Locking Up the Ivory Tower

Universities are traditionally open, without all of the information security controls that are implemented in the corporate environment.  Not surprising, given that the term university means community.  It is hard to build community with overly restrictive security controls.

Now, however, the New York Times reports that universities are under increasing attack from cybersecurity threats—“Universities Face a Rising Barrage of Cyberattacks”.  Is this media hype or are more successful attacks being carried out?  My approach is always to start with evidence based risk assessment.  What does the actual data show?  While we don’t have perfect actuarial data for information security, we do have some extremely valuable information.

For this post, I analyzed breach data from Privacy Rights Clearinghouse, over the years from 2011-2013.  I included all breaches reported at educational institutions, whether secondary schools or university level institutions.  I used the breach types that Privacy Rights uses to classify the breaches.  Here are the results:

 

Type of Breach Number of Breaches Number of Lost Records % (Number of Records)
Hacking or malware 65 1,601,000 63
Unintended disclosure 53 812,000 32
Portable devices 19 87,400 3
Insider 10 25,245 1
Physical loss 16 3175 0.1
Payment card fraud 1 16 0

 

So the media reporting seems to be on target;  hacking and/or malware is the top root cause of most breaches.  Unintended disclosure or user error falls in second place.  Losses from portable devices is third.  The devices reported include laptops, flash drives and hard drives.  The insider breaches include existing and former employees or students.  The physical, non-electronic losses comprise lost records or records dropped in dumpsters without shredding.

To defend against these types of breaches, we need to harden the databases that are holding confidential records.  We can no longer rely on the traditional defense in depth approach, using multiple layers, each slowing down the adversary until we catch him.  It is now too easy to drop in a Remote Access Trojan (RAT) into the inner layer of the defensive system.

Hardening of databases is itself difficult, since there are so many ways to attack.  The remediation consists of people, process, technology and monitoring.  The best summary of non-vendor-specific recommendations that I have seen has been developed by Berkeley Security, University of California.  It is worth comparing your data security controls versus this list of controls.

Frederick Scholl

Frederick Scholl is an accomplished Global Senior Information Security Risk Manager. Dr. Scholl earned a BS and Ph.D. in Electrical Engineering from Cornell University. In 1991, Fred founded Monarch Information Networks, LLC to enable forward-thinking organizations to protect their information. Previously, he co-founded Codenoll Technology Corporation (NASDAQ: CODN). He chaired the IEEE committee that wrote the first standard for Ethernet communication over fiber optic links, now used world-wide.

Book an Appointment for Cybersecurity Issues

Request an appointment with Dr. Fred Scholl. We will discuss any cybersecurity issues you have.

More Good Reading

Cybersecurity Thrives in An Organizational Context

The First National Cybersecurity Summit

New Privacy Laws Require Security Professionals Up Their Game

Cybersecurity Workforce Development: Real or Imagined Problem?

Antidote for Fake Everything

Information Security Risks, Gray Rhinos and Black Swans

Managing Information Security On a Limited Budget

Building a Security Start-Up

Cybersecurity Risk Management for Directors

My Reading List for Security Start-Ups

Should Your CIO Learn to Code?

How IT Leaders Can Keep a Seat at the Table

Equifax points out—again—the need for speed in security management

Anatomy of a Security Breach

The Smartest Information Security Companies

Book Review: Play Bigger

Long Term Beneficiaries of WannaCry

RISK: A NEW MOVIE ABOUT JULIAN ASSANGE

TRADE SECRET THEFT CONTINUES UNABATED

TENNESSEE LEGISLATORS MUDDY WATERS AROUND PRIVACY BREACH NOTIFICATION REQUIREMENTS

LEADERSHIP CHECKLIST FOR SECURITY PROFESSIONALS

SIEM VENDORS HAVE IT ALL BACKWARDS

THE SECRET TO GROWING YOUR SECURITY STARTUP

CLOUD JOBS PEAKING?

The Spy Who Couldn’t Spell

IS THERE A CYBERSECURITY PROFESSIONALS SHORTAGE?

No Blue Pill for Cybersecurity Failures

Presidential Cybersecurity Commission Makes Some Good Suggestions

Understanding Intelligence

Align Your Security Program With the Business

Don’t fall victim to BEC

Enterprise Risk Management and Information Security

Evidence Based Risk Assessment: Lessons Learned from the Y-12 Breach

First Conviction for Illegally Distributing Android Apps

Locking Up the Ivory Tower

Cloud Vulnerabilities

More Security Lessons Learned from the Y-12 Breach

Security or Compliance?

Home Disaster Recovery Planning

Cloud Computing: Trust but Verify

Background Checks May Not Be Enough

PERFECT SECURITY STORM FOR LAW FIRMS?

How Not To Be a Cyber Janitor

SECURITY MEMO: IT CAN’T HAPPEN HERE, CAN IT?

Don’t Forget Cloud Availability

Compliance v. Security

GAO Report on Information Security in Federal Government

Lean Security

Mitigate Your Social Engineering Vulnerabilities

HIPAA Security. Are We Making Progress?

Brand Your Security Program

PDCA is Dead

LEARNING FROM PAST MISTAKES

How Better Security Can Create Shared Value

C’est La Vie, You Never Can Tell: Lessons Learned from the HBGary Hack

DDOS Tutorial

The future of information technology

Data Governance Anyone?

Learning from the oil spill disaster

Down the Rabbit-Hole…Again?

Ideas on Risk Management