Download presentation
Presentation is loading. Please wait.
Published byEvan Phelps Modified over 9 years ago
1
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer Trinity College Dublin 22/05/2007
2
Overview Creating the Security Policy The Implementation Dilemma What makes the Campus Environment Different? The Answer Case Study: Trinity College Dublin
3
Campus Networks and Security Cultural Resistance Gradual infiltration Acceptance Period of rapid catch up Maturity?
4
Policies Implemented 2006 *ECAR – Educause Centre for Applied Research - 2006 IT Security Survey 492 Respondents
5
Creating the Security Policy ISO 27001 Relevant Legislation Organisational Environment Identify Assets Resources E.g. USICA Information Security Toolkit
6
Policy Main Policy Supporting policy areas: –Email –Internet use –System development etc
8
Implementation…. Governing Body Approval Communication to Users Translation to Operational Procedures Enforcement
9
Campus Implementation Difficulties Traditional ethos of free & open access to systems and information Diverse user base - Admin, teaching, research, grids, commerce, corporations, clubs, societies, college life, public guests Complex collaborative arrangements - institutions, individuals and industry Need to facilitate the rapid adoption of emerging & often immature technologies Diversity and decentralised management…
10
Traditional Implementation Management Area Head End User Area Head End User Policy Dissemination
11
University Structure Governing Body Committees Schools/Faculties Admin Areas Student Representatives Commercial Entities
12
Governing Body Admin Body Admin Areas End User Committees User Groups Committees Academic Body School/ Faculty End User Committees User Groups Student Body Student Society Student clubs End User Campus Company End User Research Affiliates End User
13
Helpful to Focus on Similarities with all Large Networks Provide High Quality, Flexible Services Protect Confidential data Protect against Internal and External Security Threats Comply with Legislation Contingency and Disaster Recovery Planning
14
Despite/Because of complexity and diversity vital to implement IT Security Framework Framework which facilitates & protects Goal
15
The Answer? Management Structure - Establish IT Security Governance/Management Structure Involve Stakeholders - Identify key stakeholders and involve in creating policy, encourage ongoing communication. High Value Assets - Identify core IT Assets and prioritise Segregation - Functional and Security Boundaries Flexibility – make provision for high risk activity - Research, new technology etc
16
Case Study: Trinity College Dublin July 2003 - IT Security Policy Approved by College Governing Body 2004 - Awareness Exercises - Email, Booklet, website 2004-2006 - Translation to Operational procedures Ongoing - Adoption of Security Technologies
17
Security Management System
18
Implementation- College IT Security Governance Governing Committee Autonomous Network End User Autonomous Network End User Trinity College Data Network Local Area IT Support reps End Users
19
Implementation Internal Agreements - Central computing department & local IT interests. Regular Communication Dissemination to IT Administration Staff & End Users Adoption of Technologies
20
Supporting Documentation Network Security Internet Use Email Use Authentication/Passwords Virus and Spam Software Development Data Backup Disaster Recovery Remote Access Third Party Access Legal Compliance Guidelines
21
Adopting Technologies Network Security– VPN, VLANs, Firewall, IDS, NAC,802.1x, guest network services, eduroam Host Security– Automatic Updates, Centrally Managed AV Enterprise Directory – secure Authentication Removal Insecure Protocols
22
Central Services Web, Mail, Proxy etc Teaching & General Research Student Services Autonomous Networks Specialized Production, Cash Registers etc Specialized Research Wireless Services Security Boundaries
23
Assessing the Progress Improved communications – move away from duplication of service Improved focus – strategic planning Incident Reporting Internal Audit – systems, applications, External Audit ISO27001 Certification
24
Future Challenges Exploding User Numbers – students/public on network, Guests, Eduroam Non traditional networked devices - PDA’s, phones, Xboxes, cameras, CEPOS Disappearing Network Boundary Rapid Adoption New technology Changing Threat profile Data privacy concerns – Help users protect their personal/financial data More important than ever to deal with these challenges via a strong IT Security Framework
25
References: http://www.tcd.ie/itsecurity/policies/ind ex.php http://www.educause.edu/ecar http://www.ucisa.ac.uk/ http://www.tcd.ie/itsecurity/policies/ind ex.php http://www.educause.edu/ecar http://www.ucisa.ac.uk/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.