who require access in order to perform their jobs. Too often, campuses provide access to almost every system to every employee—without determining who has a “need to know.” Unfortunately, every person with access to a key system becomes a potential threat to the institution’s information security.

Some universities provide inappropriately wide access in the mistaken belief that to limit access is to communicate that the institution distrusts its own employees. With today’s high stakes in IT, common sense dictates restricting access. After all, colleges do not make explosive laboratory chemicals or the institution’s checking accounts available to everyone on campus.

Another part of an information security policy should detail exactly what kind of data is stored and why. For example, colleges may need to store social security numbers for financial aid reporting, but are they storing other information that leaves the institution at even greater risk? Maybe it d'esn’t have to be that way. For instance, instead of storing student credit card numbers for tuition payment, one might consider outsourcing this activity to a competent third party with a security infrastructure designed to handle this kind of activity, thus avoiding the liability of storing credit card numbers.

A further feature of a solid security practice lies in the technology the college uses. To implement effective security policies, the technical environment must, of course, be conducive to security. Not very long ago, this meant placing a firewall (a device that blocks unwanted and uninvited visitors from the Internet) between the campus network and the Internet. With this firewall in place, the theory went, unauthorized visitors could not gain access to critical information systems and cause damage. Today, while a firewall is still critical, it is but one cog in the security wheel. There are additional hardware and software components that are required to protect systems.

The first technical solution relates back to the point made earlier about the judicious control of access to key systems. One should make sure this is enforced through a technical solution as well. For example, on some campuses, student computers can “see” key administrative servers, but the students do not have accounts to access these systems, so they may be deemed “safe” when in fact they are not. For every key system on campus, ask the question, “Who needs to access this service?” and make sure that IT takes the technical steps necessary to lock others out. In the example above, no student computer should even be able to see an administrative system.

The seemingly mundane task of keeping virus scanners current also is important to preventing problems. Some viruses take advantage of vulnerabilities on the computer to allow access by a third party. By keeping the virus away, one also keeps the third party away, so institutions should insist on a current virus scanner across the board—on all institutional machines, as well as on all student computers, without exception.

Education and Oversight

The final areas on which to concentrate security efforts lie in education and oversight. Educate users about the risks of lax practices, such as writing passwords on sticky notes and posting them on their monitors, and about sharing passwords with others. A password shared with the wrong person can lead to data theft that could make the institution a case study in systems security mismanagement. Make sure the IT staff has the skills necessary to keep the university’s information safe. One might even consider having an IT staffer whose responsibility it is to question, learn, and advise the campus community about potential security threats. After all, the college is most assuredly not the last place in which students will need to be armed with knowledge they can use to protect themselves from fraud. On the oversight front, consider contracting with a third-party company that performs information security audits. The results of such an audit can help quickly identify weak areas in information security infrastructure and may avoid serious problems.

IT has become a strategic component for many campuses. Along with the benefits of IT inevitably come the dangers, including the security threats outlined here. Using some of the information discussed herein, college leaders could certainly reduce the risk of succumbing to security threats—and keep their institutions out of the headlines.

Thomas Keith Meier has served as the 12th president of Elmira College since 1987. Previously, he was the 17th president of Castleton State College (VT) for eight years. SunGard SCT (www.sungardsct.com) is publisher of President to President: Views of Technology in Higher Education (2005), from which this article is excerpted, and is corporate sponsor of the New Presidents program. Marylouise Fennell, co-editor of President to President, is coordinator of the New Presidents program, and senior counsel to the Council of Independent Colleges (www.cic.edu). Scott D. Miller, also co-editor, is president of Wesley College (DE), and chair of the program.

Featured

  • glowing blue nodes connected by thin lines in an abstract network on a dark gray to black gradient background

    Report: Generative AI Taking Over SD-WAN Management

    In a few years, nearly three quarters of network operators will use generative AI for SD-WAN management, according to a new report from research firm Gartner.

  • abstract pattern with interconnected blue nodes and lines forming neural network shapes, overlaid with semi-transparent bars and circular data points

    Data, AI Lead Educause Top 10 List for 2025

    Educause recently released its annual Top 10 list of the most important technology issues facing colleges and universities in the coming year, with a familiar trio leading the bunch: data, analytics, and AI. But the report presents these critical technologies through a new lens: restoring trust in higher education.

  • abstract image representing AI tools for reading and writing

    McGraw Hill Introduces 2 Gen AI Learning Tools

    Global education company McGraw Hill has added two new generative AI tools to help personalize learning experiences for both K–12 and higher ed students, according to a news release.

  • abstract image of fragmented, floating geometric shapes with holographic lock icons and encrypted code, set against a dark, glitchy background with intersecting circuits and swirling light trails

    Education Sector a Top Target for Mobile Malware Attacks

    Mobile and IoT/OT cyber threats continue to grow in number and complexity, becoming more targeted and sophisticated, according to a new report from Zscaler.