SlideShare a Scribd company logo
Cyber Security Linda Sharp CoSN Cyber Security  Project Director  SchoolDude University 2009
Understanding the Issues Four Reasons to Pay Attention to K-12 Network Security 1.  Protect data  2. Prevent misuse of resources  3. Prevent interruption of operations  ( Protecting the Core Mission: Learning) 4. Keep kids safe  SchoolDude University 2009
Reliance on Technology For instructional activities For business operations For student data and recordkeeping For assessment and accountability For internal and external communication  Other areas of reliance in your schools? SchoolDude University 2009
The Evolution of Intent  From Hobbyists to Professionals SchoolDude University 2009 THREAT SEVERITY 1990 1995 2000 2005 WHAT’S NEXT? 2007 Threats becoming increasingly difficult to detect and mitigate FINANCIAL: Theft & Damage FAME: Viruses and Malware TESTING THE WATERS: Basic Intrusions and Viruses
Financial Impact 2004 – Cyber Attack impact in business was $226 billion 2008 – One of top 4 US priority security issues. Cyber Crime has overtaken drugs for financial impact.  SchoolDude University 2009
Legal Impact FERPA CIPA HIPAA COPA FRCP 34 SchoolDude University 2009
Legal Impact Data Personal, Private, Sensitive Information Information Sharing Internal  External Backup/Restore Where and how SchoolDude University 2009
Legal Impact Acceptable Use Policies (AUP) Who should sign AUP? What should be included? Internet usage Data protection and privacy Rules/regulations Consequences SchoolDude University 2009
Safety vs. Security Safety:   Individual behavior Security :  An organizational responsibility SchoolDude University 2009
Five Guiding Questions What needs to be protected?   SchoolDude University 2009
Five Guiding Questions What needs to be protected?   What are our weaknesses?   SchoolDude University 2009
Five Guiding Questions What needs to be protected?   What are our weaknesses?   What are we protecting against?   SchoolDude University 2009
Five Guiding Questions What needs to be protected?   What are our weaknesses?   What are we protecting against?   What happens if protection fails?   SchoolDude University 2009
Five Guiding Questions What needs to be protected?   What are our weaknesses?   What are we protecting against?   What happens if protection fails?   What can we do to eliminate vulnerabilities and threats and reduce impacts?   SchoolDude University 2009
Three Strategic Areas People  Policy  Technology SchoolDude University 2009
Three Action Themes Prevention  Monitoring  Maintenance SchoolDude University 2009
Questions to Ask Do we have a security plan?   SchoolDude University 2009
Questions to Ask Do we have adequate security and privacy policies in place?   District Security Rules Legal Review External Controls SchoolDude University 2009
Questions to Ask Are our network security procedures and tools up to date?   Hardware Software Monitoring SchoolDude University 2009
Questions to Ask Is our network perimeter secured against intrusion?   Design Laptops Wireless Security Passwords SchoolDude University 2009
Questions to Ask Is our network physically secure?   Environmental Hazards Physical Security SchoolDude University 2009
Questions to Ask Have we made our users part of the solution?   Awareness Training  Communications SchoolDude University 2009
Questions to Ask Are we prepared to survive a security crisis?   Backups Redundant Systems Communications Plan Preparedness SchoolDude University 2009
Security Planning Protocol SchoolDude University 2009 Outcome: Security Project Description      goals    processes    resources    decision-making standards Phase 1: Create Leadership  Team & Set Security Goals Outcome: Prioritized Risk Assessment   A ranked list of vulnerabilities to guide the Risk Reduction Phase Phase 2: Risk Analysis Outcome: Implemented Security Plan   Risk Analysis and Risk Reduction processes must be regularly repeated to ensure effectiveness Phase 3: Risk Reduction Outcome: Crisis Management Plan   A blueprint for organizational continuity Phase 4: Crisis Management
Leadership Team Create Leadership Team and Set Security Goals Purpose :  Clarify IT’s role in district mission Scope :  Set boundaries and budgets  Values :   Define internal expectations and external requirements for security  SchoolDude University 2009
Leadership Team Leadership Team Personnel IT Leadership Administrators – district and building Legal counsel  Human resources  Public relations representative  Teachers SchoolDude University 2009
District Security Checklist Self Assessment Checklist SchoolDude University 2009
Risk Analysis What’s at risk?   Vulnerabilities and Threats Identify impacts to  System People IT organizational issues Physical plant Stress Test SchoolDude University 2009
Security Planning Grid SchoolDude University 2009 Security Area Basic Developing Adequate Advanced Management Leadership: Little participation in IT security Aware but little support provided Supports and  funds security Aligns security  with organizational  mission Technology Network design  and IT operations : broadly  vulnerable security roll out  is incomplete mostly secure seamless security Environmental & Physical: Infrastructure: not secure partially secure mostly secure secure End Users   Stakeholders: unaware of role in security Limited  awareness  and  training Improved  awareness,  Mostly  trained Proactive  participants in  security
Security Planning Grid Provides benchmarks for assessing key security preparedness factors   Uses the same topic areas for consistency Helps prioritize security improvement action steps SchoolDude University 2009
Planning Security Grid Prioritize solutions Action plan Revise SOP SchoolDude University 2009
Plan, Test, Plan, Test….. Scenario: "Despite our best intentions..." Financial system backups stored within a vault below ground Vault walls are constructed of cinderblocks Fire destroys the building  Very cool to the touch -- vault becomes sauna, backup    tapes destroyed SchoolDude University 2009
Plan, Test, Plan, Test….. XXXXX School District Monday, February 11, 2008 Break-In at XXX. in XXX, CA "Smash and Grab" -- 1 computer stolen One data file including personally identifiable information on approximately 3,500 school district employees and on the employees of 12 other school districts SchoolDude University 2009
Plan, Test, Plan, Test….. Decision to notify and “how to respond?" Notification authority rests with the Superintendent Elected to follow aggressive path of notification and openness E-Mails, letters, contact person, Website (blog) SchoolDude University 2009
The worst case scenario . . . NO PLAN! SchoolDude University 2009
SchoolDude University 2009 Questions and Comments?
www.securedistrict.org SchoolDude University 2009 www.cosn.org
Thank you Sponsors SchoolDude University 2009
Linda Sharp CoSN Project Manager Cyber Security IT Crisis Preparedness [email_address] SchoolDude University 2009

More Related Content

Viewers also liked (6)

PPT
Installation To Occupancy
brentdzn
 
DOC
My Complete C.V[1]
legendovadya5
 
PPT
San Bernardino
brentdzn
 
DOC
My Complete C.V[1]
legendovadya5
 
PPT
Tamion&&Ashely
tlandreth
 
PPT
Highlighting Library Collections
johnbickar
 
Installation To Occupancy
brentdzn
 
My Complete C.V[1]
legendovadya5
 
San Bernardino
brentdzn
 
My Complete C.V[1]
legendovadya5
 
Tamion&&Ashely
tlandreth
 
Highlighting Library Collections
johnbickar
 

Similar to CyberSecurity - Linda Sharp (20)

PPT
Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
SchoolDude Editors
 
PDF
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
ManagedMethods
 
PDF
Cybersecurity - Strategy, Policy and Practice
Julie Evans
 
PPTX
NCSC-Cyber-security-training-for-school-staff.pptx
ArivuMathi9
 
PPTX
Information Security Blueprint
Zefren Edior
 
PDF
Cybersecurity in Educational Institutions: Management Strategies (www.kiu.ac.ug)
publication11
 
PPTX
Network security # Lecture 1
Kabul Education University
 
PPTX
Getting Real About K-12 Cybersecurity
Julie Evans
 
ODP
CISSP Week 12
jemtallon
 
DOC
Jennings it security overview 1 2
Donald Jennings
 
PDF
(eBook PDF) Information Security: Principles and Practices 2nd Edition
rrnohojhxx852
 
PDF
IT Security in Higher Education
Rapid7
 
PPTX
TIES 2013 Education Technology Conference
Evan Francen
 
PPT
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
Tammy Clark
 
PDF
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
Md Shaifullar Rabbi
 
DOC
Jennings it security overview 1 2
Donald Jennings
 
PPTX
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
Tammy Clark
 
PPT
Start With A Great Information Security Plan!
Tammy Clark
 
PPTX
Education to cyber security
zapp0
 
PPT
December ISSA Meeting Executive Security Presentation
whmillerjr
 
Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
SchoolDude Editors
 
Cloud Security Solutions for Public Institutions | TX DIR Forum 2019
ManagedMethods
 
Cybersecurity - Strategy, Policy and Practice
Julie Evans
 
NCSC-Cyber-security-training-for-school-staff.pptx
ArivuMathi9
 
Information Security Blueprint
Zefren Edior
 
Cybersecurity in Educational Institutions: Management Strategies (www.kiu.ac.ug)
publication11
 
Network security # Lecture 1
Kabul Education University
 
Getting Real About K-12 Cybersecurity
Julie Evans
 
CISSP Week 12
jemtallon
 
Jennings it security overview 1 2
Donald Jennings
 
(eBook PDF) Information Security: Principles and Practices 2nd Edition
rrnohojhxx852
 
IT Security in Higher Education
Rapid7
 
TIES 2013 Education Technology Conference
Evan Francen
 
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
Tammy Clark
 
Chapter 3 Orientation with Security Equipment's and Functionality and Fire F...
Md Shaifullar Rabbi
 
Jennings it security overview 1 2
Donald Jennings
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
Tammy Clark
 
Start With A Great Information Security Plan!
Tammy Clark
 
Education to cyber security
zapp0
 
December ISSA Meeting Executive Security Presentation
whmillerjr
 
Ad

More from SchoolDude Editors (19)

PDF
SchoolDude University 2014 West in Pictures
SchoolDude Editors
 
PPT
Capital Planning
SchoolDude Editors
 
PPT
Energy Management for Schools & Colleges - Terry Taylor
SchoolDude Editors
 
PPT
Achieving Excellence in Custodial Operations - Terry Taylor
SchoolDude Editors
 
PPT
Your Mission & Why You Should Choose to Accept It - Art Bode
SchoolDude Editors
 
PPT
Facilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
SchoolDude Editors
 
PPT
Telling the Technology Story - Vickie Bigham
SchoolDude Editors
 
PPT
How to Manage and Embrace Change in Facilities Envt. - Denine Kysar
SchoolDude Editors
 
PPT
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...
SchoolDude Editors
 
PPT
Managing When There Aren't Enough People to Do the Work - Debra Dixon-Doss
SchoolDude Editors
 
PPT
Life Cycle Modeling - Theory Behind TARA - Rick Biedenweg
SchoolDude Editors
 
PPT
• Technology Leadership, Planning and Implementation: Specific Strategies fo...
SchoolDude Editors
 
PPT
Improving Personal Communication - Jim Joyce
SchoolDude Editors
 
PPT
Train Your Requesters - Susan Savage Fusco and Natalie Stites
SchoolDude Editors
 
PPT
How to Implement a Fee Schedule for Community Use of School Facilities
SchoolDude Editors
 
PPTX
Leading Today - Scott Little
SchoolDude Editors
 
PPT
Strategies for Successful Technology Bond Campaigns - Vickie Bigham
SchoolDude Editors
 
PDF
Theres Gold In Those Energy Bills
SchoolDude Editors
 
PPT
Energy Management And Cost Control Fall2008
SchoolDude Editors
 
SchoolDude University 2014 West in Pictures
SchoolDude Editors
 
Capital Planning
SchoolDude Editors
 
Energy Management for Schools & Colleges - Terry Taylor
SchoolDude Editors
 
Achieving Excellence in Custodial Operations - Terry Taylor
SchoolDude Editors
 
Your Mission & Why You Should Choose to Accept It - Art Bode
SchoolDude Editors
 
Facilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
SchoolDude Editors
 
Telling the Technology Story - Vickie Bigham
SchoolDude Editors
 
How to Manage and Embrace Change in Facilities Envt. - Denine Kysar
SchoolDude Editors
 
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...
SchoolDude Editors
 
Managing When There Aren't Enough People to Do the Work - Debra Dixon-Doss
SchoolDude Editors
 
Life Cycle Modeling - Theory Behind TARA - Rick Biedenweg
SchoolDude Editors
 
• Technology Leadership, Planning and Implementation: Specific Strategies fo...
SchoolDude Editors
 
Improving Personal Communication - Jim Joyce
SchoolDude Editors
 
Train Your Requesters - Susan Savage Fusco and Natalie Stites
SchoolDude Editors
 
How to Implement a Fee Schedule for Community Use of School Facilities
SchoolDude Editors
 
Leading Today - Scott Little
SchoolDude Editors
 
Strategies for Successful Technology Bond Campaigns - Vickie Bigham
SchoolDude Editors
 
Theres Gold In Those Energy Bills
SchoolDude Editors
 
Energy Management And Cost Control Fall2008
SchoolDude Editors
 
Ad

Recently uploaded (20)

PDF
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
PDF
Build with AI and GDG Cloud Bydgoszcz- ADK .pdf
jaroslawgajewski1
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
PDF
Generative AI vs Predictive AI-The Ultimate Comparison Guide
Lily Clark
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PPTX
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
Build with AI and GDG Cloud Bydgoszcz- ADK .pdf
jaroslawgajewski1
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
Generative AI vs Predictive AI-The Ultimate Comparison Guide
Lily Clark
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
The Future of Artificial Intelligence (AI)
Mukul
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 

CyberSecurity - Linda Sharp

  • 1. Cyber Security Linda Sharp CoSN Cyber Security Project Director SchoolDude University 2009
  • 2. Understanding the Issues Four Reasons to Pay Attention to K-12 Network Security 1. Protect data 2. Prevent misuse of resources 3. Prevent interruption of operations ( Protecting the Core Mission: Learning) 4. Keep kids safe SchoolDude University 2009
  • 3. Reliance on Technology For instructional activities For business operations For student data and recordkeeping For assessment and accountability For internal and external communication Other areas of reliance in your schools? SchoolDude University 2009
  • 4. The Evolution of Intent From Hobbyists to Professionals SchoolDude University 2009 THREAT SEVERITY 1990 1995 2000 2005 WHAT’S NEXT? 2007 Threats becoming increasingly difficult to detect and mitigate FINANCIAL: Theft & Damage FAME: Viruses and Malware TESTING THE WATERS: Basic Intrusions and Viruses
  • 5. Financial Impact 2004 – Cyber Attack impact in business was $226 billion 2008 – One of top 4 US priority security issues. Cyber Crime has overtaken drugs for financial impact. SchoolDude University 2009
  • 6. Legal Impact FERPA CIPA HIPAA COPA FRCP 34 SchoolDude University 2009
  • 7. Legal Impact Data Personal, Private, Sensitive Information Information Sharing Internal External Backup/Restore Where and how SchoolDude University 2009
  • 8. Legal Impact Acceptable Use Policies (AUP) Who should sign AUP? What should be included? Internet usage Data protection and privacy Rules/regulations Consequences SchoolDude University 2009
  • 9. Safety vs. Security Safety: Individual behavior Security : An organizational responsibility SchoolDude University 2009
  • 10. Five Guiding Questions What needs to be protected? SchoolDude University 2009
  • 11. Five Guiding Questions What needs to be protected? What are our weaknesses? SchoolDude University 2009
  • 12. Five Guiding Questions What needs to be protected? What are our weaknesses? What are we protecting against? SchoolDude University 2009
  • 13. Five Guiding Questions What needs to be protected? What are our weaknesses? What are we protecting against? What happens if protection fails? SchoolDude University 2009
  • 14. Five Guiding Questions What needs to be protected? What are our weaknesses? What are we protecting against? What happens if protection fails? What can we do to eliminate vulnerabilities and threats and reduce impacts? SchoolDude University 2009
  • 15. Three Strategic Areas People Policy Technology SchoolDude University 2009
  • 16. Three Action Themes Prevention Monitoring Maintenance SchoolDude University 2009
  • 17. Questions to Ask Do we have a security plan? SchoolDude University 2009
  • 18. Questions to Ask Do we have adequate security and privacy policies in place? District Security Rules Legal Review External Controls SchoolDude University 2009
  • 19. Questions to Ask Are our network security procedures and tools up to date? Hardware Software Monitoring SchoolDude University 2009
  • 20. Questions to Ask Is our network perimeter secured against intrusion? Design Laptops Wireless Security Passwords SchoolDude University 2009
  • 21. Questions to Ask Is our network physically secure? Environmental Hazards Physical Security SchoolDude University 2009
  • 22. Questions to Ask Have we made our users part of the solution? Awareness Training Communications SchoolDude University 2009
  • 23. Questions to Ask Are we prepared to survive a security crisis? Backups Redundant Systems Communications Plan Preparedness SchoolDude University 2009
  • 24. Security Planning Protocol SchoolDude University 2009 Outcome: Security Project Description  goals  processes  resources  decision-making standards Phase 1: Create Leadership Team & Set Security Goals Outcome: Prioritized Risk Assessment A ranked list of vulnerabilities to guide the Risk Reduction Phase Phase 2: Risk Analysis Outcome: Implemented Security Plan Risk Analysis and Risk Reduction processes must be regularly repeated to ensure effectiveness Phase 3: Risk Reduction Outcome: Crisis Management Plan A blueprint for organizational continuity Phase 4: Crisis Management
  • 25. Leadership Team Create Leadership Team and Set Security Goals Purpose : Clarify IT’s role in district mission Scope : Set boundaries and budgets Values : Define internal expectations and external requirements for security SchoolDude University 2009
  • 26. Leadership Team Leadership Team Personnel IT Leadership Administrators – district and building Legal counsel Human resources Public relations representative Teachers SchoolDude University 2009
  • 27. District Security Checklist Self Assessment Checklist SchoolDude University 2009
  • 28. Risk Analysis What’s at risk? Vulnerabilities and Threats Identify impacts to System People IT organizational issues Physical plant Stress Test SchoolDude University 2009
  • 29. Security Planning Grid SchoolDude University 2009 Security Area Basic Developing Adequate Advanced Management Leadership: Little participation in IT security Aware but little support provided Supports and funds security Aligns security with organizational mission Technology Network design and IT operations : broadly vulnerable security roll out is incomplete mostly secure seamless security Environmental & Physical: Infrastructure: not secure partially secure mostly secure secure End Users Stakeholders: unaware of role in security Limited awareness and training Improved awareness, Mostly trained Proactive participants in security
  • 30. Security Planning Grid Provides benchmarks for assessing key security preparedness factors Uses the same topic areas for consistency Helps prioritize security improvement action steps SchoolDude University 2009
  • 31. Planning Security Grid Prioritize solutions Action plan Revise SOP SchoolDude University 2009
  • 32. Plan, Test, Plan, Test….. Scenario: "Despite our best intentions..." Financial system backups stored within a vault below ground Vault walls are constructed of cinderblocks Fire destroys the building Very cool to the touch -- vault becomes sauna, backup tapes destroyed SchoolDude University 2009
  • 33. Plan, Test, Plan, Test….. XXXXX School District Monday, February 11, 2008 Break-In at XXX. in XXX, CA "Smash and Grab" -- 1 computer stolen One data file including personally identifiable information on approximately 3,500 school district employees and on the employees of 12 other school districts SchoolDude University 2009
  • 34. Plan, Test, Plan, Test….. Decision to notify and “how to respond?" Notification authority rests with the Superintendent Elected to follow aggressive path of notification and openness E-Mails, letters, contact person, Website (blog) SchoolDude University 2009
  • 35. The worst case scenario . . . NO PLAN! SchoolDude University 2009
  • 36. SchoolDude University 2009 Questions and Comments?
  • 38. Thank you Sponsors SchoolDude University 2009
  • 39. Linda Sharp CoSN Project Manager Cyber Security IT Crisis Preparedness [email_address] SchoolDude University 2009