Educause

Secure Development of Internet of Things Products for Education

By Vaughn Eisler and Renault Ross

Vaughn Eisler is a business development manager and Renault Ross is a national security architect at Symantec Corporation.

The Internet of Things (IoT) represents a major departure in the history of the Internet, as connections move beyond computing systems and begin to power billions of everyday devices, from smart meters to home thermostats to remote e-learning systems. The market demands that these devices and sensors have a multilayered security and data management approach to ensure they are properly identified, secured, and trusted and that the data they produce remains private, managed, and analyzed.

read more


Critical Infrastructure and the Internet of Things

Karen McDowell is an information security analyst at the University of Virginia.

The Internet of Things (IoT) interests and excites people for a number of reasons, not the least being that these Internet devices, ranging from industrial sensors to complex CT scanners, can make our lives easier, ensure more efficient delivery of goods and services, and give us more control over the environment than we ever thought possible. Businesses, "on the cusp of an explosion in the potential and adoption of IoT,"1 are also vitally interested in the IoT because of the great potential in revenue growth and innovation, and long term sustained value.

read more


Stop. Think. Connect. Everyone's a Target

By Shelby Cunningham, Marcelle Drakes-Ruffin, and Ashley Rae Tolbert

Shelby Cunningham, Marcelle Drakes-Ruffin, and Ashley Rae Tolbert are graduate students in the Master of Science in Information Security Policy and Management (MSISPM) program at Heinz College, Carnegie Mellon University.

When Target fell victim to hackers seeking credit-card numbers, we were shocked to learn that it started with a social engineering attack against an HVAC company they used. Surely, nobody would try to breach a retail giant through people who personally held nothing of value. But the teenager who fell for a fake MySpace login in 2006 could have grown up to become an employee who gives information to a fake colleague. Social engineering — manipulating human nature to get sensitive data — can expose anyone to attack. The good news? Simple strategies offer protection against attackers.

read more


How to Think About MOOCs?

By Nigel P. Melville

Nigel P. Melville is associate professor of Information Systems in the Stephen M. Ross School of Business at the University of Michigan.

MOOCs are the latest in a long line of socio-technical systems to alter everyday work practices. One semester, a professor is teaching 85 MBA students in a large lecture hall, and the next, she's appearing in short online videos on Coursera viewed by thousands of students the world over. Overnight she's a household name. But what should we make of this?

read more


Improving Password Security Shouldn't Be Rocket Science

Nelson Cicchitto is chairman and CEO of Avatier Corporation, a company he founded in 1997.

It amazes me that, despite all the money being spent on security measures, from endpoints to data leak prevention to database security, the single largest vulnerability continues to be passwords. To be specific, 76% of all breaches over the past few years were based on weak or stolen password credentials according to one of the industry's annual studies.

Developing a usable and secure password management system shouldn't be difficult. I have seen countless implementations of password management solutions that achieved major success in a short time.

An organizational password management implementation involves a number of key elements consisting of a blend of technology and internal business processes, including:

read more


Security Awareness for IT Staff and Developers

Lance Spitzner is the training director for SANS Securing the Human.

A common misconception, including among security professionals, is that if someone is technical, they must be secure. If someone knows how to code in Python, configure a Unix server, or maintain a network of routers, then they must be secure. Unfortunately, that is not the case. In fact, technical individuals often pose a greater risk to an organization than general users because of their privileged access. They develop the code that faces the Internet, the servers that maintain databases, or the routers that transfer information. Often these individuals not only require security awareness training but advanced security training designed specifically for their roles.

read more


'Online Security' Need Not Be an Oxymoron

Raechelle Clemmons is vice president and chief information officer at St. Norbert College.

[Thanks to Raechelle Clemmons and the Green Bay Press Gazette for allowing EDUCAUSE to republish this column for National Cyber Security Awareness Month. —Editor]

October is right around the corner, and with it comes fall (or is fall here already?) and National Cyber Security Awareness Month (NCSAM), a month dedicated to raising awareness about online security.

Now in its 11th year, NCSAM was created by the U.S. Department of Homeland Security and the National Cyber Security Alliance to “ensure every American has the resources they need to stay safer and more secure online.”

read more


Control vs. Education: How Should We Change Human Behavior on Privacy and Data Security?

Daniel J. Solove is the founder of TeachPrivacy and John Marshall Harlan Research Professor of Law, George Washington University Law School.

read more


Thursday's Hawkins Leadership Roundtable Agenda

On Thursday morning roundtable members and participants will convene together at 7:30am in room 209 A/C in the Orlando Conference center. This is the last meeting of the roundtable for 2014 and we hope that you have found our time together extremely beneficial. Our breakfast meeting will include remarks and some question time with Nancy Zimpher, the Chancellor of the State University of New York System, who will also be delivering the final keynote of the conference at 10:15 am.
 
Participants are asked to please fill out the evaluation form for the roundtable. Your feedback is essential to improving the roundtable for next year’s participants. We look forward to receiving your comments and suggestions.
 
About the Hawkins Leadership Roundtable: The Hawkins Leadership Roundtable is a leadership development program for new CIOs and individuals actively seeking a CIO role.

read more


Wednesday's Hawkins Leadership Roundtable Agenda

Tomorrow’s Hawkins Leadership Roundtable activities will continue to connect participants with council members in ways that focus on developing participants’ leadership capabilities and elevating the work of their organizations.
 
The links for Tuesday’s slide presentation can be found here: http://bit.ly/1pEqErt
 
Wednesday’s lunch will begin at 11:30 am in room W209 A/B in the Orlando conference center. During this session the council will focus on the topic of “conversations with presidents or senior executives.” During this session, each council member will play the role of an institutional president and role-play with participants using questions commonly asked of CIOs by senior executives.

read more


National Cyber Security Awareness Month 2014 Is Here!

Today marks the beginning of National Cyber Security Awareness Month (NCSAM), celebrated every October since 2004. NCSAM began as a collaborative effort between government and industry to provide people with the resources they need to stay safer and more secure online. Since its inception, the U.S. Department of Homeland Security and the National Cyber Security Alliance have led NCSAM, and these efforts have grown exponentially, reaching consumers, small and medium-sized businesses, corporations, educational institutions, and young people across the United States and internationally. NCSA, APWG, and DHS also co-lead STOP. THINK. CONNECT., the global cyber security education and awareness campaign.

read more


Tuesday's Hawkins Leadership Roundtable Agenda

EDUCAUSE 2014 is here and the first meeting of the entire Hawkins Leadership Roundtable kicks off today at 12:30pm in room W209 A/B in the Orlando Conference center. Though this is the first time that the council will meet together as a group, participants should have already scheduled some time with their assigned Council members who will act as their mentors for the program. Many participants will have met with their mentor yesterday or today before the first lunch. As a council member myself I am meeting with my first protégé before Tuesday's lunch.
 
It’s up to the participants in the program to contact their assigned Council member for mentoring activities. This one-on-one collaboration is one of the most important benefits of the Hawkins Leadership Roundtable.

read more


Investing in Personalized Learning Strategies to Improve College Student Outcomes

By Jason Palmer, Deputy Director Postsecondary Success

Bill & Melinda Gates Foundation

My passion for education has been a constant throughout my life, starting with my father, who was principal at my high school in upstate New York, and later the superintendent of Albany Public Schools. My dad instilled in me a bedrock belief in the power of education to transform lives, and he helped me understand that every student deserves personalized feedback to succeed.

read more


Hidden Costs and Subsidies Complicate TCO

By Jerrold M. Grochow and Kelli Trosvig

Jerry Grochow is senior advisor to NET+, Internet2. Kelli Trosvig is vice president of Information Technology and CIO, University of Washington.

read more


Designing a Future of Digital Engagement

“The future of higher education is more than a digital replica of yesterday’s campus or even today’s classroom. The building blocks of our future higher education institutions are physical and virtual; they are human and technological.

read more


Future Slant: Business Value

By Diana G. Oblinger and Joanne Dehoney

This is the fourth in a blog series describing five “metatrends,” drawn from a review of articles in industry IT press, that affect CIOs in all IT sectors:

·      Challenges of scale

·      Analytics

·      Technology and work

·      Business value

·      Competition and control

Each post in the Future Slant blog will describe one of these trends, suggesting implications for higher education.

******

read more


Top 5 Security Awareness Resources for NCSAM

October is National Cyber Security Awareness Month. In anticipation of security fest 2014, we thought we would share our top 5 picks for security awareness resources.

read more


Gratitude

[grat-i-tood, -tyood]
noun 
 
  1. the quality or feeling of being grateful or thankful, as in "He expressed his gratitude to everyone who worked so hard."
 
Regardless of how many ERP implementations one has under one's belt, you’re never quite prepared for the stress and emotional roller coaster that ensues when you are racing towards go-lives, working through disagreements on how to reduce scope to make deadlines, validating conversion data that are not even close to being clean, preparing business offices across campus for the substantial changes they don’t see coming, and explaining to executives why these projects are so difficult, so expensive, and how all of that has very little to do with the technology itself.
 
But we did it.
 
I think the most amazing thing that has been accomplished at the University of Geo

read more


Don't Bore Me with Your Presentation, Inform Me

Randall Alberts

Randall Alberts is assistant director, Project Management, Ringling College of Art and Design.

We have all been to presentations in the office, or even at conferences, where we feel as if the speaker is as soothing as a nice warm glass of milk or a fuzzy blanket. The hardest part of being in such an audience is staying awake. If the audience is fighting the sandman to listen to a presentation, then no one is really listening. The people listening to you when you give a presentation are there for a reason: either to learn something new or because they were required to be there by management. Regardless of the reason for their attendance, your job is to give them information they can use.

read more


Future Slant: Technology and Work

Diana Oblinger and Joanne Dehoney

This is the third in a blog series describing five “metatrends,” drawn from a review of articles in industry IT press, that affect CIOs in all IT sectors:

·      Challenges of scale

·      Analytics

·      Technology and work

·      Business value

·      Competition and control

Each post in the Future Slant blog will describe one of these trends, suggesting implications for higher education.

read more


FacebookTwitterLinkedInGoogle+