mobility cybersecurity issues/actions in education and ... · poster template by: apple computers....

1
POSTER TEMPLATE BY: www.PosterPresentations.com Apple Computers. (2012, May). About the security content of iOS 3.1.3 and iOS 3.1.3 for iPod touch. Retrieved from support.apple.com/en-us/HT4013. Moore, B. (2014). Making sense of student data privacy [PDF File]. Retrieved from www.k12blueprint.com/sites/default/files/Student-Data-Privacy.pdf National Institute of Standards and Technology (2013, April). Joint task force transformation initiative: Security and privacy controls for federal information systems and organizations [PDF File]. Retrieved from nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf National Institute of Standards and Technology (2013, June). Guidelines on cell phones and PDA [PDF File]. Retrieved from http://csrc.nist.gov/publications/PubsSPs.html#800-124 Ruggioro, P., & Foote, J. (2011). Cyber threats to mobile phone [PDF File]. Retrieved from https://www.us-cert Sween, S (2015, May). Cybersecurity framework [PDF File]. Retrieved from https://resources.sei.cmu.edu/.../2015_017. Mobility Cybersecurity Issues/Actions in Education and Government Richard Theodor Kusiolek, MBA University of Phoenix . Introduction Mobility in the work place and social media is commonplace. Smartphones, Personal Digital Assistants (PDAs), laptops, notebooks, tablets, watches, and standalone computers have been integrated into the mobile infrastructure but the challenges of managing and securing these mobile platforms still remains a priority. Academic and federal agencies expect that mobility will increase productivity and efficiency from telework, fieldwork to telehealth, and inventory management. How realistic is the expectation put forth by Federal and Academic agencies in light of massive hacking attacks? What are the Mobility Cybersecurity issues that exist for educational and governmental organizations? Are there any “new” domains of global mobility or new technology insights that might have the potential to maximize wireless cybersecurity? “Mobility Cybersecurity for Education and Government” will focus on comprehensive literature reviews while including qualitative methodology and touching on theoretical developments. Materials and Methods Digital Living Network Alliances Energy, Communication and Market Share Conclusion Additional Information Acknowledgements The issue of privacy of student data will remain. The reality is that as more academic institutions adopt online, wireless mobility via smart phones and PDAs, cloud services, privacy issues will accelerate tenfold. School administrators and leaders need to understand the issues and the relevant laws. A good example is the University of Pittsburgh that uses the NIST Cybersecurity Framework (NCF) to improve cybersecurity for students and protect sensitive research data. PDAs and Smart phones pose an unusual security risk. If the wireless platform can allow the user to send and receive text messages from the internet, the risk is high. An attacker has the ability to (1) Abuse the user’s service, (2) Lure the user into a malicious website or convince the user to install malicious code on portable devices, (3) Use the smart phone or PDA of a user in an attack, and (4) Gain access to account information during financial transactions. Due to major security breaches of U.S. governmental organizations, the use of mobile devices require the need for additional security controls/control enhancements. The mobility of physical hosting facilities can cause an effect on the security controls selected for wireless innovation platforms. In the majority of cases, the government system is in a fixed and secure physical location and the required protections are in place. However, these controls do not have any value in a mobile environment such as military operations, ships, aircraft, automobiles, vans, and space-based systems. University of Phoenix Academic Affairs Staff Summer Van Pelt, DM, Campus Director Cathy Malone, M.Ed, Director of Academic Affairs Vlad E. Genin, PhD, Campus College Chair, School of Business/IS&T Eileen M. Coughlin, MPA, SPHR, SHRM-SCP, Program Manager “Cybersecurity is "the process of protecting information by preventing, detecting, and responding to attacks." As part of cybersecurity, institutions should consider management of internal and external threats and vulnerabilities to protect information assets and the supporting infrastructure from technology-based attacks. National Institute of Standards and Technology (NIST) According to Mobile Work Exchange, 76% of federal government workers use mobile devices of some type for work related tasks. Ten Major Technology Trends in Education 1. Personal access to mobile devices 2. Non-traditional access to connectivity 3. Use of video for classroom and homework 4. Mobile devices for school work 5. Using different tools for different tasks 6. Paying attention to the digital footprint 7. Increased interest in on-line learning 8. Gaming is growing and the gender gap is closing 9. Social media in schools 10.Laptops, digital readers, and tablets

Upload: others

Post on 16-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mobility Cybersecurity Issues/Actions in Education and ... · POSTER TEMPLATE BY: Apple Computers. (2012, May). About the security content of iOS 3.1.3 and iOS 3.1.3 for iPod touch

POSTER TEMPLATE BY:

www.PosterPresentations.com

Apple Computers. (2012, May). About the security content of iOS 3.1.3 and iOS 3.1.3 for

iPod touch. Retrieved from support.apple.com/en-us/HT4013.

Moore, B. (2014). Making sense of student data privacy [PDF File]. Retrieved from

www.k12blueprint.com/sites/default/files/Student-Data-Privacy.pdf

National Institute of Standards and Technology (2013, April). Joint task force transformation

initiative: Security and privacy controls for federal information systems and

organizations [PDF File]. Retrieved from

nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf

National Institute of Standards and Technology (2013, June). Guidelines on cell phones and

PDA [PDF File]. Retrieved from http://csrc.nist.gov/publications/PubsSPs.html#800-124

Ruggioro, P., & Foote, J. (2011). Cyber threats to mobile phone [PDF File]. Retrieved from

https://www.us-cert

Sween, S (2015, May). Cybersecurity framework [PDF File]. Retrieved from

https://resources.sei.cmu.edu/.../2015_017.

Mobility Cybersecurity Issues/Actions in

Education and Government

Richard Theodor Kusiolek, MBAUniversity of Phoenix

.

Introduction

Mobility in the work place and social media is

commonplace. Smartphones, Personal Digital

Assistants (PDAs), laptops, notebooks, tablets,

watches, and standalone computers have been

integrated into the mobile infrastructure but the

challenges of managing and securing these mobile

platforms still remains a priority. Academic and federal

agencies expect that mobility will increase productivity

and efficiency from telework, fieldwork to telehealth,

and inventory management.

How realistic is the expectation put forth by Federal

and Academic agencies in light of massive hacking

attacks? What are the Mobility Cybersecurity issues

that exist for educational and governmental

organizations? Are there any “new” domains of global

mobility or new technology insights that might have

the potential to maximize wireless cybersecurity?

“Mobility Cybersecurity for Education and

Government” will focus on comprehensive literature

reviews while including qualitative methodology and

touching on theoretical developments.

Materials and Methods

Digital Living Network Alliances

Energy, Communication and Market Share

Conclusion

Additional Information

Acknowledgements

The issue of privacy of student data will remain. The

reality is that as more academic institutions adopt online,

wireless mobility via smart phones and PDAs, cloud

services, privacy issues will accelerate tenfold. School

administrators and leaders need to understand the

issues and the relevant laws. A good example is the

University of Pittsburgh that uses the NIST Cybersecurity

Framework (NCF) to improve cybersecurity for students

and protect sensitive research data.

PDAs and Smart phones pose an unusual security risk. If

the wireless platform can allow the user to send and

receive text messages from the internet, the risk is high.

An attacker has the ability to (1) Abuse the user’s

service, (2) Lure the user into a malicious website or

convince the user to install malicious code on portable

devices, (3) Use the smart phone or PDA of a user in an

attack, and (4) Gain access to account information during

financial transactions.

Due to major security breaches of U.S. governmental

organizations, the use of mobile devices require the need

for additional security controls/control enhancements.

The mobility of physical hosting facilities can cause an

effect on the security controls selected for wireless

innovation platforms. In the majority of cases, the

government system is in a fixed and secure physical

location and the required protections are in place.

However, these controls do not have any value in a

mobile environment such as military operations, ships,

aircraft, automobiles, vans, and space-based systems.

University of Phoenix Academic Affairs Staff

• Summer Van Pelt, DM, Campus Director

• Cathy Malone, M.Ed, Director of Academic Affairs

• Vlad E. Genin, PhD, Campus College Chair, School of Business/IS&T

• Eileen M. Coughlin, MPA, SPHR, SHRM-SCP, Program Manager

“Cybersecurity is "the process of protecting information by

preventing, detecting, and responding to attacks." As part

of cybersecurity, institutions should consider

management of internal and external threats and

vulnerabilities to protect information assets and the

supporting infrastructure from technology-based attacks.

National Institute of Standards and Technology (NIST)

According to Mobile Work Exchange, 76% of federal

government workers use mobile devices of some type

for work related tasks.

Ten Major Technology Trends in Education

1. Personal access to mobile devices

2. Non-traditional access to connectivity

3. Use of video for classroom and homework

4. Mobile devices for school work

5. Using different tools for different tasks

6. Paying attention to the digital footprint

7. Increased interest in on-line learning

8. Gaming is growing and the gender gap is closing

9. Social media in schools

10.Laptops, digital readers, and tablets