CHALLENGES
Ø Documenting/publishing policies and processes (doing
it)
Ø Communication between departments
Ø Comprehensive business recovery planning
Ø Decentralization, diversity of applications
Ø Ethics, laws, policy compliance
Ø Range of devices and one security infrastructure
Ø Deployment of new technologies
Ø Advertising of security information
Ø Emerging viruses, vulnerabilities
Ø Diverse proprietary systems to be integrated
Ø Recognize (and convince everyone) that all systems
require COMPETENT system administration and recognize that system administrator
may not be primary user
Ø Allowing users to manage and secure access to
individual content independent of mode of storage and transport
Ø Disconnect between ownership and security
responsibility and accountability
Ø Funding and resources
Ø Expanding user population and increasing difficulty
in determining who they are and what rights they have
Ø Striking a balance between security and accessibility
to network services
Ø Providing strong user authentication, multifactor
Ø Response time to isolate specific security incidents
Ø Support for environment and users outside Blacksburg
– extended campus
Ø Not becoming a bigger target than we already are
Ø Territorial nature of IT groups
Ø State mandates/inflexibility
Ø Coordination with external agencies for security
“best practices”
Ø Lack of data integrity for decision support
Ø Decoupling authorization and authentication
Ø Changing end user culture, get them to take security
seriously
Ø Better controlling physical access to machines and
computing resources
Ø Private systems on VT infrastructure
Ø Meeting unfunded security mandates for research
Ø Exit interview procedures/lack of good comprehensive
system provisioning
Ø Cost assessment methodology (including intangible
costs)
Ø Educate users
Ø Balance between security and usability
Ø Scope (overwhelming) of security
Ø ID Management
Ø Compromised student computers (desktop and laptop)
Ø Access to VT resources for non-VT affiliates
Ø Lack of Standards Use at VT
Ø Ability of IT to influence/control non-IT departments
Ø Ensuring privacy of instructional systems
Ø Secure data storage
Ø How to obtain support from executive administration
and BOV
Ø Cataloguing data according to its sensitivity
Ø Non-VT access to computer resources
Ø End-to-end transmission of data in a secure manner
Ø Using social engineering to gain access to someone
else’s resources
Ø Security certification for IT professionals
Ø Economics of staying current (HW, SW, patches,
resources)
Ø How to secure and “heal” systems for those who can’t
or won’t do it themselves
Ø Balancing academic needs for open access with IT
needs for higher security
Ø Organizational philosophy (determining, expressing,
enforcing)
Ø Proactive security admin (patch management) in 24x7
environment
Ø Documenting policies for release and transmission of
data elements
Ø Practice of using shared accounts
Ø Self-testing, self-audit and tool to help people do
this
Ø Taking a holistic view of security when
responsibilities are split
Ø Learning from security incidents and sharing remedies
(prevention, discovery, response)
Ø Coupling the responsibility for security with the
authority to make it happen.
POTENTIAL SOLUTIONS
Ø Coordinate holistic approach, develop a formal IT
review process for ensuring systems the University deploys are secure
Ø Standards for hiring practices for IT professionals
across the university
Ø University centralization/coordination of data
management
Ø Secure channel for sharing security information
Ø VPN, SSL, etc. data transmission technologies
Ø Firewalls for admin sys at network layers
Ø Sharing, developing tools for security
analysis, detection, protection
Ø Adherence to policy, law – a group of IT persons to
internally audit IT systems
Ø PKI
Ø Proactive scanning of computers each time they
connect (checknet[1])
Ø Decouple cost recovery/inhibitions from implementing
security enhancements. IT could
subsidize
Ø Integration competency center to assist in Enterprise
App. integration
Ø Provide IT orientation
seminars for new system administrators. (An overview of VT's systems, services
and security policies.)
[1] Checknet is a virtual network that is isolated from the main VT network. Machines connecting to the network will be automatically placed in the Checknet, scanned for Top 20 Internet Threats, and if the pass the scan, dynamically connected to the main VT network. If the machine fails the teset, it remains in the Checknet until the vulnerabilities found on it are addressed.