Security

101 BEST PRACTICES SECURITY

101 Best practices SecuritySecurity is the opener of our special 101 Best Practices guide for this December 2005. Scan the 34 items that follow in this section to find issues and challenges that your college, university, or system is facing right now. In a glance, you’ll find answers or leads to solutions that will help you get your own initiative off the ground, or remove roadblocks in your way. Use the links provided to find more in-depth information in original articles and white papers, or on Web sites. Identity theft, risk assessment, authentication and countering spyware are just a start.


1

Hack Job

avoid security breachesIn his April 2005 Campus Technology feature on security technology, senior contributing editor Matt Villano suggested that the best way to avoid security breaches might be to pay for them: 'In the last two years, [hack] attacks have occurred at the University of Georgia, the University of Texas at Austin, the University of Missouri-Kansas City, the University of California-San Diego, and the University of California-Berkeley, to name a few. In all of these cases, the hackers exploited vulnerabilities in technology set up to foster collaboration and the free exchange of information. Across the board, the hackers scored sensitive information, putting users at risk. These cases may not represent the norm across North America, but increasingly, US schools are feeling the need to step up security measures to protect their users from invasions of this kind. Most schools take a traditional approach, purchasing the latest and greatest Intrusion Prevention System (IPS) technology from vendors that serve the corporate world...' A plethora of security products exist, and on many campuses you'll find a mixture of Intrusion Detection Prevention (IDP), Secure Socket Layer (SSL), and Virtual Private Network (VPN) technologies, in products such as the FortiGate line from Fortinet, and the REM Security management console from eEye Digital Security. Vendors such as Symantec, Check Point Software Technologies, and Cisco Systems have also unveiled products that draw from these technologies. Villano points out that some schools use a multi-pronged strategy, '...combining off-the-shelf tools with proprietary measures, to keep things safe. And some of these trailblazing schools champion a strategy that employs the services of 'ethical hackers' to poke around a network to find vulnerabilities for system administrators to fix.' Read more

2

UC-Berkeley's reaction to 98K+ missing SSNs

On March 11, 2005, someone walked off with a notebook computer containing the Social Security numbers of thousands of applicants and students, current and former, from UC-Berkeley's Graduate Division records. The computer, taken from a restricted office area, contained data from as far back as 1976 to the spring of 2004, including birthdates and/or addresses to match the SSNs and names in about a third of the records. Administrators at UC-Berkeley were reeling from the realization that on the same campus where Nobel laureates push at the boundaries of human endeavor, 98,000-plus SSNs were left exposed on an easily lifted laptop computer. The university quickly provided 'I.D. Alert' Web pages with helpful information about the incident, including a variety of useful resources on identity theft for individuals whose personal information might have been compromised. The Web pages serve as a good model for dealing with at least one aspect of a painful issue. Read more

3

Can I Have My Wallet and Keys Back, Howard?

A man well ahead of his time, the late technology visionary, strategist, and speaker Howard Strauss was proposing 2015 technologies at the 2003 Syllabus conference, and had audiences still mulling over his comments in 2005. In this Educause Quarterly article responding to Strauss's proposals, Glenn Everett considers potential personal ubiquitous portal technology (PUP) and, indulging in a 'smidgen of paranoia,' poses some questions about future privacy. Read more

4

'You have no privacy. Get over it.'

Sun Microsystems Chairman and CEO Scott McNealy's haunting words from 1999 still hang over a complex, patchwork landscape of security and privacy issues today. In 'Privacy & Compliance, Better Safe than Sorry,' UCLA's director of Information Technology Policy Kent Wada offered CT readers some insight into the security/ privacy dilemma on campus, along with a few principles to consider as they rally to protect institutional data and wade through the 'alphabet soup' of external regulations: 'Beyond individual state legislation, there is an alphabet soup of federal legislation that colleges and universities must comply with. HIPAA, the Health Insurance Portability and Accountability Act, defines privacy and security standards for the protection of personally identifiable medical information, among other things. GLBA, the Gramm-Leach-Bliley Act, creates obligations to protect customer financial information. Then there is FERPA, the Family Education Rights and Privacy Act protecting student information, already well-known to higher education. FERPA, however, is also one of more than a dozen statutes amended by the USA PATRIOT Act of 2001 (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism), to give law enforcement greater access to confidential information... Technologists, higher education, and others have spent decades making online access to information ubiquitous. The grand challenge now lies in managing the access to meet societal expectations not just about access, but about privacy as well.' Read more

5

Role-based access:
A case study at UNC-Charlotte

Enterprise Systems columnist Mathew Schwartz recently took a look at access control technologies: 'Goodbye mainframe, hello access-control questions. When the University of North Carolina at Charlotte began moving from mainframe-based financial and human resources systems to Oracle databases, application servers, and multiple Web interfaces, IT security officer Carter Heath knew he'd have to adapt. 'We always had Resource Access Control Facility (RACF) sitting in front of the mainframe for access control purposes. That provided us assurances of who's getting what off of the mainframe.' In the emerging postmainframe environment, however, the university still needed access controls, but the question was, what would they be? Furthermore, would they fit the existing security paradigm? 'We're here to guard things,' notes Heath. 'We don't own your data, we don't own those systems. We're here to provide security protections to those systems, and enable you to get access into those systems in the most secure manner possible.' ...He came across the Identity appliance from Trusted Network Technologies (TNT), a device 'that was able to provide access control to multiple resources by an identity,' he says. 'That was intriguing.' In January 2005, he received an evaluation unit, and by May the university had purchased an Identity appliance and added it to the production environment. Currently it's using Identity version 2.0. From an identity management standpoint, Heath is lucky: the university, a Novell shop, already had extensive institutional experience with access controls, and was using ZENworks from Novell for application delivery. It also had Microsoft's Active Directory, as well as group-level permissions and processes for adding or removing users. Hence the TNT appliance was able to work with an existing infrastructure.' Read more

6

Are our institutions getting a 'black eye' over identity theft?

In 2005, the cumulative effect of reports in the popular press about security breaches on college and university campuses has apparently taken its toll, at least on the public's confidence level about the security of personal data on campuses in general. An August 21, 2005 article in The Boston Globe examines the problem. What's your institution's rep? Read more

7

Sensitive data: here, there, and everywhere

Back in March 2005, CT asked Indiana University's Chief Security and Policy Officer Mark Bruhn for his Top 10 IT security and policy recommendations. They included: Get rid of sensitive data ASAP; make everyone responsible; give users a method to communicate sensitive info; realize that security is a cost of doing business. Get all Top 10.

8

The 'Zen' of Risk Assessment

Risk assessment may take time and resources, but if you make it an ongoing process, you may not only manage costs—you may also see greater benefits. In an Educause Quarterly article, Cedric Bennett and Richard Jacik examine risk assessment: 'Leverage What You Know: We recommend an approach for assessing risk in which overall risk assessment is more of an ongoing process than a project. It produces usable results from the start, which can provide broad guidance for security strategies and plans and also focus traditional risk assessment toward specific assets and resources.' Read more

9

Beating the Spim-Spam Man

the battle against viruses and spamContributing editor Wendy Chretien gave beleaguered IT professionals hope in the battle against viruses and spam, in her April 2005 CT article: 'Are your users asking IT to please do something about spam? What about spim (spam via instant messaging)? Were your campus network services on the ropes after that last malevolent virus attack? ... A multilevel approach considering all potential malware entry points will provide your campus with the most effective protection. Tools in your box include communications with users, judicious use of policies and enforcement, and specialized training for network administrators, as well as more tangible options such as focused software and hardware... [User Desktops and Laptops] is where most campus IT folks surrender, because it's notoriously difficult to manage all the disparate devices out there... Today, there are feasible methods to combat the virus threat at this level, assuming one has the support of the campus... Examples include Symantec Antivirus Corporate Edition (Norton is now owned by Symantec), McAfee Active Virus Defense, Sophos Anti-Virus, and Trend Micro. A relatively new technique to ensure compliance is to compel users' systems (on login) to first access a security system, which checks the system for antivirus software and which will deny full network access if that software is not present and/or updated. Some of these solutions can also download the latest antivirus version to the non-compliant system. Cisco Systems calls its version the 'Network Admission Control.'' Read more

10

How do you take your spam?

Spam and e-mail scams are changing from day to day. They're not only changing shape, eluding management strategies—they are getting worse; more dangerous. For those looking for an easy-to-follow update, an article provided on the AppRiver Web site serves as a good summary of what's happening with 'The Waning Innocence of Spam.' (Regarding the notion of innocent spam, feel free to ask, 'Was it ever?') Read more

11

Fighting spyware:
The first step is understanding it

The Anti-Spyware Coalition, a group 'dedicated to building a consensus about definitions and best practices in the debate surrounding spyware and other potentially unwanted technologies' has released a draft of its 'Spyware Definitions and Supporting Documents.' The coalition, made up of software companies, academics, and consumer groups, will consider public comments about the document in its quest to understand how to control the rogue technologies. During this process, the draft document will be helpful to interested parties who are—often desperately—grasping at ways to combat the stealthy menace. Are your vendors trying to understand spyware? Currently, about 30 security-conscious companies and organizations are involved in the coalition, among them: Blue Coat Systems, Computer Associates , Dell , F-Secure Corp., HP, Mi5 Networks, LANDesk, Lavasoft, McAffee Inc., Microsoft, Panda Software, Sophos, Symantec, Tenebril, Trend Micro, Webroot Software, Websense, and Yahoo!. Read more

12

Spyware monsters

Spyware monsters

'There is really no cure-all solution for spyware,' advises Christofer Sean Cordes in his November 2005 Educause Quarterly article, 'Monsters in the Closet: Spyware Awareness and Prevention.' But awareness helps, along with some understanding of the general characteristics of spyware and the efforts underway on behalf of spyware prevention. And if you want an ounce of prevention, Cordes has some specific suggestions, mentioning a range of possibilities including Spykiller.com (now TrustSoft), Lavasoft's Adware , Spybot Search and Destroy , and even add-ons like the Google Toolbar with Popup Blocker or SpoofStick . Read more

13

Is spyware impacting the ways people choose to use the Internet?

Spyware is prominent among the blights that interfere with or flaunt otherwise easy and fruitful access and exchange of information via the Internet. In a report published this past summer by the Pew Internet & American Life Project, analysts concluded that nine out of 10 Internet users have adjusted their behavior out of fear of falling victim to spyware, and that many of the 'fears are grounded in experience.' Read the report

14

Doing the right thing for cybersecurity on campus

What responsibility do presidents and CIOs have to ensure cybersecurity on their campuses? Explore the question in an Educause/Internet2 Computer and Network Security Task Force video produced by George Mason University (VA). Among other issues, a panel discussion considers a recent statistic that in the corporate world, an estimated 80-plus percent of corporations have had security breaches that went unreported. But higher education may have a better approach: Speaking about the higher education community, University of Maryland, Baltimore County CIO Jack Suess comments, 'When we have incidents, we're reporting them, we're making them public; we're doing the right thing.' Presidents, CIOs, security officers, and others in higher education who are trying to do the right things for their campus environments may wish to download the video.

15

Incident report categorizations and factor analysis

Made possible by funding from the National Science Foundation and the Educause-Internet2 Security Task Force, the 'Final Report of the Computer Incident Factor Analysis and Categorization Project, Volume I: College and University Sample' covers more than 300 security incidents over a two-year period. The report provides detailed information from 36 colleges and universities, including factor analysis and recommendations for mitigation and prevention. Read the report

16

Data Incident Notification Templates

Recently contributed by the Security Task Force (established by Internet2 and Educause) and posted on the Educause Web site, these incident notification templates can help you communicate quickly and effectively should your institution experience a breach. Read the report

17

Education, incident response, and technical controls

Public communication of a network security strategy is a key element in any IT organization's security arsenal. Penn State's network security strategy was recently articulated as a three-pronged approach, and one that would not threaten the culture of openness. A short article offered by the university's online news service presents the essentials effectively. Read more

18

The Case for IT Security in Academia

IT Security in AcademiaIn a January/February 2005 Educause Review article, 'Leading by Example: The Case for IT Security in Academia,' Mary Ann Davidson, Oracle's chief security officer, examines ethics, economics, and the social implications of IT security, outlining academia's leading role in the broader discussion of securing cyberspace. Read more






19

While IT security concern grows, progress on DR planning is slow

Campus Computing's 2005 National Survey on Information Technology in US Higher Education points to a growing concern about IT security on campus: 'College and university IT officials identify 'network and data security' as the 'single most important IT issue' affecting their institutions over the next two-three years,' begins the executive summary. Notably, a new survey item reveals that half (50.7 percent) of responding institutions experienced hacks or attacks on their campus networks. The report also notes that disaster recovery planning hasn't gained much ground: 'Surprisingly, four years after the September 2001 attacks and the then very public discussions about IT disaster recovery, only three-fifths (57.4 percent) of campuses report a strategic plan for IT disaster recovery, little changed from 2004 (55.5 percent) or even 2002 (53.0 percent).' Read more

20

Katrina takes its toll on higher education

An interactive map on The Chronicle of Higher Education's Web site offers a good overview of the damage by Katrina to several campuses on the hurricane-ravaged Gulf Coast. Mouse over the locations to display individual summaries—click through for an inset map of New Orleans.

21

When is a disaster too catastrophic?

disaster recovery planningIn November 2005 CT, contributing editor Dian Schaffhauser took a long look at disaster recovery planning: 'Although many have argued that the proportions the disaster Katrina wrought (a Category 4/5 hurricane accompanied by no end of additional and devastating complications) went far beyond a scale that can be planned for, others insist that the tools of disaster recovery planning (DRP) aren't necessarily prohibitive in terms of dollar or time investment, nor do they need to be highly complex. Keeping up a blog on an emergency Web site d'esn't require complicated technology, for instance. And while populating a blog is a far cry from rebuilding research data that has been destroyed, on the heels of any disaster communication becomes vital: It is the link that holds survivors and supporters together while they take emotional and physical stock. In such times, reliable information becomes gold.' There are also many types of communications solutions available from vendors; one example is Telident 911 from Teltronics, a system that pinpoints the location of any 911 call on the campus PBX and feeds the information to local police and fire dispatch centers, as well as to campus emergency personnel. Besides emergency communications strategies, colleges and universities have a range of data recovery solutions in place, such as maintaining real-time disk-based backups using software like Symantec LiveState Recovery. And Schaffhauser points out that 'For some, data is concern number one in any DRP. Keenan Baker, a storage specialist with technology products and services provider CDW-G, considers the focus on data protection the starting point of any disaster recovery plan.' Other companies like universal hardware solutions provider STORServer can also provide integrated solutions incorporating server, disks, tape, and software, along with integration services, so your institution can be prepared with incremental backups. Read more

22

From the edge of Katrina - Louisiana State University's

Brian Voss offers a unique view of disaster planning, asking, 'What if you're the last ones standing? Traditional DR thinking has to do with what to do if your data center is gone. How do you recover? How do you restore services for your institution? And that's very valid, as my colleagues at Tulane (LA), UNO, and other New Orleans universities are experiencing most directly right now. But what if your campus suddenly becomes the refuge for not only your neighboring institutions, but also local, state, and federal agencies? What if you are the site of last resort? How will you deal with a sudden influx of users placing unimaginable demands upon your environment and resources?' Read more

23

Outsourcing or Out of Business?

John Webster's article for Campus Technology's C2 newsletter proposes outsourcing as a disaster planning strategy. 'The timestamp says Wednesday 8/24/2005 11:46 AM. The subject line reads 'UCIS 182-81 PeopleSoft Tools.' It is the final e-mail I will receive from Tulane University (LA). Forty-eight hours later I receive a phone call, informing me of the evacuation of the school... According to the Association of American Universities, more than 30 colleges and universities along the Gulf Coast were severely damaged by hurricane Katrina. Tulane...was among the hardest hit. Its 13,000 students will not return this semester, awaiting the school's projected January reopening... For me, Katrina changed the way I will address Disaster Recovery (DR) planning. Much like post 9/11, this is a good time for schools to revisit disaster planning—or the lack of it—in preparation for the next campus-killing event we all know is out there.' Read more

24

Before the Disaster

Want yet another take on disaster recovery planning? Security columnist Doug Gale posed the following question in the April 2005 issue of CT: 'Why focus on disaster recovery, when effective business continuity management could keep recovery to a minimum? ... People are often confused about the difference between disaster recovery and business continuity management (BCM). Yet, while disaster recovery is the act of recovering from a disaster, BCM is a broader term that includes anticipating and planning for bad things, as well as the actual disaster recovery process. Let's put it this way: After the flood, Noah was practicing disaster recovery; before the flood, he was practicing business continuity management. Basically, business continuity management attempts to answer two questions: a) What can go wrong? And b) How can an institution reasonably prepare to minimize the impact? ... Business continuity management is neither easy nor cheap. But in an increasingly complex world driven by intertwined systems, it is essential.' Read more

25

Do you have 'roaming scholar' problems?

In his article on 'Federated Network Authentication,' online at O'Reilly Media, Matthew Gast explains: 'Researchers and scholars may hold appointments at multiple institutions or be involved in research teams that draw members from across the country or the world. Frequent visitors require network access. Without a full-time appointment, they may not be eligible for full access at the visited institution, but the hassle of repeatedly provisioning guest accounts is no solution.' Gast relates some of the current buzz about federated network authentication, and provides his own observations: 'To reflect the messy realities of building a federated network, a more generic trust mechanism needs to be developed.' Read more

26

Wireless Security with 802.1x

In a recent Educause Live! Webcast seminar, Michael Griego helps you understand how the 802.1x standard can authenticate wireless users and provide encryption. Referencing his experiences at the University of Texas-Dallas, Griego provides information about the technology in the higher education context while he sorts out the issues of authentication with 802.1x. Read more

27

Authentication: The Power of Who

AuthenticationIn the January 2005 issue of CT, senior contributing editor Matt Villano checks out identity management applications on campus, where next-generation technologies may be closer than you think: 'In the ever-changing environment of academic technology, it's one thing to secure your enterprise network, but entirely another to provision it to control access based on a user's identity. With this in mind, imagine a network that grants access to certain systems based upon who a particular user is; a network that requires users to sign in only once, and remembers who they are for the remainder of their session. Think of a network that d'esn't require passwords at all; a network that ties all access to a USB key or the biometric codes of a human fingerprint. Then, envision a network combining all of these characteristics; so sophisticated it operates seamlessly with networks at other schools, and allows users access to similar systems elsewhere in the academic world.' An example of trailblazing identity management is Temple University (PA): 'Today, all of the school's identity management is tied together under one solution: Sun Java from Sun Microsystems. When users register on the system, they are provisioned for systems of every sensitivity level. If a user is expected to perform nothing on the campus network but e-mail and other basic functions, all that he needs to access the system is his password. If a user is expected to access more sensitive systems, he is given additional authenticating factors, such as the USB token or access to a biometric reader. Under this approach, a user's identity never needs to be re-provisioned; the more access a user needs, however, the more he must prove that he is who he says he is.' Less is more, when it comes to passwords... so how about just one thumbprint? 'Last year, Digital Persona provided [San Francisco State University] with U.are.U optical fingerprint scanners that plug into USB ports and capture a 500 dpi image of a user's fingerprint, encrypt it, send it to the Digital Persona IDentity Engine server, and compare the data with fingerprint information already stored in a database. If the system determines a match, it grants the user access to any variety of systems based upon parameters in the user's file. If the system fails to find a pairing, it denies access and offers the user only the most basic of services, which generally consists of nothing but simple Web browsing.' And at the University of Alaska, P-Synch, from M-Tech Information Technology, enables individual users to synchronize their passwords across different, multiple applications. Read more

28

If you think provisioning is a hassle, consider de-provisioning

At Western Michigan University, Director of Planning and Middleware Services Greg Lozeau observed: 'Provisioning student e-mail systems, especially with the number of different systems we had on campus, was challenging, but de-provisioning the students was painful. Sun's Java Messaging Server, coupled with the power of Sun Identity Manager, offered a better approach.' WMU's identity management case study, available via Sun's Web site, offers insight on the sticky de-provisioning problem. Read more (pdf)

29

UK schools' Shibboleth trial

Shibboleth, the open source authentication system, has enjoyed more adoption across the pond than in the US. Shibboleth provides a means to authenticate a user just once for multiple systems that operate in a federated trust model. In the UK, a very large trial this past spring involved more than 500,000 students and some 50,000 instructors. Read more

30

It's Not All About Hackers

In his September 2005 column for CT, Doug Gale focuses attention on the physical access layer of campus security: 'In our own discussions of cyber security, we often omit the simplest security of all: controlling physical access to our computer facilities. It used to be a tedious process to steal information from someone's computer, but the proliferation of small memory devices, personal digital assistants (PDAs), and music players that plug directly into a PC's USB port now make it possible to transfer huge amounts of information to an easily concealed gadget. It's also pretty easy to just walk off with a laptop. In short, controlling physical access to computers—those on desks or those in the computer room—is just as important as preventing hackers from accessing our networks.' Read more

31

Piracy on the Seas of Higher Education

The famous notion of Walt Kelly's Pogo, 'We Have Met the Enemy and He is Us,' may help point out another security issue: piracy. Especially in our own communities. In an April 27, 2005 issue of Campus Technology's C2 eNewsletter, Penn State President Graham Spanier writes: 'When we stand by idly and allow our students to abuse the privilege of high-speed Internet access for illegal downloading, we are failing our principles and we are failing our students. We are not campuses of thieves. Students don't go to the local Blockbuster and walk out with the latest DVD without paying. Undergrads don't go to the campus bookstore and sneak out with a new textbook. So why, we must ask ourselves, do we have such a moral blind spot when it comes to stealing on the Internet?' Read more

32

Piracy and the unintended consequences of technology

Piracy and the unintended consequences of technologyIn her June 8, 2005 contribution to the C2 newsletter, Rochester Institute of Technology (NY) CIO Diane Barbour wonders whether we might be 'fighting the right battle in the wrong place... I read with interest Graham Spanier's article 'Piracy on the Seas of Higher Education' in the 4/27/2005 issue of C2. Like many other university administrators I am concerned about the lack of ethical behavior and the misuse of university resources by our students as they engage in peer-topeer file sharing of copyrighted materials... By the time students arrive on campuses, they have been listening to music and watching movies online for several years and mostly for free. The behavior has become second nature to them. While they know the practice is illegal, it is not perceived to be particularly wrong. I think we need to focus on the root cause of this behavior which is the fact that ethical behavior, as it relates to technology, is not being taught in K-12. It is time to more actively engage our social scientists and K-12 teachers, to focus on teaching cyber ethics at an early age.' Read more

33

CALEA compliance

Security isn't just securing your own network; it's also complying with external demands from national security and law enforcement agencies. Among the range of compliance issues facing institutions is CALEA, the Communications Assistance for Law Enforcement Act. Though CALEA has been in effect since 1994, institutions are focusing on a new update that would potentially extend wiretaps to the Internet and could force institutions into an 'unfunded mandate' to make significant, costly changes to their networks in order to comply. Educause Policy Analyst Wendy Wigen sheds some light on this issue in an October 17, 2005 recorded interview, posted on the Educause Web site. Access the interview, and look for updates.

34

Cyber security makeover

Working with technology solution provider CDW-G, Barton County Community College (KS) employs a full-blown cyber security strategy. 'The increasing severity of computer viruses and malicious code has transformed information security from a low IT priority to an operational necessity,' says Charles Perkins, co-team leader, Information Services at Barton County Community College. 'The evolving cyber threats were outpacing our existing firewall technology and making it increasingly challenging to monitor and manage our IT environment efficiently.' Barton CCC took full advantage of advice from CDW-G, and among its security enhancements was a new firewall and Virtual Private Network (VPN) solution, which included a dashboard view of all subnets. Using built-in application intelligence from Check Point Software Technologies, Barton can identify and block malicious activity at the firewall, in real time. Read more

Featured