Data privacy and protection is becoming an increasingly important topic on a personal and professional level and in all fields -not just higher education. Lately stories about hackers gaining access to important data has filled my news feed. We need to focus on ways to decrease higher education institution’s vulnerabilities and safeguard our information. To that end, this week we welcome Stephen Orr, Adjunct Assistant Professor with the Computer Networks and Security (CMIT) department at the University of Maryland University College. Stephen is here to discuss recent data breaches in higher education and includes some suggested solutions. Thank you Stephen for beginning this important discussion for us and our members!

Enjoy the read,

~Lindsey Downs


Introduction

We recently celebrated the eleventh Data Privacy Day in the United States. According to Wikipedia, the purpose is to raise awareness and promote privacy and data protection best practices. We are also honoring the first legally binding international treaty dealing with privacy and data protection. This treaty was signed January 28th 1981 at the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data.

Thinking back to January 28, 2017, how did you celebrate? Odds are you didn’t. In fact, you probably have never heard about Data Privacy Day. Image of a peice of cakeThe day passed with no party, no thought of data privacy, and sadly, no cake.

While we are a few months removed from January, it is never a bad time to celebrate, and at the very least reflect on what Data Privacy Day means for institutes of higher education (IHE).

The Challenge

In 2016 there was a 40% increase in data breaches from the previous year. Perhaps one of the most infamous examples was the OPM data breach, where personally-identifiable information – such as names, dates and place of birth, addresses, medical history, even Social Security numbers and fingerprints – of more than 20 million US citizens was stolen. The cybersecurity threats faced by institutes of higher education (IHE) are no different than the threats faced by any other industry. In fact, it is well documented that attackers specifically target IHE for exploitation. A targeted exploit can be through the use of a phishing email whereby the user is tricked into clicking on a malicious link, which in turn exploits and provides the attacker access to the computer. After exploitation, the attackers can find the data of interest, and steal it. Per the National Strategy to Secure Cyberspace, IHE are subject to exploitation for two reasons: (1) they possess vast amounts of computing power; and (2) they allow relatively open access to those resources. Although IHE have traditionally been considered more academically open‘ by nature, there needs to be a balance with cybersecurity.

In July of 2013 it was reported that 72,000 student’s identities were stolen from the University of Delaware. This was estimated to cost about $19 million. In 2014, it was reported that 300,000 records at the University of Maryland College Park were copied. The information taken included names, social security numbers, dates of birth, and university identification numbers. Also in 2014, North Dakota University system reportedly had their computer systems exploited, providing access to 290,000 past and present student records.2

There are many other IHE breaches that could be listed, but you get the point. Between 2005 and 2014 there were 727 reported IHE breaches with 27,509 being the average number of records exposed. If interested, you can visually interact with the biggest IHE data breaches from 2005 to 2014 by visiting the following webpage.

So what happens after these breaches? Usually a public apology followed by a promise to focus on the organization’s cybersecurity posture, and the promise of credit monitoring for all of those affected. All of which comes at a significant financial and reputational cost.

Perhaps we should be more proactive and not wait for the data breach?

The Solutions

So what is an IHE to do? There are many details that are beyond the scope of a single blog post. That being said, let’s explore what these are at a high level.

First, it is of utmost importance to plan for when, not if. In fact, the Federal Trade Commission (FTC) offers a Data Breach Response Guide to assist when the worse should occur.

Second, focus on cybersecurity fundamentals. Don’t focus on the Advanced Persistent Threat (APT) or zero-days. Advanced persistent threat attacks can be traced as far back at the 1980s, with notable examples including The Cuckoo’s Egg, which documents the discovery and hunt for a hacker who had broken into Lawrence Berkeley National Laboratory. It’s hard, if not impossible to stop a well resourced APT with a zero day. According to Gartner’s Top Security Predictions, 99% percent of vulnerabilities exploited will continue to be ones known by security and IT professionals for at least one year. It stands to reason that focusing on the 99% (fundamentals) should be the focus.

The fundamentals include a comprehensive cybersecurity system, which must have locks (perimeter defenses), waiting rooms (for behavioral analysis), ears (for listening for abnormalities in huge streams of data from many sources), eyes (for scanning for abnormalities), a brain to make sense of all of this information, and arms and hands to take action to remediate the threats. There are many public and private organizations that offer advice on how to accomplish this goal. For example, NIST and the NSA Information Assurance Directorate (IAD) offer freely available resources for any organization to use.

Third, protect the data stored at rest and in transit across the ‘secure systems’. Image of a padlock on a stickynoteStrategy (how), policies (course of action), technical solutions (encryption, hashing, salting), and skilled human capital (implementation) are all needed to be successful. To be clear, this is not a one and done proposition. Data privacy requires vigilance and constant monitoring. It may even be prudent to establish a Chief Privacy Officer (CPO) to centralize and streamline the privacy and protection of the IHE data.

In summary, know what data you have, know where it is, know who is in control of it, know the policies and procedures the dictate how and by whom it can be used, know the technical safeguards, and know what the plan is when all of the best attempts to protect the data fails.

Stephen Orr Headshot

 

Stephen R. Orr IV, Ph.D.
Adjunct Assistant Professor
Computer Networks and Security (CMIT)
University of Maryland University College

 

 


CC Logo

Learn about WCET Creative Commons 4.0 License

Save

Save

Save

1 reply on “Data Privacy for Institutes of Higher Education (IHE)”

Subscribe

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,131 other subscribers

Archive By Month

Blog Tags

Distance Education (263)Student Success (249)Online Learning (195)WCET (188)U.S. Department of Education (188)State Authorization (186)Regulation (182)Managing Digital Learning (176)Technology (159)Digital Learning (130)Innovation (125)Teaching (120)Collaboration/Community (113)Course Design (102)WCET Annual Meeting (99)Access (97)Cost of Instruction (88)Professional Development (87)Faculty (83)Legislation (83)Financial Aid (82)Completion (74)Assessment (69)Instructional Design (66)Open Educational Resources (65)SAN (65)COVID-19 (62)Accreditation (61)Competency-based Education (61)SARA (61)Quality (60)Data and Analytics (59)Research (58)Credentials (56)Professional Licensure (56)Accessibility (55)Reciprocity (48)Outcomes (47)WOW Award (46)Diversity/Equity/Inclusion (42)Higher Education Act (41)Workforce/Employment (40)Regular and Substantive Interaction (38)Policy (38)Negotiated Rulemaking (36)Title IV (36)Virtual/Augmented Reality (36)Practice (35)Disaster Planning/Recovery (34)Academic Integrity (30)Leadership (30)IPEDS (28)Reauthorization (28)Survey (27)Adaptive/Personalized Learning (27)Credits (26)Military and Veterans (25)Disabilities (25)MOOC (23)Every Learner Everywhere (22)WCET Summit (22)WCET Awards (21)Evaluation (21)Complaint Process (20)Retention (20)Correspondence Course (18)Physical Presence (17)WICHE (17)State Authorization Network (16)Products and Services (16)Enrollment (16)Forprofit Universities (15)WCET Webcast (15)NCOER (14)Textbooks (14)Member-Only (14)Blended/Hybrid Learning (13)Cybersecurity (13)Digital Divide (13)Mobile Learning (13)Consortia (12)Futures (11)Marketing (11)Privacy (11)Personalized Learning (11)Prior Learning Assessment (10)Courseware (10)Teacher Prep (10)Social Media (9)LMS (9)Rankings (9)STEM (9)Standards (8)Student Authentication (8)system/consortia (8)Partnership (8)Artificial Intelligence (7)Readiness and Developmental Courses (7)What's Next (7)System/Consortia (6)K-12 (6)Nursing (6)Testing (6)Tuition and Fees (6)Graduation (6)International Students (5)Lab Courses (5)Proctoring (5)Remote Learning (5)Closer Conversation (5)ROI (5)DETA (5)Game-based/Gamification (5)Dual Enrollment (4)Outsourcing (4)Coding (4)Security (4)Fall and Beyond Series (3)In a Time of Crisis (3)Net Neutrality (3)Universal Design for Learning (3)Cheating Syndicates Series (3)Student Identity Verification (2)Cross Skilling/Reskilling (2)Nontraditional Learners (1)Title IX (1)Higher Education Trends (1)Mental Health (1)

Follow us on Twitter

%d bloggers like this: