SERT ARTICLE Final
SERT ARTICLE Final
Article
Mechanisms to control education organizational IT security
Table of Contents
Introduction ........................................................................................ 3
Protection ........................................................................................... 7
Justifying the elements that I had chosen for Tactic Hub .......................... 53
References; ....................................................................................... 57
Introduction
I am a Junior IT Security Specialist at Matrix52 Security Service and Solutions
Company. The company provides physical and IT security solutions, installing and
monitoring security infrastructure and digital assets all around Myanmar. A few days ago,
the management of the Business Portal planned to create a security article for distribution
and education purposes internally. Consequently, the department head assigned me the
task of preparing a colorful article book for the Tactic Hub. Now, I am here to implement
the requirements for the Tactic Hub.
What is IT security?
IT security, also known as Information Technology security, encompasses measures
and strategies aimed at protecting computer systems, networks, and data from
unauthorized access, use, disclosure, disruption, modification, or destruction. Its primary
goal is to ensure the confidentiality, integrity, and availability of information technology
resources. IT security involves various practices, such as implementing firewalls, antivirus
software, intrusion detection systems, encryption techniques, and access controls. As
cyber threats continue to evolve, IT security plays a crucial role in safeguarding
organizations' digital assets and maintaining trust among stakeholders.
Protection
Three main mechanisms to Protect IT security (AAA)
In schools and colleges today, using computers and the internet is common.
However, it is important to keep things safe and secure. That is where IT security comes
in. It helps protect our information and make sure, only the right people can access it.
There are three main ways to do this: authentication, authorization and
accountability. These three things help keep our digital world safe for learning.
1. Authentication ways
Authentication ways are methods used to confirm the identity of users before
granting access to systems or data, such as passwords, biometrics, or two-factor
authentication.
Suitability
MFA is suitable for educational environments because it adds an extra layer of
security to protect sensitive information. With the prevalence of cyber threats, educational
institutions often store valuable data such as student records, financial information, and
research data. Implementing MFA, helps mitigate the risk of unauthorized access even if
a password is compromised.
Pros
• Provides an additional layer of security beyond passwords.
• Effective in preventing unauthorized access, even if passwords are compromised.
Cons
• May require additional hardware or software.
• Can be perceived as cumbersome or time-consuming for users.
b. Biometric Authentication
Biometric authentication uses unique biological characteristics such as fingerprints,
iris patterns, or facial features to verify a user's identity.
Suitability
Biometric authentication is suitable for educational environments because it offers
a convenient and secure way for users to access systems and resources without the need
to remember passwords or carry physical tokens. This can be especially beneficial in
environments with a large number of users, such as universities or schools, where
password management can become cumbersome.
Pros
• Difficult to forge or replicate.
• Convenient for users as it eliminates the need to remember passwords.
Cons
• Biometric data can be stolen or spoofed.
• Not all devices support biometric authentication.
Suitability
OTP is suitable for educational environments because it provides an additional layer
of security without requiring users to memorize complex passwords. It can be particularly
useful for scenarios where users need to access systems remotely or conduct secure
transactions, such as online exams or accessing learning management systems.
Pros
• Provides a temporary code that is valid for a single use, enhancing security.
• Can be delivered through various channels (SMS, email, authentication apps).
Cons
• Vulnerable to interception if sent via insecure channels.
• Requires users to have access to the device or channel through which the OTP is
delivered.
d. Token-based Authentication
Token-based authentication involves the use of a physical device (token) that
generates a unique code for authentication purposes. These tokens can be hardware
tokens or software-based tokens generated through mobile apps.
Suitability
Token-based authentication is suitable for educational environments because it
offers a portable and secure method for users to authenticate their identities. Users can
carry the token with them or install the token-generating app on their mobile devices,
enabling convenient access to resources while maintaining security.
Pros
• Generates a unique token for each authentication attempt, enhancing security.
• Tokens can have a limited validity period, reducing the risk of unauthorized access.
Cons
• Requires the implementation and management of token generation and validation
systems.
• Tokens can be intercepted or stolen if not transmitted securely.
2. Authorization ways
Authorization in AAA determines what actions or resources a user is allowed to
access or perform within a system or network.
Suitability
RBAC is suitable for educational environments because it allows administrators to
efficiently manage access to resources based on predefined roles, such as student, faculty,
staff, or administrator. This simplifies access control and ensures that users have access
only to the resources necessary for their roles.
Pros
• Allows administrators to assign specific permissions to users based on their roles.
• Reduces the risk of unauthorized access by enforcing the principle of least privilege.
Cons
• Requires careful planning and maintenance of role definitions.
• Can lead to overly complex permission structures if not properly managed.
Suitability
ABAC is suitable for educational environments because it offers granular control over
access permissions based on a wide range of attributes. This flexibility is particularly
beneficial in educational settings where access requirements may vary based on factors
such as course enrollment, academic standing, or research affiliations.
Pros
• Enables access decisions based on multiple attributes, such as user characteristics and
environmental factors.
• Offers granular control over access permissions, enhancing security and flexibility.
Cons
• May require significant implementation effort and ongoing management to define and
enforce policies.
• Can introduce complexity, particularly in dynamic environments with evolving access
requirements.
Suitability
MAC is suitable for educational environments, especially in scenarios where strict
data confidentiality and integrity requirements exist, such as research facilities or
institutions handling sensitive information.
Pros
• Enforces access policies defined by a central authority, enhancing consistency and
security.
• Mitigates the risk of accidental data breaches or unauthorized access.
Cons
• May limit flexibility and user autonomy, particularly in decentralized or dynamic
environments.
• Requires careful planning and configuration to ensure compatibility with organizational
needs.
Suitability
RBAC is suitable for educational environments because it provides a flexible and
customizable approach to access control. Institutions can define rules based on specific
criteria such as user attributes, resource classifications, or contextual conditions.
Pros
• Allows access decisions based on predefined rules or conditions, offering flexibility and
adaptability.
• Facilitates automated enforcement of access policies, reducing administrative
overhead.
Cons
• May require expertise in rule definition and maintenance to ensure effectiveness and
accuracy.
• Can become complex and difficult to manage as the number of rules increases.
3. Accountability ways
In AAA, accountability involves keeping records of user activities and events to trace
actions back to specific individuals for auditing and security purposes.
a. Audit Logs
Audit logs are records that capture detailed information about system activities,
such as user logins, file access, and changes to configurations. These logs provide a
chronological trail of events that can be used for monitoring, analysis, and investigation
purposes.
Suitability
Audit logs are suitable for educational environments because they help ensure
accountability by providing visibility into who accessed what resources and when. This
transparency is essential for tracking user behavior, identifying security incidents, and
complying with regulatory requirements.
Pros
• Provides a detailed record of user actions and system events.
• Facilitates post-incident analysis and forensic investigations.
Cons
• Requires storage and management of large volumes of data.
• May introduce privacy concerns if not appropriately handled.
Suitability
Activity monitoring tools are suitable for educational environments because they
enhance cybersecurity awareness among students and staff by providing insights into
online behaviors, thus promoting responsible digital citizenship. Additionally, they aid in
maintaining a safe online learning environment by enabling quick detection and response
to security incidents, ensuring uninterrupted academic activities.
Pros
• Activity monitoring tools offer insights into user behavior, aiding in identifying security
risks and promoting safe online practices.
• These tools enable swift detection and response to security incidents, reducing the
impact of breaches or unauthorized access.
Cons
• Continuous monitoring may raise privacy issues among students and faculty,
potentially leading to resistance or distrust.
• Implementing and managing activity monitoring tools can demand significant
resources, especially in larger educational institutions.
Suitability
Network packet analysis is well suited for educational environments as it offers
comprehensive threat detection capabilities, allowing institutions to safeguard sensitive
data and resources against cyber threats such as malware and unauthorized access
attempts. Furthermore, real-time monitoring and analysis of network traffic enable swift
incident response, minimizing disruptions to academic operations and ensuring the
continuous delivery of educational services.
Pros
• Network packet analysis enables real-time monitoring and detection of suspicious
network activity, enhancing cybersecurity defenses.
• Detailed packet-level analysis provides valuable data for investigating security
incidents and preventing future occurrences.
Cons
• Network packet analysis demands specialized expertise for effective interpretation and
analysis, posing challenges in educational environments with limited cybersecurity
resources.
• Continuous packet analysis may strain network resources, potentially affecting the
performance of essential educational applications and services.
Suitability
Endpoint Detection and Response (EDR) solutions are particularly suitable for
educational environments due to their ability to provide advanced endpoint protection and
security policy enforcement across diverse devices used for teaching and learning. By
offering real-time threat detection and automated response mechanisms, EDR solutions
bolster the overall cybersecurity posture of educational institutions, safeguarding sensitive
data and resources from malicious activities.
Pros
• EDR solutions offer advanced protection against malware, ransomware, and cyber
threats, ensuring device security.
• EDR tools enable consistent security policy enforcement across all endpoints, reducing
the risk of breaches.
Cons
• EDR solutions can be expensive to implement and maintain, potentially hindering
widespread deployment in educational institutions.
• EDR agents may consume system resources, affecting device performance, particularly
on older or less powerful devices in educational settings.
Suitability
User Behavior Analytics (UBA) is well-suited for educational environments as it
enables proactive identification of security threats by analyzing user activity patterns
across digital platforms. By leveraging machine learning algorithms, UBA tools help
mitigate insider threats and compromised accounts, thus enhancing the security defenses
of educational institutions and protecting critical assets from potential breaches.
Pros
• UBA tools use machine learning to identify potential security threats by analyzing user
behavior patterns.
• UBA solutions proactively address risky behavior, strengthening cybersecurity and
protecting sensitive data.
Cons
• UBA tools may produce false alarms, causing alert fatigue and diverting resources from
genuine security issues.
• Integrating UBA tools into existing infrastructure can be complex, requiring
customization to fit educational environments' unique needs.
Google Authenticator
Google Authenticator is a mobile application that provides MFA by generating one-
time codes for authentication. It requires users to enter both their password and a
temporary code generated by the app to access their accounts.
Pros
• Provides an additional layer of security beyond passwords.
• Easy to use and set up for users.
• Supports multiple accounts and services.
Cons
• Relies on the user's mobile device, which could be lost or stolen.
• Users may find it slightly inconvenient to switch between apps for authentication.
b. Biometric Authentication
Windows Hello
Windows Hello is a biometric authentication feature built into Windows 10. It allows
users to log in to their devices using facial recognition, fingerprint scanning, or iris
scanning.
Pros
• Offers strong authentication based on biometric data.
• Eliminates the need to remember passwords.
• Works seamlessly with Windows devices and services.
Cons
• Requires devices equipped with compatible biometric sensors.
• Privacy concerns may arise regarding the collection and storage of biometric data.
Authy
Authy is a mobile and desktop application that generates one-time passwords for
authentication. It supports two-factor authentication (2FA) and works with various
websites and services.
Pros
• Supports two-factor authentication for added security.
• Works across multiple devices, including mobile and desktop.
• Can be used with a wide range of websites and services.
Cons
• Relies on the user's mobile or desktop device, which could be lost or stolen.
• Users may find it slightly inconvenient to switch between apps for authentication.
d. Token-based Authentication
RSA SecurID
RSA SecurID is a token-based authentication system that provides secure access to
networks and applications. It uses hardware or software tokens to generate one-time
passcodes for authentication.
Pros
• Provides strong authentication with hardware or software tokens.
• Supports a wide range of applications and platforms.
• Offers flexibility in token deployment options.
Cons
• Requires additional hardware or software for token generation.
• Managing and distributing tokens can be complex and time-consuming.
Pros
• Granular control over access to AWS resources based on roles.
• Easily scalable to accommodate growing numbers of users and resources.
• Integration with AWS services for centralized access management.
Cons
• Complex setup and configuration may require expertise or training.
• Users with extensive permissions may inadvertently access sensitive resources.
Pros
• Fine-grained access control based on multiple attributes.
• Dynamic enforcement of access policies in real-time.
• Integration with existing identity management systems and directory services.
Cons
• Requires thorough planning and policy definition to ensure effective implementation.
• Implementation may require customization and integration efforts.
Pros
• Strong isolation of processes and resources based on labels.
• Fine-grained control over access to system resources.
• Integration with Linux distributions for seamless deployment.
Cons
• Complex configuration and management may require specialized knowledge.
• Misconfigurations can lead to unintended access restrictions or system issues.
Pros
• Centralized management of user accounts and access permissions.
• Granular control over access to resources based on user roles and groups.
• Integration with Microsoft Windows environments and services.
Cons
• Requires Windows infrastructure and expertise for deployment and management.
• Limited support for non-Windows platforms and applications.
Splunk
Splunk is a platform for searching, monitoring, and analyzing machine-generated
data, including logs, events, and metrics. It provides real-time visibility into system
activities and enables organizations to detect and investigate security incidents.
Pros
• Centralized logging and monitoring of system activities.
• Real-time alerting and correlation of security events.
• Advanced analytics and visualization capabilities for identifying trends and patterns.
Cons
• Costly licensing and infrastructure requirements, especially for large-scale
deployments.
• Steep learning curve for configuring and optimizing the platform.
Pros
• Centralized collection and analysis of log data from diverse sources.
• Real-time alerting and response to security incidents.
• Compliance reporting and auditing features for regulatory requirements.
Cons
• Costly licensing and maintenance fees may be prohibitive for some educational
institutions.
• Requires dedicated resources for deployment, configuration, and ongoing
management.
Wireshark
Wireshark is a widely-used network protocol analyzer that allows users to capture
and interactively browse the traffic running on a computer network. It provides detailed
information about network packets, helping to troubleshoot network issues and analyze
security threats.
Pros
• Comprehensive protocol support for analyzing various network traffic types.
• User-friendly interface with powerful filtering and analysis capabilities.
• Open-source and freely available, making it accessible for educational use.
Cons
• Requires some level of networking knowledge to interpret captured data effectively.
• Capturing network traffic may raise privacy concerns and require appropriate
permissions.
CrowdStrike Falcon
CrowdStrike Falcon is a cloud-native endpoint security platform that provides
advanced threat detection and response capabilities. It uses machine learning and
behavioral analysis to identify and block malware, ransomware, and other security threats.
Pros
• Real-time threat detection and response to endpoint security threats.
• Lightweight agent with minimal performance impact on endpoints.
• Centralized management and reporting through a cloud-based platform.
Cons
• Costly subscription-based pricing model, which may be prohibitive for some educational
institutions.
• Requires reliable internet connectivity for cloud-based management and threat
intelligence updates.
Exabeam
Exabeam is a user behavior analytics platform that helps organizations detect and
respond to insider threats, compromised accounts, and other security risks. It uses
machine learning and data science techniques to analyze user activities and identify
anomalies.
Pros
• Advanced machine learning algorithms for detecting insider threats and unusual
behavior.
• Centralized dashboard for visualizing and investigating security incidents.
• Integration with existing security tools and data sources for comprehensive threat
detection.
Cons
• Complex implementation and configuration may require specialized expertise.
• Costly licensing and subscription fees, especially for large-scale deployments.
2. Surveillance Cameras
Install surveillance cameras in critical areas to monitor activities and deter
unauthorized access or activities.
4. Secure Storage
Ensure that physical documents, storage devices, and other sensitive materials are
stored securely in locked cabinets or rooms.
6. Vehicle Security
Installing adequate lighting in parking lots and garages enhances visibility, deters
theft, vandalism, and other criminal activities, while conducting regular patrols by security
personnel or law enforcement officers monitors parking areas, and responds to any
suspicious activities or incidents.
7. Physical Barriers
Installing revolving doors at building entrances regulates pedestrian traffic and
prevents unauthorized entry, while deploying retractable or sliding security gates in
corridors, stairwells, or other critical areas controls access during non-operational hours
or in emergencies.
3. Password Policies
Enforce strong password policies requiring regular password changes, minimum
length, complexity, and multi-factor authentication where possible.
4. Network Security
Implement firewalls, intrusion detection systems, and antivirus software to protect
the network from external threats.
1. Risk Identification: Begin by identifying potential risks that could impact the
educational institution. These risks may include physical hazards, such as safety
concerns on campus, or non-physical risks, such as academic, financial, or reputational
challenges. This process often involves brainstorming sessions, surveys, and
consultations with stakeholders to ensure comprehensive coverage of potential risks.
2. Risk Assessment: Once risks are identified, assess their likelihood and potential
impact on the institution. This involves assigning a level of severity to each risk based
on factors such as probability of occurrence, potential consequences, and vulnerability.
Risks are often categorized based on their severity, allowing for prioritization of
mitigation efforts.
3. Risk Mitigation: Develop strategies to mitigate identified risks and reduce their
likelihood or impact. This may involve implementing preventive measures, such as
safety protocols, security enhancements, or financial controls. Additionally, consider
transferring or sharing risks through insurance or contractual agreements where
appropriate.
4. Risk Monitoring and Control: Continuously monitor and review the effectiveness of
risk mitigation strategies. Regularly reassess risks to account for changes in the
educational environment or external factors. Implement controls and procedures to
monitor risks proactively and address emerging threats promptly.
6. Training and Education: Provide training and education to staff, faculty, and students
on risk management principles and procedures. This empowers individuals to identify
and respond to risks effectively within their respective roles and responsibilities.
Risk management in education involves several key steps. Firstly, it begins with the
identification of potential risks, encompassing both physical threats and non-physical
challenges that could impact the institution. Once risks are identified, the assessment
phase evaluates the likelihood and potential impact of each risk to prioritize mitigation
efforts effectively. Subsequently, strategies are developed and implemented to mitigate
the identified risks, aiming to reduce their likelihood or impact on the institution.
Monitoring and control play a crucial role in risk management, as continuous monitoring
of risks and reassessment of mitigation strategies help in addressing emerging threats
promptly. Additionally, maintaining open communication channels and reporting risk
management activities and outcomes to stakeholders ensures transparency and fosters
trust within the educational community. Providing training to staff, faculty, and students
on risk management principles and procedures enhances awareness and preparedness for
managing potential risks. Lastly, keeping detailed documentation of risk assessments,
mitigation strategies, monitoring activities, and incident responses is essential for
maintaining accountability and facilitating continuous improvement in risk management
practices.
By following these procedures, educational institutions can create a safer, more secure
learning environment for all stakeholders. Here is a risk matrix for Tactic Hub. Risk matrix
is helpful because it shows how likely and how serious risks are, making it easier to decide
which ones to focus on first and communicate about them clearly.
Moderate data
Medium Software glitches Ransomware attack
breach
Distributed denial
Password
High of service (DDoS) Major data breach
compromise
attack
What is an audit?
An audit is a thorough check-up on something, usually financial records, procedures,
or practices, to ensure they meet set standards, rules, or guidelines. Auditors, who are
skilled professionals, carry out these checks to verify the accuracy, completeness, and
validity of the information they are examining. I have already mentioned about the audit
in accountability ways for Tactic Hub.
2. Quality Assurance: Audits help maintain and enhance the quality of education by
identifying areas for improvement and ensuring compliance with established standards
and guidelines.
4. Risk Management: Audits help identify and mitigate risks such as fraud,
mismanagement, or non-compliance with regulations, thereby safeguarding the
reputation and credibility of the educational institution.
1. Financial and Time Costs: Audits can be expensive and time-consuming, requiring
resources and personnel to conduct the examination thoroughly.
2. Potential for Disruption: The audit process may disrupt the regular operations of
educational institutions, diverting attention and resources away from core activities
such as teaching and learning.
4. Limited Scope: Audits may not capture all aspects of educational effectiveness, such
as student outcomes or the quality of teaching, as they primarily focus on financial and
administrative aspects.
4. Prioritize Risks and Mitigation Strategies: Prioritize security risks based on their
potential impact and likelihood of occurrence. Develop mitigation strategies that
balance security requirements with the needs of students, faculty, and staff. Consider
implementing multi-factor authentication, encryption, access controls, and regular
security awareness training as part of the mitigation strategy.
5. Update Policies and Procedures: Revise existing security policies and procedures to
address the identified misalignments and incorporate feedback from stakeholders.
Ensure that policies are clear, concise, and easy to understand, and regularly review
and update them to reflect changes in technology, regulations, and organizational
needs.
6. Provide Training and Education: Offer training and education programs to increase
awareness of security risks and best practices among faculty, staff, and students.
Empower individuals to take responsibility for their own security by providing them with
the knowledge and tools they need to protect sensitive information and systems.
7. Monitor and Evaluate: Establish metrics and key performance indicators (KPIs) to
monitor the effectiveness of security policies and procedures. Regularly evaluate the
impact of alignment efforts and make adjustments as needed to ensure continuous
improvement.
I have provided excerpt outlines various tools and mechanisms for ensuring IT
security in educational environments, including authentication methods (Multi-Factor
Authentication, Biometric Authentication, One-Time Passwords, and Token-based
Authentication), authorization approaches (Role-Based Access Control, Attribute-Based
Access Control, Mandatory Access Control, and Rule-Based Access Control), and
accountability mechanisms (Audit Logs, Activity Monitoring Tools, Network Packet
Analysis, Endpoint Detection and Response, and User Behavior Analytics).
Here is an evaluation of the suitability of these tools for educational security policies:
Authentication Tools
Multi-Factor Authentication (MFA)
Highly suitable for educational environments due to its ability to provide an
additional layer of security beyond passwords, mitigating the risk of unauthorized access
to sensitive information. Pros include enhanced security, while cons may involve additional
hardware or software requirements.
Biometric Authentication
Convenient and secure for users in educational settings, eliminating the need to
remember passwords. However, concerns over biometric data theft or spoofing may arise.
Token-based Authentication
Offers portability and security, suitable for educational environments requiring
convenient yet secure authentication methods. However, requires implementation and
management of token systems.
Authorization Tools
Role-Based Access Control (RBAC)
Efficiently manages access based on predefined roles, simplifying access control in
educational institutions. However, requires careful planning and maintenance of role
definitions.
Accountability Tools
Audit Logs
Essential for maintaining accountability and complying with security policies and
regulations in educational settings. However, requires storage and management of large
volumes of data.
Overall, the suitability of these tools for educational security policies depends on factors
such as usability, scalability, effectiveness, cost-effectiveness, compliance, adaptability,
and support. Educational institutions should carefully assess their specific security needs
and requirements before selecting and implementing these tools.
References;
Xcitium (n.d.). What Is IT Security? | Importance Of IT Security Services. [online]
Xcitium.
Available at:
https://www.xcitium.com/itsecurity/#:~:text=IT%20security%20protects%20informati
on%20technology [Accessed 5 Apr. 2024].
Kelley, K. (2022). What is Cyber Security & Importance of Cyber Security | Simplilearn.
[online] Simplilearn.com. Available at: https://www.simplilearn.com/tutorials/cyber-
security-tutorial/what-is-cyber-security.
Clayton, Mi. (2023). Risk Identification Techniques and How to Brainstorm Well. [online]
MPUG. Available at: https://www.mpug.com/risk-identification-techniques-and-how-to-
brainstorm-well/.