Date post: | 28-Dec-2015 |
Category: |
Documents |
Upload: | benedict-blair |
View: | 214 times |
Download: | 0 times |
EDUCAUSE Center for Applied ResearchEDUCAUSE Center
for Applied Research
Safeguarding the Tower: IT Security in Higher
Education 2006
EDUCAUSE Webcast
December 15, 2006
John VoloudakisCopyright ECAR, 2006. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish
requires written permission from the author.
Safeguarding the Tower: IT Security in Higher
Education 2006
EDUCAUSE Webcast
December 15, 2006
John VoloudakisCopyright ECAR, 2006. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish
requires written permission from the author.
Page 3
Research Methodology
Literature review of material published from 2003 – 2005, with the intent of identifying issues of concern to the higher education community, and creating additional hypotheses to test
Consultation with security experts, including members of the EDUCAUSE/Internet2 Computer and Network Security Task Force, and IT leaders at 17 higher education institutions
A quantitative web-based survey first used in 2003 was modified to reflect changes in technologies and practices. 492 higher education institutions responded to the survey
A longitudinal analysis compared the survey findings with those from ECAR’s 2003 study. 204 institutions responded to both surveys, and that population was used to perform the comparison
Page 4
Respondents represented institutions in all Carnegie classes, with strongest representation from doctoral
institutions
• Note that since a random sampling was not used, some sample bias may exist in the results. However, given the large size of the sample, we feel this bias is acceptable
• The population used for longitudinal analysis shows a slight bias (less than 5%) toward DR and MA institutions
• The current study shows far less difference in IT security practice by Carnegie class than in 2003
• 38% of respondents were public, 62% private. We found little difference along this dimension
264 242
120
617
439
130
610
312
45
1730
315
76
0200400600800
10001200140016001800
DR MA BA AA
Carnegie Institutions EDUCAUSE Members Survey Respondents
Page 5
Respondents also represented a spectrum of institutional size, with smaller institutions more prevalent
• 44% of respondents had under 4,000 students, while fewer than 20% had over 15,000
• The mean student body for the current study was 8,375, compared to 7,169 in 2003
• Institutional size was less significant than in the 2003 study, but there are differences, especially in the areas of planning and awareness programs
Numbers represent student FTE
8001 - 1500016%
15,001 - 2500013%
25000+7% 4001 - 8000
20%
2001 - 400021%
Under 200023%
Page 6
Survey respondents were mostly CIOs and other IT professionals
• There was a major shift in respondents’ titles from 2003 to the current study. The number of CISOs grew by 97%, while the number of CIOs grew 15%. This growth replaced directors of networking, administrative, and academic computing
• The average experience of our respondents with IT Security was 13.9 years, with nearly 25% reporting more than 20 years of experience
Vice President / Vice Provost (non-CIO)
2%
IT Security Officer (or equivalent)
21%
Dir. of Networking7%
Other IT Mgmt.8%
Non-IT Mgmt.2%
Dir. of Academic Computing3%
Dir. of Admin. Computing5%
CIO (or equivalent)52%
Page 8
Significant new penetration* of key security technologies was observed
* Note that these findings do not show the penetration rate within the institution – numbers may include pilot projects as well as full deployments
** This data includes only the institutions that responded to both studies
Approach
Implemented(2005)
Currently Implementing
(2005)
Percent used in 2005**
Percent used in 2003**
Rate of change
2003-2005
Network firewalls (perimeter) 83.4% 5.3% 77.0% 68.1% 13.1%
Centralized data backup system 76.4% 10.7% 76.6% 68.1% 12.5%
Virtual private network (VPN) for remote access
74.6% 10.8% 75.4% 45.6% 65.4%
Enterprise directory 68.3% 14.5% 71.9% 46.3% 55.3%
Network firewalls (interior) 66.1% 13.7% 65.0% 51.0% 27.5%
Intrusion detection 55.7% 17.0% 62.3% 46.1% 35.1%
Active filtering 57.8% 6.6% 59.3% 29.7% 99.7%
Intrusion prevention 39.8% 15.8% 44.3% 33.5% 32.2%
Security standards for application or system development
32.2% 19.1% 32.4% 27.5% 17.8%
Electronic signature 7.4% 10.3% 6.4% 5.9% 8.5%
Shibboleth 2.7% 5.6% 4.9% 1.5% 226.7%
Page 9
Observations on penetration of security approaches
There was significantly less difference in technologies in use by Carnegie class than in 2003
Use of perimeter firewalls greatly increased at doctoral institutions (21%), though they still deploy less than other types of institutions. These institutions made heaviest use of VPN as well (83%).
The average responding institution utilized 7.5 of the 16 approaches listed. 5% used 13 or more approaches, and 10% reported 3 or fewer
Page 10
Strong advances in wireless security were also observed
Approach
Implemented (2005)
Currently Implementing
(2005)
Percent used in 2005
Percent used in 2003
Rate of change
2003-2005
Firewall 71.4% 6.6% 74.1% 41.4% 79%
Remote authentication dial-in user service (RADIUS)
54.4% 2.9% 50.8% 45.9% 10.7%
Internet Protocol Virtual Private Network (IP VPN)
47.8% 10.5% 51.5% 29.9% 72.2%
128-bit Wired Equivalency Privacy (WEP)
34.5% 6.7% 39.5% 29.6% 33.4%
Wireless vendor supplied proprietary solution
25.7% 5.7% 28.6% 18.2% 57.1%
Kerberos 21.2% 3.2% 26.2% 13.2% 98.5%
Extensible Authentication Protocol (EAP)
19.7% 8.5% 22.6% 7.7% 193.5%
40-bit Wired Equivalency Privacy (WEP)
19.6% 1.9% 21.1% 17.5% 20.6%
Advanced encryption standard (AES)
14.2% 5.5% 18.9% 4.4% 125.4%
• Doctoral institutions reported somewhat higher usage of wireless security approaches than others
Page 11
Little change in authentication approaches was observed from 2003 to 2005
• Higher education’s usage of non-password authentication lags other industries• 90% of respondents use 3 or fewer approaches. This is a change from 2003, where 65% used 3 or less• Doctoral institutions were the primary users of non-password authentication methods
Approach
Implemented (2005)
Currently Implementing
(2005)
Conventional password/PIN 94.4% 0%
Strong password 59.9% 12.8%
Kerberos 26.9% 2.9%
Secure ID-style one-time password 8.9% 2.8%
Other multi-factor authentication methods 8.1% 4.0%
PKI certificate (software) without PIN 6.8% 1.3%
PKI certificate (software) with PIN 5.1% 1.5%
Biometric identification 2.8% 2.3%
PKI hardware token with PIN 1.7% 1.7%
PKI hardware token without PIN 0.9% 0.9%
Page 12
Security strategies employed by institutions vary
Approach
Implemented (2005)
Currently Implementing
(2005)
Percent used in
2005
Percent used in 2003
Rate of change
2003-2005
Limiting the types of protocols allowed through the firewall/router
87.1% 7.4% 88.7% 73.0% 21.5%
Restricting and eliminating access to servers and applications
79.6% 14.9% 80.9% 70.1% 15.4%
Timing-out access to specific applications after an idle period
77.0% 6.2% 76.0% 65.0% 16.9%
Instituting a recovery or back-up plan in the case of disasters caused by natural events or by human acts
46.4% 30.8% 44.3% 46.3% (4.3%)
Limiting the URLs allowed through the firewall
34.7% 5.6% 29.1% 26.9% 8.2%
Installing a software inventory system to watch for malicious software or program changes
16.4% 17.2% 17.7% 11.4% 55.3%
Using security devices (cards, biometric scanners, etc.) for authentication
14.0% 7.2% 15.8% 12.3% 28.5%
• Doctoral institutions report lower overall usage of these strategies, but usage patterns are consistent across Carnegie types
• More than 20% of institutions are still not implementing a disaster recovery plan
Page 13
Day to day responsibility for IT security varies by institution
• 71% of IT Security Officers work at doctoral institutions, down from 90% in 2003. Nearly all reporting institutions with enrollments over 25,000 had a full-time security officer
• 67% of these individuals work full-time on security• The salary range for IT security officers rose from the $50-74,000 range to the $75-99,000 range• 20.5% of security staff were reported to have an IT security certification
Approach
Percent responsible
in 2005
Percent responsible
in 2003
Rate of change 2003-
2005
IT security officer (or equivalent) 34.9% 22.4% 55.8%
CIO (or equivalent) 14.3% 6.7% 113.4%
Director of administrative computing 2.7% 3.2% (15.6%)
Director of academic computing 1.2% 1.8% (33.3%)
Other academic management 0.6% 1.2% (50.0%)
Other administrative management 0.6% 3.2% (81.3%)
Other IT management 23.9% 30.9% (-22.7%)
Director of networking 21.8% 30.6% (28.8%)
Page 14
There has been a major change in the structure of IT security organizations
• 68% of respondents had at least one full time security staff member, up from 50% in 2003• Doctoral institutions were more likely to have larger IT security teams, averaging 2.8 FTE.
68% of other institutions reported having a staff of one or less.• 32% of institutions expect to add staff in the next two years, mostly doctoral institutions
and institutions with enrollments over 25,000.
Staffing structure 2005 Percent
2003 Percent
Percent Change
Rate of change
One central IT security unit/function 61.8% 38.7% 23.1% 59.7%
Spread across multiple central IT units/functions
32.7% 58.2% -25.5% -43.8%
Other 5.5% 3.1% 2.4% 77.4%
Page 15
IT security budgets as a percentage of total IT spend did not increase significantly
• Higher education lags other industries in percentage of IT budget spent on security by more than half (11.4% on average)
• 39% of respondents disagreed or strongly disagreed with the statement that their institution provided the needed resources to address IT security issues. Only 34% agreed or strongly agreed, a slight improvement from 2003
• Justification for spending due to compliance rose by 124% from 2003 - 2005
% of IT Budget Spent on Security
16%
52%
14%
2%
2%
1% 13%
Less than 1%
1% - 5%
6% - 10%
11% - 15%
16% - 20%
Over 20%
Don't Know
0 5 10 15 20 25 30
As a strategic investment in security
To meet compliance mandates
As incident prevention
Reaction to major incident
By risk assessment
None
Don't know
Justification for IT Security Investments (%)
Page 16
Prevalence of security awareness programs significantly increased
Students Faculty Staff
Mandatory 17.4% 14.5% 20.4%
Voluntary 37.9% 47.7% 44.4%
No program 44.7% 37.7% 35.2%
• The number of institutions reporting having awareness programs in place rose by more than 25% from 2003 – 2005. The biggest increase (31%) was in faculty awareness programs.
• Doctoral institutions were much more likely (80%) to have awareness programs in place than others (under 50%)
• Institutions were neutral as to the effectiveness of their awareness programs, with slightly better results reported by doctoral institutions
Page 17
A range of IT security policies are in place
• Institutions with higher enrollments were more likely to have more extensive policies in place
Policies implemented Yes
Acceptable use of computers, e-mail, Internet, and intranet 97.8%
Data backups and secure off-site storage 89.1%
Access control, authentication, and authorization practices 85.1%
Vulnerability management (e.g., patch management, antivirus software) 85.1%
Physical security 81.4%
Individual employee responsibilities for information security practices 72.8%
Protection of organizational assets 72.8%
Managing privacy issues, including breaches of personal information 71.6%
Secure disposal of data, media, or printed material that contains sensitive information 71.0%
Page 18
Policies (cont)
Incident reporting and response 68.9%
Disaster recovery contingency planning (business continuity planning) 68.4%
Investigation and correction of the causes of security failures 68.2%
Notification of security events to affected parties (individuals, law enforcement, campus organizations) 66.9%
Sharing, storing, and transmitting of institutional data (e.g., ISPs, external networks, contractors' systems)
51.3%
Data classification, retention, and destruction 50.6%
Identity management 50.0%
Security compliance monitoring and enforcement 49.0%
Change management processes 45.6%
Personnel clearances or background checks 38.1%
Page 19
Senior management interest in IT security issues has increased
Management Reporting 2005 Percent
2003 Percent
Percent Change
Rate of change
Never 8.8% 14.2% (5.4%) (38%)
Seldom 26.0% 34.8% (8.8%) (25.3%)
Occasionally 34.3% 26.0% 8.3% 31.9%
Often 25.0% 14.3% 10.7% 74.8%
Very Often 3.4% 2.5% 0.9% 36.0%
Don’t Know 2.5% 9.4% (6.9%) (73.4%)
• Doctoral institutions are most likely (40%) to report often or very often, compared to 21% for others
• Lower enrollment institutions were less likely to report IT security issues to senior management
Page 20
IT security planning has increased, but still has room to improve
0
10
20
30
40
50
60
70P
erc
en
t
Comprehensiveplan in place
Partial plan inplace
No plan in place
• In 2003, nearly 50% of respondents had no plan, or were creating one. • Higher enrollment institutions were more likely to have comprehensive plans in place• 62% reported that IT security was part of the campus or IT strategic plan
Page 21
Risk assessments became more prevalent
Risk assessment in last 2 years Percent
No risk assessments done 42.6%
For some institutional data and asset types
46.3%
For all institutional data and asset types
8.6%
Don't know 2.5%
Audit Frequency Percent
Not performed 25.0%
On an irregular basis 50.6%
On a regular basis 23.0%
Don't know 1.4%
• For the comparison group, 60% had performed a risk assessment in 2005, vs. 34% in 2003, a 77% increase.
• The frequency of IT security audits did not change significantly from 2003 to 2005
• Larger institutions were more likely to have performed risk assessments and audits
• The use of external auditors / consultants to perform security audits grew significantly, especially in larger institutions
• Only 19% of institutions provide departments with a framework for performing security assessments
Page 22
Institutions identified viruses and theft of personal information as high-risk areas
Perceived Risk Percent
Computer virus, worm, or Trojan horse 72.6%
Theft of personal financial information (SSN, credit/debit/ATM card, account or PIN numbers, etc.) 64.8%
Other computer security Risk incidents (hacking, spoofing, sniffing, pinging, scanning, spyware, etc.)
55.3%
Denial of service 30.5%
Unlicensed use or copying (piracy) of digital products (software, music, motion pictures, etc.) 25.2%
Breaches resulting from information obtained from stolen laptops 11.0%
Electronic vandalism or sabotage 10.4%
Misuse of computers by employees (Internet, e-mail, etc.) 10.0%
Theft of intellectual property (copyrights, patents, trade secrets, trademarks) 7.7%
Fraud 2.6%
Embezzlement 0.6%
Page 23
The number of reported security incidents declined significantly since 2003
10% of 2005 respondents indicated an incident reported to the press in the past 12 months, compared to 19% in 2003
A majority of institutions (74%) report that the number of incidents is about the same or less in the past twelve months as compared with the year before.
There was little variation by Carnegie class, but institutions with higher enrollments reported more incidents
Over one third of the respondents (34%) identified business applications being unavailable, followed by the network being unavailable (29%) as the biggest impacts from incidents. 26% reported data compromises
Only 48% of institutions reported formal incident handling procedures, with numbers much higher (76%) at doctoral institutions and high enrollment institutions
Page 24
Security program outcomes were rated lower than in 2003, with advances in protection of central assets
The majority of 2005 respondents indicated (4.0 on 5 point scale) that their institutions were more secure today than two years ago
However, the comparison group rated their success lower in 2005 than in 2003
A large disparity was perceived in the security of central vs. local systems, with central systems rated much higher (except AA institutions)
Institutions reporting the use of awareness programs, security plans, and security audits rated themselves significantly higher than institutions without these in place
Institutions who felt they did not have sufficient resources rated their performance less highly
Page 25
While barriers to implementing effective security still exist, they have lessened since 2003
Barrier 2005 2003 Institutional Change
Rate of Change
Lack of awareness 35.8% 50.5% -14.7% -29.1%
Culture of decentralization 29.9% 37.3% -7.4% -19.8%
Lack of enforcement of policies 13.2% 20.1% -6.9% -34.3%
Absence of policies 22.1% 27.0% -4.9% -18.1%
Lack of senior management support 13.2% 17.2% -4.0% -23.3%
Lack of resources 68.1% 71.6% -3.5% -4.9%
Technology issues 7.4% 8.8% -1.4% -15.9%
Privacy of the individual 4.4% 4.4% 0.0% 0.0%
Page 26
Questions and comments
John Voloudakis: [email protected]
Full study available to ECAR subscribers and for purchase at www.educause.edu/ecar