SlideShare a Scribd company logo
IT SECURITY AT
GEORGIA TECH LIBRARY
C U R R E N T E F F O R T S A N D
E M E R G I N G P R A C T I C E S
OVERVIEW: IT SECURITY AND LIBRARY SYSTEMS / SERVICES
IT
Security
Phishing
Authentication
Collaboration:
Vendors
Collaboration:
Patron Data
Internal Audit
and Risk Self-
Assessment /
Data Safeguards
Training and
Future Plans
PHISHING
2011
Go Phish
2012
SpearPhish
Training
Phish Bowl
AUTHENTICATION, AUTHORIZATION & ACCESS CONTROL
Authenticate
• Integration with CAS, Shibboleth
• Implementation of Duo (two-factor authentication)
• LastPass Enterprise
Authorize
• PersonAffiliation, curriculum, department
Access Control
• Proxy logs into Splunk
COLLABORATION: GEORGIA TECH LIBRARY & EMORY LIBRARIES
COLLABORATION: VENDORS AND DATA / IT SECURITY
Campus Security Review
• Data in the System
• Data Backup and
Disaster Recovery
• Vendor IT Security
Practice/Compliance
• Network Diagram and Firewalls and
VLANs
• Vendor’s internal testing, intrusion
prevention and training.
Results
• Data Sensitivity is Low
• Vendor use of independent
auditing firm for security
compliance (annual)
• Manage user access, permissions
and revocation
• Vendor provides description of
password complexity rules
• Vendor demonstrates protocols do
not transmit clear text
COLLABORATION: PATRON DATA
Share the least amount of patron
data necessary to support the
sharing of collections.
• First Name
• Last Name
• Unique identifier if using PPID
in lieu of employee ID
• Email Address
INTERNAL AUDIT AND RISK SELF-ASSESSMENT: OVERVIEW
INTERNAL AUDIT AND RISK SELF ASSESSMENT: STEWARDSHIP OUTCOMES
Training
• Provide
training for
library
employees
on IT Security
and Data
Stewardship
Data
Classification
• Audited 42
servers to
document
the
classification
of data on
the servers.
We did not
have
category IV
data.
Logon Banner
• Implemented
a logon
banner which
displays the
standard
usage
agreement
and a 15-
minute idle
timeout
Self Risk-
Assessment
• Conducted a
self risk-
assessment
with the
campus
online tool
INTERNAL AUDIT AND RISK SELF ASSESSMENT: TRAINING
Worked with Campus
Cybersecurity to provide
• 9 Training sessions for all
library employees
• Covered campus IT
policies
• Phishing
• 1 Training session for
Library IT employees on
security, confidentiality
of information and
software copyright laws
INTERNAL AUDIT AND RISK SELF ASSESSMENT: TRAINING OUTCOMES
• Computer & Network Usage and Security Policy (CNUSP)
• Data Access Policy & Data Classification
• Threats (Hacking and Phishing)
• Email Security Basics
• Common Phishing Attacks
• URL Dissection
• Password Policy
• Picking a Strong Password
INTERNAL AUDIT AND RISK SELF ASSESSMENT: DATA CLASSIFICATION
GT Data Categorization https://security.gatech.edu/DataCategorization
• Public Use
• Examples: Institute web site content, press releases, employee work
addresses, Library Catalog Information
Category I
• Internal Use
• Examples: directory listings, internal intranet web sites, gtID (alone),
Library Resources
• NOTE: This is the default data classification category.
Category II
• Sensitive
• Examples: Social Security Number, research data, intellectual
property of Georgia Tech, Library Circulation Records, Security
Camera Recordings
Category III
• Highly Sensitive
• Examples: Credit Card NumbersCategory IV
INTERNAL AUDIT AND RISK SELF ASSESSMENT: LOGON BANNER
IT&D Desktop and Collaboration
Services team updated the standard
usage agreement on all library
managed desktops and implemented
a 15-minute idle timeout to ensure
that computers do not become
accessible for unauthorized use.
INTERNAL AUDIT AND RISK SELF ASSESSMENT: SELF AUDIT SAMPLE 1
RISK: If unit data is not properly protected, the
unit’s ability to accomplish its organizational
objectives may be hindered.
CONTROLS:
1. Employees are notified of the CNUSP and DAP.
2. The data stored on information systems has
been classified in accordance with the Data
Access Policy (DAP).
3. Servers that store sensitive data are listed in
the OIT sensitive server list.
4. User access to sensitive data is properly
authorized
5. Policies / procedures are in place for data
security breaches
INTERNAL AUDIT AND RISK SELF ASSESSMENT: SELF AUDIT SAMPLE 2
RISK: Inadequately secured web servers may
result in compromise of data/campus network,
system corruption, loss of productivity & adverse
public relations or reputation.
CONTROLS:
1. Web site development adheres to the Institute
guide for the development of web sites.
2. Web site statistics are logged and maintained.
3. There are procedures/checklists in place to
ensure the security of the web server.
4. There are intrusion detection systems
protecting the network.
5. Proper change management procedures are
utilized when making changes to web servers.
INTERNAL AUDIT AND RISK SELF ASSESSMENT: SELF AUDIT SAMPLE 3
RISK: Unauthorized access to data.
CONTROLS:
1. Password Management process is in place.
2. Strong authentication controls for networks,
servers, and applications.
3. Logs are kept and reviewed on a regular basis
4. Users are uniquely identifiable.
5. Restrict access based on individual's job
6. System safeguards are in place
7. Vulnerability scans are completed against the
internal and external networks.
DATA SAFEGUARDS
Servers, Endpoints (e.g. Desktop Computers,
Laptop Computers, Workstations, USB Storage
Devices), Mobile
Devices (e.g. Smart Phones, Tablet Computers,
Personal Digital Assistants, Handheld Scanners),
Cloud Computing.
Each page in the spreadsheet contains a matrix
outlining the specific configurations or controls,
as well as whether the configuration or control
is Mandatory or Recommended based on the
category of data being stored on the computing
system in question.
https://security.gatech.edu/security-standards-
and-procedures
LIBRARY NEXT: PREPARING FOR THE FUTURE
Vendors Security Practices and Compliance
Vendor responses written into contracts
Patron data privacy and data not being sold
Data elimination written into contract
Improve management and access via relocation of
server room to centrally controlled facility
Ongoing employee training and awareness of
security issues, practices and policies
Ongoing risk assessment and mitigation strategies
(hardware, software, data, user behavior)
REFERENCES
Georgia Tech Library: Library Next
http://librarynext.gatech.edu/
Georgia Tech CNUSP
http://policylibrary.gatech.edu/information-technology/computer-and-network-
usage-and-security
Georgia Tech DAP
http://policylibrary.gatech.edu/data-access
Georgia Tech Phish Bowl
https://stats.security.gatech.edu/phishbowl/
Georgia Tech Security Standards and Procedures
https://security.gatech.edu/security-standards-and-procedures
THANK YOU
Doug Goans < doug.goans@library.gatech.edu >
Head of IT&D, Georgia Tech Library
Chris Helms <chris.helms@library.gatech.edu >
Application Development Manager, Georgia Tech Library

More Related Content

What's hot

Pawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
Pawlowski and Beadles: Authentication and Access of Licensed Content in OhioPawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
Pawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
National Information Standards Organization (NISO)
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
Tomppa Järvinen
 
Identity & Authentication Management - Judy Luther
Identity & Authentication Management - Judy LutherIdentity & Authentication Management - Judy Luther
Identity & Authentication Management - Judy Luther
National Information Standards Organization (NISO)
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations
Damir Delija
 
Hamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content AccessHamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content Access
National Information Standards Organization (NISO)
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
balakumaran779
 
Technology and library support within an ODL environment
Technology and library support within an ODL environmentTechnology and library support within an ODL environment
Technology and library support within an ODL environment
Sophie vd Walt
 
Schwing Challenges to Successful Authentication Change
Schwing Challenges to Successful Authentication ChangeSchwing Challenges to Successful Authentication Change
Schwing Challenges to Successful Authentication Change
National Information Standards Organization (NISO)
 
Optimizing Protected Indexes
Optimizing Protected IndexesOptimizing Protected Indexes
Optimizing Protected Indexes
Chris Bell
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
BCS ProSoft
 
Rotenberg Provider's Perspective on Identity and Authentication Management
Rotenberg Provider's Perspective on Identity and Authentication ManagementRotenberg Provider's Perspective on Identity and Authentication Management
Rotenberg Provider's Perspective on Identity and Authentication Management
National Information Standards Organization (NISO)
 
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...EC-Council
 
OSINT using Twitter & Python
OSINT using Twitter & PythonOSINT using Twitter & Python
OSINT using Twitter & Python37point2
 
Redrawing the Cyber Defense Frontier
Redrawing the Cyber Defense FrontierRedrawing the Cyber Defense Frontier
Redrawing the Cyber Defense Frontier
Joe Hage
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber Security
Cambridge Intelligence
 
Gunter O
Gunter OGunter O
Gunter O
Hilary Ip
 
Techniques for Electronic Resource Management: Crowdsourcing for Best Practices
Techniques for Electronic Resource Management: Crowdsourcing for Best PracticesTechniques for Electronic Resource Management: Crowdsourcing for Best Practices
Techniques for Electronic Resource Management: Crowdsourcing for Best Practices
Jill Emery
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
Tom Eston
 
Cyber security
Cyber securityCyber security
Cyber security
Peter Henley
 
Real-time Tweet Analysis w/ Maltego Carbon 3.5.3
Real-time Tweet Analysis w/ Maltego Carbon 3.5.3 Real-time Tweet Analysis w/ Maltego Carbon 3.5.3
Real-time Tweet Analysis w/ Maltego Carbon 3.5.3
Shalin Hai-Jew
 

What's hot (20)

Pawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
Pawlowski and Beadles: Authentication and Access of Licensed Content in OhioPawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
Pawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
 
Identity & Authentication Management - Judy Luther
Identity & Authentication Management - Judy LutherIdentity & Authentication Management - Judy Luther
Identity & Authentication Management - Judy Luther
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations
 
Hamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content AccessHamparian - IP Authentication for STEM e-Content Access
Hamparian - IP Authentication for STEM e-Content Access
 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
 
Technology and library support within an ODL environment
Technology and library support within an ODL environmentTechnology and library support within an ODL environment
Technology and library support within an ODL environment
 
Schwing Challenges to Successful Authentication Change
Schwing Challenges to Successful Authentication ChangeSchwing Challenges to Successful Authentication Change
Schwing Challenges to Successful Authentication Change
 
Optimizing Protected Indexes
Optimizing Protected IndexesOptimizing Protected Indexes
Optimizing Protected Indexes
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
 
Rotenberg Provider's Perspective on Identity and Authentication Management
Rotenberg Provider's Perspective on Identity and Authentication ManagementRotenberg Provider's Perspective on Identity and Authentication Management
Rotenberg Provider's Perspective on Identity and Authentication Management
 
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
 
OSINT using Twitter & Python
OSINT using Twitter & PythonOSINT using Twitter & Python
OSINT using Twitter & Python
 
Redrawing the Cyber Defense Frontier
Redrawing the Cyber Defense FrontierRedrawing the Cyber Defense Frontier
Redrawing the Cyber Defense Frontier
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber Security
 
Gunter O
Gunter OGunter O
Gunter O
 
Techniques for Electronic Resource Management: Crowdsourcing for Best Practices
Techniques for Electronic Resource Management: Crowdsourcing for Best PracticesTechniques for Electronic Resource Management: Crowdsourcing for Best Practices
Techniques for Electronic Resource Management: Crowdsourcing for Best Practices
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Cyber security
Cyber securityCyber security
Cyber security
 
Real-time Tweet Analysis w/ Maltego Carbon 3.5.3
Real-time Tweet Analysis w/ Maltego Carbon 3.5.3 Real-time Tweet Analysis w/ Maltego Carbon 3.5.3
Real-time Tweet Analysis w/ Maltego Carbon 3.5.3
 

Viewers also liked

Carver-IT Security for Librarians
Carver-IT Security for LibrariansCarver-IT Security for Librarians
Carver-IT Security for Librarians
National Information Standards Organization (NISO)
 
Chris Shillum: Overview of the RA21 proejct presentation
Chris Shillum: Overview of the RA21 proejct presentationChris Shillum: Overview of the RA21 proejct presentation
Chris Shillum: Overview of the RA21 proejct presentation
National Information Standards Organization (NISO)
 
Carpenter: Getting Access Control from Here to There
Carpenter: Getting Access Control from Here to ThereCarpenter: Getting Access Control from Here to There
Carpenter: Getting Access Control from Here to There
National Information Standards Organization (NISO)
 
Lavignino Do You Know Your Privacy Risks
Lavignino Do You Know Your Privacy RisksLavignino Do You Know Your Privacy Risks
Lavignino Do You Know Your Privacy Risks
National Information Standards Organization (NISO)
 
Presentation of NISO Altmetrics RP - Charleston Library Conference
Presentation of NISO Altmetrics RP - Charleston Library ConferencePresentation of NISO Altmetrics RP - Charleston Library Conference
Presentation of NISO Altmetrics RP - Charleston Library Conference
National Information Standards Organization (NISO)
 
Ralph Youngen: Evolving Identity & Access Management at ACS Presentation
Ralph Youngen: Evolving Identity & Access Management at ACS PresentationRalph Youngen: Evolving Identity & Access Management at ACS Presentation
Ralph Youngen: Evolving Identity & Access Management at ACS Presentation
National Information Standards Organization (NISO)
 
Madsen Digital Preservation Policy & Strategy
Madsen Digital Preservation Policy & StrategyMadsen Digital Preservation Policy & Strategy
Madsen Digital Preservation Policy & Strategy
National Information Standards Organization (NISO)
 
Ferrante Durable Access to Digital Primary Sources
Ferrante Durable Access to Digital Primary SourcesFerrante Durable Access to Digital Primary Sources
Ferrante Durable Access to Digital Primary Sources
National Information Standards Organization (NISO)
 
Wittenberg Portico: Lessons From a Community Supported Archive
Wittenberg Portico: Lessons From a Community Supported ArchiveWittenberg Portico: Lessons From a Community Supported Archive
Wittenberg Portico: Lessons From a Community Supported Archive
National Information Standards Organization (NISO)
 
Wheeler & Benedict -- Enabling the Preservation Relay
Wheeler & Benedict -- Enabling the Preservation RelayWheeler & Benedict -- Enabling the Preservation Relay
Wheeler & Benedict -- Enabling the Preservation Relay
National Information Standards Organization (NISO)
 
VanDyck Long-Term Preservation of Digital Scholarly Literature
VanDyck Long-Term Preservation of Digital Scholarly LiteratureVanDyck Long-Term Preservation of Digital Scholarly Literature
VanDyck Long-Term Preservation of Digital Scholarly Literature
National Information Standards Organization (NISO)
 
Goethals Harvard Library's Digital Preservation Repository
Goethals Harvard Library's Digital Preservation RepositoryGoethals Harvard Library's Digital Preservation Repository
Goethals Harvard Library's Digital Preservation Repository
National Information Standards Organization (NISO)
 
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...nst2011
 
Herdrich -The Digital Library of the Middle East (DLME)
Herdrich -The Digital Library of the Middle East (DLME)Herdrich -The Digital Library of the Middle East (DLME)
Herdrich -The Digital Library of the Middle East (DLME)
National Information Standards Organization (NISO)
 
Kettler Information Digitization in the Humanities
Kettler Information Digitization in the HumanitiesKettler Information Digitization in the Humanities
Kettler Information Digitization in the Humanities
National Information Standards Organization (NISO)
 
Waraksa Digital Library of the Middle East
Waraksa Digital Library of the Middle EastWaraksa Digital Library of the Middle East
Waraksa Digital Library of the Middle East
National Information Standards Organization (NISO)
 
Gonzalez Creating a Digital Makerspace
Gonzalez Creating a Digital MakerspaceGonzalez Creating a Digital Makerspace
Gonzalez Creating a Digital Makerspace
National Information Standards Organization (NISO)
 
Neylon From Principles to Action
Neylon From Principles to ActionNeylon From Principles to Action
Neylon From Principles to Action
National Information Standards Organization (NISO)
 
Viggio Open VIVO
Viggio Open VIVOViggio Open VIVO
Weisberg - Museums and the Internet of Things
Weisberg - Museums and the Internet of ThingsWeisberg - Museums and the Internet of Things
Weisberg - Museums and the Internet of Things
National Information Standards Organization (NISO)
 

Viewers also liked (20)

Carver-IT Security for Librarians
Carver-IT Security for LibrariansCarver-IT Security for Librarians
Carver-IT Security for Librarians
 
Chris Shillum: Overview of the RA21 proejct presentation
Chris Shillum: Overview of the RA21 proejct presentationChris Shillum: Overview of the RA21 proejct presentation
Chris Shillum: Overview of the RA21 proejct presentation
 
Carpenter: Getting Access Control from Here to There
Carpenter: Getting Access Control from Here to ThereCarpenter: Getting Access Control from Here to There
Carpenter: Getting Access Control from Here to There
 
Lavignino Do You Know Your Privacy Risks
Lavignino Do You Know Your Privacy RisksLavignino Do You Know Your Privacy Risks
Lavignino Do You Know Your Privacy Risks
 
Presentation of NISO Altmetrics RP - Charleston Library Conference
Presentation of NISO Altmetrics RP - Charleston Library ConferencePresentation of NISO Altmetrics RP - Charleston Library Conference
Presentation of NISO Altmetrics RP - Charleston Library Conference
 
Ralph Youngen: Evolving Identity & Access Management at ACS Presentation
Ralph Youngen: Evolving Identity & Access Management at ACS PresentationRalph Youngen: Evolving Identity & Access Management at ACS Presentation
Ralph Youngen: Evolving Identity & Access Management at ACS Presentation
 
Madsen Digital Preservation Policy & Strategy
Madsen Digital Preservation Policy & StrategyMadsen Digital Preservation Policy & Strategy
Madsen Digital Preservation Policy & Strategy
 
Ferrante Durable Access to Digital Primary Sources
Ferrante Durable Access to Digital Primary SourcesFerrante Durable Access to Digital Primary Sources
Ferrante Durable Access to Digital Primary Sources
 
Wittenberg Portico: Lessons From a Community Supported Archive
Wittenberg Portico: Lessons From a Community Supported ArchiveWittenberg Portico: Lessons From a Community Supported Archive
Wittenberg Portico: Lessons From a Community Supported Archive
 
Wheeler & Benedict -- Enabling the Preservation Relay
Wheeler & Benedict -- Enabling the Preservation RelayWheeler & Benedict -- Enabling the Preservation Relay
Wheeler & Benedict -- Enabling the Preservation Relay
 
VanDyck Long-Term Preservation of Digital Scholarly Literature
VanDyck Long-Term Preservation of Digital Scholarly LiteratureVanDyck Long-Term Preservation of Digital Scholarly Literature
VanDyck Long-Term Preservation of Digital Scholarly Literature
 
Goethals Harvard Library's Digital Preservation Repository
Goethals Harvard Library's Digital Preservation RepositoryGoethals Harvard Library's Digital Preservation Repository
Goethals Harvard Library's Digital Preservation Repository
 
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
 
Herdrich -The Digital Library of the Middle East (DLME)
Herdrich -The Digital Library of the Middle East (DLME)Herdrich -The Digital Library of the Middle East (DLME)
Herdrich -The Digital Library of the Middle East (DLME)
 
Kettler Information Digitization in the Humanities
Kettler Information Digitization in the HumanitiesKettler Information Digitization in the Humanities
Kettler Information Digitization in the Humanities
 
Waraksa Digital Library of the Middle East
Waraksa Digital Library of the Middle EastWaraksa Digital Library of the Middle East
Waraksa Digital Library of the Middle East
 
Gonzalez Creating a Digital Makerspace
Gonzalez Creating a Digital MakerspaceGonzalez Creating a Digital Makerspace
Gonzalez Creating a Digital Makerspace
 
Neylon From Principles to Action
Neylon From Principles to ActionNeylon From Principles to Action
Neylon From Principles to Action
 
Viggio Open VIVO
Viggio Open VIVOViggio Open VIVO
Viggio Open VIVO
 
Weisberg - Museums and the Internet of Things
Weisberg - Museums and the Internet of ThingsWeisberg - Museums and the Internet of Things
Weisberg - Museums and the Internet of Things
 

Similar to Goans-Helms-IT Security at Georgia Tech Library

Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
Jim Kaplan CIA CFE
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
Meletis Belsis MPhil/MRes/BSc
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
Rochester Security Summit
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
ATMOSPHERE .
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
Jim Kaplan CIA CFE
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
ThavaselviMunusamy1
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
Cognic Systems Pvt Ltd
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
AIS Network
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
Jim Kaplan CIA CFE
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
 
Web security uploadv1
Web security uploadv1Web security uploadv1
Web security uploadv1
Setia Juli Irzal Ismail
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
IGN MANTRA
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
Imperva
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
Denny Lee
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
Kabul Education University
 

Similar to Goans-Helms-IT Security at Georgia Tech Library (20)

Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Web security uploadv1
Web security uploadv1Web security uploadv1
Web security uploadv1
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 

More from National Information Standards Organization (NISO)

Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
National Information Standards Organization (NISO)
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
National Information Standards Organization (NISO)
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
National Information Standards Organization (NISO)
 
Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"
National Information Standards Organization (NISO)
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
National Information Standards Organization (NISO)
 
Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
National Information Standards Organization (NISO)
 
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
National Information Standards Organization (NISO)
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
National Information Standards Organization (NISO)
 
Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"
National Information Standards Organization (NISO)
 
Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"
National Information Standards Organization (NISO)
 
Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"
National Information Standards Organization (NISO)
 
Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"
National Information Standards Organization (NISO)
 
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
National Information Standards Organization (NISO)
 
Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"
National Information Standards Organization (NISO)
 
Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"
National Information Standards Organization (NISO)
 

More from National Information Standards Organization (NISO) (20)

Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"Bazargan "NISO Webinar, Sustainability in Publishing"
Bazargan "NISO Webinar, Sustainability in Publishing"
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"Compton "NISO Webinar, Sustainability in Publishing"
Compton "NISO Webinar, Sustainability in Publishing"
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
Hazen, Morse, and Varnum "Spring 2024 ODI Conformance Statement Workshop for ...
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"Mattingly "Text and Data Mining: Building Data Driven Applications"
Mattingly "Text and Data Mining: Building Data Driven Applications"
 
Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"Mattingly "Text and Data Mining: Searching Vectors"
Mattingly "Text and Data Mining: Searching Vectors"
 
Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"Mattingly "Text Mining Techniques"
Mattingly "Text Mining Techniques"
 
Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"Mattingly "Text Processing for Library Data: Representing Text as Data"
Mattingly "Text Processing for Library Data: Representing Text as Data"
 
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
Carpenter "Designing NISO's New Strategic Plan: 2023-2026"
 
Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"Ross and Clark "Strategic Planning"
Ross and Clark "Strategic Planning"
 
Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"Mattingly "Data Mining Techniques: Classification and Clustering"
Mattingly "Data Mining Techniques: Classification and Clustering"
 

Recently uploaded

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Reflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPointReflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPoint
amberjdewit93
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
amberjdewit93
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
scholarhattraining
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 

Recently uploaded (20)

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Reflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPointReflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPoint
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
MERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDFMERN Stack Developer Roadmap By ScholarHat PDF
MERN Stack Developer Roadmap By ScholarHat PDF
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 

Goans-Helms-IT Security at Georgia Tech Library

  • 1. IT SECURITY AT GEORGIA TECH LIBRARY C U R R E N T E F F O R T S A N D E M E R G I N G P R A C T I C E S
  • 2. OVERVIEW: IT SECURITY AND LIBRARY SYSTEMS / SERVICES IT Security Phishing Authentication Collaboration: Vendors Collaboration: Patron Data Internal Audit and Risk Self- Assessment / Data Safeguards Training and Future Plans
  • 4. AUTHENTICATION, AUTHORIZATION & ACCESS CONTROL Authenticate • Integration with CAS, Shibboleth • Implementation of Duo (two-factor authentication) • LastPass Enterprise Authorize • PersonAffiliation, curriculum, department Access Control • Proxy logs into Splunk
  • 5. COLLABORATION: GEORGIA TECH LIBRARY & EMORY LIBRARIES
  • 6. COLLABORATION: VENDORS AND DATA / IT SECURITY Campus Security Review • Data in the System • Data Backup and Disaster Recovery • Vendor IT Security Practice/Compliance • Network Diagram and Firewalls and VLANs • Vendor’s internal testing, intrusion prevention and training. Results • Data Sensitivity is Low • Vendor use of independent auditing firm for security compliance (annual) • Manage user access, permissions and revocation • Vendor provides description of password complexity rules • Vendor demonstrates protocols do not transmit clear text
  • 7. COLLABORATION: PATRON DATA Share the least amount of patron data necessary to support the sharing of collections. • First Name • Last Name • Unique identifier if using PPID in lieu of employee ID • Email Address
  • 8. INTERNAL AUDIT AND RISK SELF-ASSESSMENT: OVERVIEW
  • 9. INTERNAL AUDIT AND RISK SELF ASSESSMENT: STEWARDSHIP OUTCOMES Training • Provide training for library employees on IT Security and Data Stewardship Data Classification • Audited 42 servers to document the classification of data on the servers. We did not have category IV data. Logon Banner • Implemented a logon banner which displays the standard usage agreement and a 15- minute idle timeout Self Risk- Assessment • Conducted a self risk- assessment with the campus online tool
  • 10. INTERNAL AUDIT AND RISK SELF ASSESSMENT: TRAINING Worked with Campus Cybersecurity to provide • 9 Training sessions for all library employees • Covered campus IT policies • Phishing • 1 Training session for Library IT employees on security, confidentiality of information and software copyright laws
  • 11. INTERNAL AUDIT AND RISK SELF ASSESSMENT: TRAINING OUTCOMES • Computer & Network Usage and Security Policy (CNUSP) • Data Access Policy & Data Classification • Threats (Hacking and Phishing) • Email Security Basics • Common Phishing Attacks • URL Dissection • Password Policy • Picking a Strong Password
  • 12. INTERNAL AUDIT AND RISK SELF ASSESSMENT: DATA CLASSIFICATION GT Data Categorization https://security.gatech.edu/DataCategorization • Public Use • Examples: Institute web site content, press releases, employee work addresses, Library Catalog Information Category I • Internal Use • Examples: directory listings, internal intranet web sites, gtID (alone), Library Resources • NOTE: This is the default data classification category. Category II • Sensitive • Examples: Social Security Number, research data, intellectual property of Georgia Tech, Library Circulation Records, Security Camera Recordings Category III • Highly Sensitive • Examples: Credit Card NumbersCategory IV
  • 13. INTERNAL AUDIT AND RISK SELF ASSESSMENT: LOGON BANNER IT&D Desktop and Collaboration Services team updated the standard usage agreement on all library managed desktops and implemented a 15-minute idle timeout to ensure that computers do not become accessible for unauthorized use.
  • 14. INTERNAL AUDIT AND RISK SELF ASSESSMENT: SELF AUDIT SAMPLE 1 RISK: If unit data is not properly protected, the unit’s ability to accomplish its organizational objectives may be hindered. CONTROLS: 1. Employees are notified of the CNUSP and DAP. 2. The data stored on information systems has been classified in accordance with the Data Access Policy (DAP). 3. Servers that store sensitive data are listed in the OIT sensitive server list. 4. User access to sensitive data is properly authorized 5. Policies / procedures are in place for data security breaches
  • 15. INTERNAL AUDIT AND RISK SELF ASSESSMENT: SELF AUDIT SAMPLE 2 RISK: Inadequately secured web servers may result in compromise of data/campus network, system corruption, loss of productivity & adverse public relations or reputation. CONTROLS: 1. Web site development adheres to the Institute guide for the development of web sites. 2. Web site statistics are logged and maintained. 3. There are procedures/checklists in place to ensure the security of the web server. 4. There are intrusion detection systems protecting the network. 5. Proper change management procedures are utilized when making changes to web servers.
  • 16. INTERNAL AUDIT AND RISK SELF ASSESSMENT: SELF AUDIT SAMPLE 3 RISK: Unauthorized access to data. CONTROLS: 1. Password Management process is in place. 2. Strong authentication controls for networks, servers, and applications. 3. Logs are kept and reviewed on a regular basis 4. Users are uniquely identifiable. 5. Restrict access based on individual's job 6. System safeguards are in place 7. Vulnerability scans are completed against the internal and external networks.
  • 17. DATA SAFEGUARDS Servers, Endpoints (e.g. Desktop Computers, Laptop Computers, Workstations, USB Storage Devices), Mobile Devices (e.g. Smart Phones, Tablet Computers, Personal Digital Assistants, Handheld Scanners), Cloud Computing. Each page in the spreadsheet contains a matrix outlining the specific configurations or controls, as well as whether the configuration or control is Mandatory or Recommended based on the category of data being stored on the computing system in question. https://security.gatech.edu/security-standards- and-procedures
  • 18. LIBRARY NEXT: PREPARING FOR THE FUTURE Vendors Security Practices and Compliance Vendor responses written into contracts Patron data privacy and data not being sold Data elimination written into contract Improve management and access via relocation of server room to centrally controlled facility Ongoing employee training and awareness of security issues, practices and policies Ongoing risk assessment and mitigation strategies (hardware, software, data, user behavior)
  • 19. REFERENCES Georgia Tech Library: Library Next http://librarynext.gatech.edu/ Georgia Tech CNUSP http://policylibrary.gatech.edu/information-technology/computer-and-network- usage-and-security Georgia Tech DAP http://policylibrary.gatech.edu/data-access Georgia Tech Phish Bowl https://stats.security.gatech.edu/phishbowl/ Georgia Tech Security Standards and Procedures https://security.gatech.edu/security-standards-and-procedures
  • 20. THANK YOU Doug Goans < doug.goans@library.gatech.edu > Head of IT&D, Georgia Tech Library Chris Helms <chris.helms@library.gatech.edu > Application Development Manager, Georgia Tech Library