0% found this document useful (0 votes)
28 views5 pages

Module 5 SLP

Uploaded by

floydmullings
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views5 pages

Module 5 SLP

Uploaded by

floydmullings
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Security via Technology 1

Running Head: Security via Technology in a College Environment.

Module 5 – Session Long Project

Information Security Overview for Managers and Policy Makers


Security via Technology 2

Introduction

Attaining security via technology has its pros and cons but the pros certainly out do the

cons. In this interconnected computing environment which includes various insecure networks

including the Internet one has no choice but to rely on technology for security. This paper

discusses how a community college apply technology to achieve information security and the

pros and cons of such application. It begins with an overview of the institution’s information

security infrastructure and exiting problems, followed by a discussion on the pros and cons of

how some security technologies are used and concludes with a discussion on some information

security technology considerations for the institution.

An Overview of the institution IT infrastructure and its Information Security Issue:

Success Training College is a small community college located in the Bahamas. The college has

three different campuses located on separate islands in the country. The college has

approximately 1000 students. In terms of information technology the institution has two

computer labs, one is used as a classroom for the computer courses and the other lab is made

available to the students during the days. There is also a wireless internet service made available

to the students and faculties which can be accessed while on campus. The main software that is

used by the institution is Campus Anywhere. Campus Anywhere is a software that allows campus

PCs and applications to be securely available to students, staff, and faculty from ‘anywhere’, at

anytime. Campus Anywhere provides 24/7 computer lab access to students from anywhere; it

allows faculty and staff to access it on their own desktop PCs from anywhere. As it relates to

technical staffing, the institution does not have a structured IT department of such. The main IT

person is the institution’s systems administrator who ensures the smooth running of the network
Security via Technology 3

and oversees other systems tasks such as information security. There is also one lab technician

who monitors the activities in the computer labs. All other IT duties are carried out by outsiders.

As it relates to security technology the college uses mainly endpoint security technology

such as antivirus, anti-spyware, and firewall software. The entire network is password protected

which means to use any of the institution’s IT resources including the wireless Internet access

authentication is required. The main software used by the institution CampusAnywhere allows

students, faculty and administration staff to connect with strong client authentication

and strong data encryption (SSL up to 256-bit AES) via a Web browser. An intrusion detection

system is implemented to detect and stop certain external threats, along with an Incident

Response Policy for occasions where intrusions do occur. The application of such technologies

helps in safeguarding the institutions information technology resources, however there are a few

disadvantages that still exist.

Some Disadvantages of security via Technology at STC: One of the major

disadvantages of using technology to achieve security at STC is the fact that some users

disregard the institution’s security procedures. This is because they believe that since the

technology is in place to safeguard the institution they can ignore certain security rules. For

example, system users tend to think that since an antivirus program in installed it means they can

download and install just about any program from any web site.

Due to the application of the security technology the technical team is not a vigilant as

they should because they believe that the technology is in place taking care of the safeguarding

activates. This might be partially true, however the human element is needed to monitor the

technology and assess to reports in order to make better information security decisions.
Security via Technology 4

Security is a trade-off (Scheiner, 2008). This is another disadvantage users has to trade-

off time and convince for security. Keying in a different password for every application can

become a very annoying task, not to mention if the system is programmed to go into hibernation

mode for security purposes.

Other security technology STC should consider applying: Although security via

technology may have a few disadvantages it is worth the trade-off. Therefore STC should

consider the implementation of more security technology.

One of the most effective means of secure information is cryptography—particularly

public key cryptography. Cryptography enables the storage and transmission of sensitive

information on insecure media or cross insecure networks (like the Internet) so that it cannot be

read by anyone except the intended recipient. A cryptographic algorithm, or cipher, which works

in combination with a key (a word, number, or phrase — to encrypt the plaintext), is a

mathematical function used in the encryption and decryption process (Network Association Inc,

1999). The technology is effective because it keeps the data secure whether or not the medium

on which the data is stored or transmitted is secured and the public key cryptography can be used

as a means of authentication. Encryption technology may be embedded into a few of the

applications used by STC, however, if the institution is to obtain good security cryptography

needs to be more prevalent in its security infrastructure.

Presently the institution does not use a secure e-mailing system. Students, faculty and

administrators communicate using e-mail providers such as Yahoo, Hotmail, Gmail etc. Wheat

the institution needs is a private email system in which public key cryptography can be

effectively implement and practice.


Security via Technology 5

Finally, rather than communication sensitive information across the Internet, the

institution should consider implementing its own intranet service. This will enable the institution

to keep it communication within the circle of authentic individuals who have right to the

information.

Conclusion

Information security via technology is a necessity. It may have a few drawbacks such as

users disregarding their security procedures because they believe that technology should be

doing the safeguarding. The benefits of security via technology far out ways the drawbacks and it

is well worth the trade-offs. Therefore institutions such as STC with proper planning should

endeavor to implement the very best security technology to protect its information.

References

Scheiner, B. (2008). The psychology of security. Retrieved January 28, 2010 from

http://www.schneier.com/essay-155.html

Network Association Inc. (1999). How PGP works. Retrieved March 12, 2010 from

http://www.pgpi.org/doc/pgpintro/#p9

You might also like