Top Banner
13

Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University [email protected] [email protected].

Dec 20, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu.
Page 2: Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu.

Data Security Issues in IR

Eileen DriscollInstitutional Planning and ResearchCornell University

[email protected]

Page 3: Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu.

What IR practitioners can do

Legal consequences of data loss

Resources

Page 4: Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu.

Don’t take work home

• If you must access student or other sensitive data from home, use a secure connection like Remote Desktop in Windows XP

• Use a VPN connection• Wireless access

– Create a closed network– Rename network– Encrypt– Update software regularly– Set adminstrator password– Disable file sharing

Page 5: Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu.

At Work

• Store student data files on a secure server, not on your personal computer

• Turn your computer off at night if you can be backed up during the day

• Strip identifying student information from data files when you work on them (ssn, address, name)

Page 6: Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu.

Securing your computer

• Run an anti-virus program daily• Enable file autoprotect (Symantec Anti-Virus)• Use complex passwords (test with password tester)• Activate Windows Firewall• Run Spybot, Windows Defender and Ad-Aware

frequently• Secure Delete

Page 7: Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu.

Secure your computer (cont)

• Turn off file sharing on your computer• Turn off guest accounts• Don’t use the administrator account on your

computer for routine work• Turn on a password protected screen saver for when

you are away from your computer• Lock your office• Monitor your network traffic and usage• Turn off FTP if you are not using it

Page 8: Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu.

Secure your computer (cont)

• Clear out your web browser cache• Set Windows to automatic update• Be sure that your anti-virus software is updated

frequently

Page 9: Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu.

When traveling with a laptop

• Use an encrypted flash (thumb) drive• Keep close physical possession of your computer

and data• Remove sensitive data from the laptop before travel• If you need sensitive data, store it on a separate

device like a CD and store it separately from the laptop

• Use full disk encryption

Page 10: Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu.

Sharing data

• Zip and password protect before sending• Try not to send files via email• Cornell has the registrars drop box. Files are

encrypted during transport over SSL (https://) using strong encryption only.

Page 11: Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu.

New York Information Security Breach and Notification Act

• Any NYS resident whose private information was acquired by a person without valid authorization must be notified

• You must notify the NYS attorney general, NYS consumer protection board, NYS office of cybersecurity

• Other states, including California, are passing similar laws

Page 12: Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu.

What to do if data security is breached

• Notify security office– Scan– Traffic analysis– Image– System (log) analysis

• IT security may report to data loss team (audit, police, counsel, communications, risk management, IT, representatives from unit)

Page 13: Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University efd2@cornell.edu efd2@cornell.edu.

Resources

http://www.cit.cornell.edu/computer/security/secure.html

Securing your web browser http://www.cert.org/tech_tips/securing_browser/

EDUCAUSE http://www.educause.edu/security

Using wireless technology securely http://www.us-cert.gov/reading_room/Wireless-Security.pdf

Procedures for dealing with security breach http://www.cit.cornell.edu/computer/security/data-loss-prepare.html