mobility cybersecurity issues/actions in education and ... · poster template by: apple computers....
TRANSCRIPT
POSTER TEMPLATE BY:
www.PosterPresentations.com
Apple Computers. (2012, May). About the security content of iOS 3.1.3 and iOS 3.1.3 for
iPod touch. Retrieved from support.apple.com/en-us/HT4013.
Moore, B. (2014). Making sense of student data privacy [PDF File]. Retrieved from
www.k12blueprint.com/sites/default/files/Student-Data-Privacy.pdf
National Institute of Standards and Technology (2013, April). Joint task force transformation
initiative: Security and privacy controls for federal information systems and
organizations [PDF File]. Retrieved from
nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
National Institute of Standards and Technology (2013, June). Guidelines on cell phones and
PDA [PDF File]. Retrieved from http://csrc.nist.gov/publications/PubsSPs.html#800-124
Ruggioro, P., & Foote, J. (2011). Cyber threats to mobile phone [PDF File]. Retrieved from
https://www.us-cert
Sween, S (2015, May). Cybersecurity framework [PDF File]. Retrieved from
https://resources.sei.cmu.edu/.../2015_017.
Mobility Cybersecurity Issues/Actions in
Education and Government
Richard Theodor Kusiolek, MBAUniversity of Phoenix
.
Introduction
Mobility in the work place and social media is
commonplace. Smartphones, Personal Digital
Assistants (PDAs), laptops, notebooks, tablets,
watches, and standalone computers have been
integrated into the mobile infrastructure but the
challenges of managing and securing these mobile
platforms still remains a priority. Academic and federal
agencies expect that mobility will increase productivity
and efficiency from telework, fieldwork to telehealth,
and inventory management.
How realistic is the expectation put forth by Federal
and Academic agencies in light of massive hacking
attacks? What are the Mobility Cybersecurity issues
that exist for educational and governmental
organizations? Are there any “new” domains of global
mobility or new technology insights that might have
the potential to maximize wireless cybersecurity?
“Mobility Cybersecurity for Education and
Government” will focus on comprehensive literature
reviews while including qualitative methodology and
touching on theoretical developments.
Materials and Methods
Digital Living Network Alliances
Energy, Communication and Market Share
Conclusion
Additional Information
Acknowledgements
The issue of privacy of student data will remain. The
reality is that as more academic institutions adopt online,
wireless mobility via smart phones and PDAs, cloud
services, privacy issues will accelerate tenfold. School
administrators and leaders need to understand the
issues and the relevant laws. A good example is the
University of Pittsburgh that uses the NIST Cybersecurity
Framework (NCF) to improve cybersecurity for students
and protect sensitive research data.
PDAs and Smart phones pose an unusual security risk. If
the wireless platform can allow the user to send and
receive text messages from the internet, the risk is high.
An attacker has the ability to (1) Abuse the user’s
service, (2) Lure the user into a malicious website or
convince the user to install malicious code on portable
devices, (3) Use the smart phone or PDA of a user in an
attack, and (4) Gain access to account information during
financial transactions.
Due to major security breaches of U.S. governmental
organizations, the use of mobile devices require the need
for additional security controls/control enhancements.
The mobility of physical hosting facilities can cause an
effect on the security controls selected for wireless
innovation platforms. In the majority of cases, the
government system is in a fixed and secure physical
location and the required protections are in place.
However, these controls do not have any value in a
mobile environment such as military operations, ships,
aircraft, automobiles, vans, and space-based systems.
University of Phoenix Academic Affairs Staff
• Summer Van Pelt, DM, Campus Director
• Cathy Malone, M.Ed, Director of Academic Affairs
• Vlad E. Genin, PhD, Campus College Chair, School of Business/IS&T
• Eileen M. Coughlin, MPA, SPHR, SHRM-SCP, Program Manager
“Cybersecurity is "the process of protecting information by
preventing, detecting, and responding to attacks." As part
of cybersecurity, institutions should consider
management of internal and external threats and
vulnerabilities to protect information assets and the
supporting infrastructure from technology-based attacks.
National Institute of Standards and Technology (NIST)
According to Mobile Work Exchange, 76% of federal
government workers use mobile devices of some type
for work related tasks.
Ten Major Technology Trends in Education
1. Personal access to mobile devices
2. Non-traditional access to connectivity
3. Use of video for classroom and homework
4. Mobile devices for school work
5. Using different tools for different tasks
6. Paying attention to the digital footprint
7. Increased interest in on-line learning
8. Gaming is growing and the gender gap is closing
9. Social media in schools
10.Laptops, digital readers, and tablets