“A strategic plan to ensure confidentiality, integrity, and accessibility of Oneonta’s information assets.”
Approved by President’s Cabinet March 27, 2005
Revised by President's Cabinet October 27, 2009
TABLE OF CONTENTS
The purpose of this document is to define a set of minimum information technology (IT) security requirements that the College must meet to comply with State and Federal directives.The College may, based on its individual business needs and specific legal requirements such as FERPA or the GLBA, exceed any or all of the information security requirements put forth in this document, but must, at a minimum, achieve the information security levels defined in this document.
The primary objectives of the IT Security Program are:
This program applies to all faculty, staff and students of the College, or others (e.g., Research Foundation employees, OAS employees, vendors, contractors, etc) who may utilize the College’s technology and related facilities.
This program encompasses all computer systems, for which the College has responsibility, including systems managed or hosted by third parties on behalf of the College. It addresses all electronic information, regardless of the form or format, which is created or used in support of the College mission.
IT security refers to the protection of information from unauthorized access, destruction, modification or disclosure. For the purposes of this document, information is defined as the representation of facts, concepts, or instructions in an electronic manner suitable for communication, interpretation, or processing by human or automated means. Information is relayed in a variety of methods such as in written documentation or through computer networks. Information is also stored and retrieved in several formats. The formats can include but are not limited to: computer databases or transmissions, tapes, CD ROMS, diskettes, computer generated reports, hard copy documentation, e-mail messages, voice mail, etc.
This program must be communicated to all faculty, staff, students and all others who have access to or manage College information. This IT security program is not specific to any type of hardware, communications method, network topology, or software applications. As such, it is designed to be implemented across campus.
The President’s Cabinet is fully committed to IT security and agrees that every person in the College community has an important responsibility to continuously maintain the security and privacy of College data. This IT Security Program is a statement of the minimum requirements, ethics, responsibilities and accepted behaviors required to establish and maintain a secure environment, and achieve the College’s IT security objectives. This IT Security Program sets the direction, gives broad guidance and defines requirements for IT security related processes and actions across the College. This program follows the framework of the International Standards Organization’s ISO 27002 - The Information Security Standard.
A. The College: The President will designate an Information Security Officer (ISO). The ISO will ensure that an organization structure is in place for:
B. College Designated Staff: College designated staff will be responsible for the implementation of this and other IT Security policies and the compliance of College employees to this program. The designated staff must educate College employees with regard to IT Security issues, explain the issues, why the policies have been established, and what role(s) individuals have in safeguarding IT assets. Consequences of non-compliance will also be explained.
C. Information Owners: Information owners are responsible for determining who should have access to protected resources within their jurisdiction, and what those access privileges should be (read, update, etc.). These access privileges must be in accordance with the user’s job responsibilities. Information owners also communicate to the College ISO the legal requirements for access and disclosure of their data. Information owners must be identified for all College information assets and assigned responsibility for the maintenance of appropriate information security measures such as assigning and maintaining asset classification and controls, managing user access to their resources, etc. Responsibility for implementing information security measures may be delegated, though accountability remains with the identified owner of the asset.
D. College Information Security Officer: The College Information Security Officer has overall responsibility for ensuring the implementation, enhancement, monitoring and enforcement of this program. The College Information Security Officer is responsible for providing direction and leadership to the College through the recommendation of IT security policies, standards, processes and education and awareness programs to ensure that appropriate safeguards are implemented, and to facilitate compliance with those policies, standards and processes. The College Information Security Officer is responsible for investigating all alleged IT security violations. In this role, the College Information Security Officer may refer the investigation to other investigatory entities, including law enforcement. The College Information Security Officer will coordinate and oversee IT security program activities and reporting processes in support of this program and other IT security initiatives.
E. IT Security Administrator: This individual will report to the College Information Security Officer and be responsible for administering IT security tools, auditing IT security practices, identifying and analyzing IT security threats and solutions, and responding to IT security violations.
F.Departments or Individuals with Direct Responsibility for Technology Support: : These areas have responsibility for the data processing infrastructure and computing networks which support the information owners. It is their responsibility t to support the IT Security Program and provide resources needed to enhance and maintain a level of IT Security control consistent with the College’s IT Security Program.
G. College Employees: It is the responsibility of all employees to protect College information and resources, including passwords, and to report suspected IT security incidents to one or more of the following: the information owner, the IT Help Desk, or the Information Security administrator as appropriate.
H. Non-College Employees: Oneonta Auxiliary Services (OAS), Research Foundation (RF), Retirees, Contractors, Consultants, Vendors and other persons including students, to the extent of their present or past access to the College IT assets, are also covered by this IT Security Program.
All stored or transmitted electronic information which is created, acquired or used in support of the College’s mission, regardless of the form or format, must be used for College business only. This information is an asset and must be protected from its creation, through its useful life, and to its authorized disposal. It must be maintained in a secure, accurate, and reliable manner and be readily available for authorized use. Information must be classified and protected based on its importance to business activities, risks, and information security best practices as defined in ISO 27002 - The Information Security Standard.
A. Information is one of the College’s most valuable assets and the College relies upon that information to support our mission. The quality and availability of that information is key to the College's ability to carry out its mission. Therefore, the security of the College’s information, and of the technologies and systems that support it, is the responsibility of everyone concerned. Each authorized user of College information has an obligation to preserve and protect College information assets in a consistent and reliable manner. Information security controls provide the necessary physical, logical and procedural safeguards to accomplish those goals.
B. Information security management enables information to be shared while ensuring protection of that information and its associated computer assets including the networks over which the information travels. College designated staff are responsible for ensuring that appropriate physical, logical and procedural controls are in place on these assets to preserve the information security properties of confidentiality, integrity, availability and privacy of College information.
Individual accountability is the cornerstone of any information security program. Without it, there can be no information security. Individual accountability is required when accessing all College resources.
Confidentiality / Integrity / Availability
A. All College information must be protected from unauthorized access to help ensure the information’s confidentiality and maintain its integrity. Information owners will secure information within their jurisdiction based on the information’s value, sensitivity to disclosure, consequences of loss or compromise, and ease of recovery. The College will adopt policies and procedures to guide information owners in securing their information assets.
B. Information will be readily available for authorized use when it is needed by users in the normal performance of their duties. Appropriate processes will be defined and implemented to ensure the reasonable and timely recovery of all the College information, applications and systems, regardless of computing platform, should that information become corrupted, destroyed, or unavailable for a defined period (ref to Section 8 - Operations Management Program, Information Backup section).
A. Information must be properly managed from its creation, through authorized use, to proper disposal and requires different levels of protection. Information will be classified based on its value, sensitivity, consequences of loss or compromise, and/or legal and retention requirements. Criteria for determining the sensitivity of information will include consideration of confidentiality, integrity, availability, privacy, safety, legal and retention compliance requirements.
B. All information will have an information owner established within the College’s lines of business who will be responsible for assigning the initial information classification, and make all decisions regarding controls, access privileges of users, and daily decisions regarding information management.
C. Each classification will have a set or range of controls, designed to provide the appropriate level of protection of the information and its associated application software commensurate with the value of the information in that classification. Protective measures will address the above considerations with control categories that include: identification & authentication, access control, confidentiality, network security, host security, integrity, non-repudiation, monitoring and compliance.
Privacy and Handling of Private Information
Privacy of personally identifiable information must be maintained consistent with laws, rules and regulations. The College’s systems hold personal information (i.e., any information that is unique to any individual) to carry out the mission of the College. The protection of the privacy of personal information is of utmost importance and the College must protect the rights of privacy of all members of the College community. All College employees with access to personal information are required to respect the confidentiality of that personal information to the full extent of the law. Personal data, including information about employees, students, members of the public, organizations and business partners, collected and maintained by the College must:
The intent of this section is to reduce the risk of human error and misuse of College information and facilities.
Including Information Security in Job Responsibilities
Information security roles and responsibilities must be documented. These roles and responsibilities will include general responsibilities for all College employees, as well as specific responsibilities for protecting specific information assets and performing tasks related to information security procedures or processes.
A. All faculty, staff and students must receive general information security awareness training to ensure they are knowledgeable of information security procedures, their roles and responsibilities regarding the protection of the College information assets, and the proper use of information processing facilities to minimize information security risks.
B. Departments that process or maintain sensitive information are responsible for conducting specific information security awareness training for employees who handle such information in the course of their job duties. This training should include physical handling and disposition of non electronic documents containing sensitive information as well as proper procedures to follow in processing and storing electronic information and documents.
C. Logon banners will be implemented on all systems where that feature exists to inform all users that the system is for the College business or other approved use consistent with College mission.
Responding to Information Security Incidents and Malfunctions
A. Incidents affecting information security must be reported as quickly as possible to one or more of the following: the information owner, the Information Technology (IT) Help Desk or the IT Security Administrator as appropriate.
B. Formal incident reporting procedures that define the actions to be taken when an incident occurs must be established. Feedback mechanisms must be implemented to ensure that individuals reporting incidents are notified of the results after the incident has been resolved and closed.
Reporting Information Security Weaknesses
Users of information technologies shall report any observed or suspected information security weaknesses or threats to the appropriate manager and the IT Security Administrator. They must report these weaknesses as soon as possible. Users must not attempt to prove a suspected weakness unless authorized by the College ISO to do so. Testing weaknesses could have unintended consequences.
Reporting Information Security Software Malfunctions
Users are required to report software malfunctions such as a virus not being detected, password change not accepted, etc. Users should report such malfunctions by calling the IT Help Desk. After the IT Help Desk is notified of the problem the following actions will be taken:
Incident Management Process
The logging of information security incidents will be used by the College to identify recurring or high impact incidents and to record lessons learned. Review of this information may indicate the need for additional controls to limit the frequency, damage and cost of future incidents.
Physical Security Barriers
A. Breaching physical security can cause a loss of or damage to College information assets. Physical security will be achieved by creating physical barriers around the assets being protected. These barriers could be in the form of an entry point with card key access, a locked door, a staff member, or other physical barrier.
B. College environments where servers are stored or operational, wiring closets for networks and telephony, printers where confidential or sensitive information may be printed, and any other areas that contain and or process critical or sensitive information must be secured against unauthorized access.
C. The College will perform periodic threat and risk analysis to determine where additional physical security measures are necessary, and implement these measures to mitigate the risks.
Secure Disposal or Re-use of Equipment
There is risk of disclosure of sensitive information through careless disposal or re-use of equipment. Storage devices such as hard disk drives and other magnetic media such as tape, containing sensitive information will be physically destroyed or securely overwritten to prevent the unauthorized disclosure of sensitive College information.
Desktop, laptop and PDA computers connected to a network and/or containing sensitive or confidential College information must be automatically logged off or the screen locked within 30 minutes of inactivity.
All College owned computer equipment will be tagged to identify the College as the owner. An equipment inventory will be conducted annually by the Office of Property Management.
The College must implement a range of network controls to maintain security in its internal networks, and ensure the protection of connected services and networks. These controls help prevent unauthorized access and use of the College networks. The following controls, at a minimum, should be implemented:
Any devices connected to a network will be scanned periodically to ensure that no major vulnerabilities have been introduced into the environment. The frequency of scans will be determined by the College ISO.
Network Security Checking
A. Network vulnerability scanning will be conducted periodically at the discretion of the IT Security Administrator. The output of the scans will be reviewed in a timely manner, and any vulnerability detected will be evaluated for risk and mitigated. The tools used to scan for vulnerabilities will be updated periodically to ensure that recently discovered vulnerabilities are included in any scans.
B. A process to perform the scanning will be defined by the College, tested and followed at all times to minimize the possibility of disruption to the College networks by such reviews. Reports of exposures to vulnerabilities will be forwarded to the College ISO and IT Security Administrator.
C. All connections to College networks must be authenticated.
D. The use of any network vulnerability scanning tools, whether internal or external, by individuals who are not part of the formal test process described above is prohibited. Any vulnerability scanning from the Internet must be conducted exclusively by the College’s authorized, qualified staff or qualified third party.
Internet and Electronic Mail Acceptable Use
When College faculty, staff and students connect to the Internet using any College Internet address designation or send electronic mail using the College designation, it should be consistent with the College’s mission. College equipment, systems, facilities and supplies must be used only for conducting activities consistent with the College’s mission. Users are visible representatives of the College and must use the Internet and College e-mail system in a legal, professional and responsible manner. The following is not an all-inclusive list, and provides only examples of behavior that is not acceptable. Specifically, the Internet and electronic mail will not be used.for personal gain or profit;
A. A computer that is connected to a College network cannot also be connected to a non-College network via dial-up access using a modem unless specifically authorized by the College ISO. For example, users that subscribe to third party Internet service providers like AOL cannot connect to AOL via a modem at the same time they are connected to a College network.
B. Any connection over a public network (i.e. Internet) that involves sensitive information must use a Virtual Private Network (VPN) or other equivalent encryption technology to ensure the privacy and integrity of the data passing over the public network.
A. All portable computing resources and information media must be secured to prevent compromise of confidentiality or integrity. No computer device may store or transmit sensitive information without suitable protective measures being implemented and approved by the College ISO.
B. When using mobile computing facilities such as notebooks, palmtops, laptops and mobile phones, special care must be taken to ensure that information is not compromised. Users of mobile computing are responsible for physical protection, access controls, cryptographic techniques, back-ups, virus protection and the rules associated with connecting mobile facilities to networks and guidance on the use of these facilities in public places. In cases where sensitive information is concerned:
Telephones and Fax Equipment
The use of telephones outside the College for business reasons is sometimes necessary, but it can create security exposures. Examples of best practices:
A. Wireless technology and pervasive devices create opportunities for new and innovative uses. College information systems can be exposed to compromise or to a loss of service if security risks are not addressed correctly.
B. Wireless technology is a shared medium. Everything that is transmitted over the radio waves can be intercepted if the interceptor is within the coverage area of the radio transmitters. This represents a potential security issue in the wireless Local Area Networks (LANs). The security exposure is more evident in public areas, such as the Library, Residence Halls, and the Student Union.
C. Suitable controls such as authentication and encryption will be implemented by Telecommunications to reduce the possibility that a wireless network or access point can be exploited to disrupt College information services or to gain unauthorized access to College information.
D. A Wireless Communications Policy will be established to address these issues.
A. Using modems to connect to a network can create security risks. When using a modem and a computer that contains sensitive college information the following best practices apply:
1. For Outbound Service (Configured for outgoing calls only):
2. For Inbound Service (Configured for modem to accept incoming calls only):
A. The World Wide Web provides an opportunity for the College both to disseminate information and to provide interactive services quickly and effectively. Because anything posted on a public web server is globally available and each web presence is a potential connection path to the College networks, care will be exercised in the deployment of publicly accessible servers. There is also potential for an insecure server to be used or exploited to assist in an unauthorized or illegal activity, such as an attack on another web site.
B. Sensitive or confidential information will not be made available through a server that is available to a public network without appropriate safeguards approved by the College ISO. The College ISO will implement safeguards to ensure user authentication, data confidentiality and integrity, access control, data protection, and logging mechanisms.
C. The implementation of any web site or software that interacts with the user, requires registration, collects or processes information from users is considered to be application development and, therefore, must be audited and approved by the College ISO to ensure that the collection and processing of information meets College information security and privacy requirements. The review will ensure that the information is adequately protected while in transit over public and College networks, while in storage, and while being processed.
D. All official web sites will comply with Federal and state legal requirements.
Electronic signatures including digital signatures provide a means of protecting the authenticity and integrity of electronic documents. They can be used in electronic transactions where there is a need for a signature. New York State's Electronic Signatures and Records Act (ESRA) provides that electronic signatures are equivalent to hand-written signatures. The College will comply with the Electronic Signatures and Records Act (ESRA), FERPA, and any other State or Federal regulations regarding electronic signatures.
Incident Management Procedures
A. All users of College information systems must be made aware of the procedure for reporting information security incidents, threats, weaknesses, or malfunctions that may have an impact on the security of College information. All College staff and contractors are required to report any observed or suspected incidents to the appropriate manager and the College ISO as quickly as possible.
B. Incident management responsibilities must be documented and procedures must be clearly defined to ensure a quick, effective and orderly response to information security incidents. At a minimum, these procedures must address:
C. In addition to normal contingency plans designed to recover applications, systems or services, the incident response procedures must also cover:
D. College management and the College ISO will investigate all information security incidents and implement corrective actions to reduce the risk of reoccurrence.
Segregation of Duties
To reduce the risk of accidental or deliberate system misuse, separation of duties or areas of responsibility must be implemented where practical. Where appropriate, including where the separation of duties is not practical, other compensatory controls such as monitoring of activities, audit trails and management supervision must be implemented.
Separation of Test and Operational Facilities
A. Separation of the development, test and operational environments will be implemented, either logically or physically, when feasible. Processes must be documented and implemented to govern the transfer of software from the development environment to the operational platform.
B. Separation must also be implemented between development and test functions. The College must consider the use of a stable quality assurance environment where user testing can be conducted and changes cannot be made to the programs being tested. The following controls must be considered:
Protection Against Malicious Software
Software and associated controls must be implemented across College systems to prevent and detect the introduction of malicious software. The introduction of malicious software such as computer viruses, network worms and Trojan horses can cause serious damage to networks, workstations, and data. Users must be made aware of the dangers of unauthorized or malicious software. Anti-virus software will be installed on all computers connected to a College network. At a minimum, the virus signature files for this software must be updated weekly. On host systems or servers, the signature files will be updated daily or when the virus software vendor’s signature files are updated and published.
All purchased applications and systems software must be maintained at a vendor-supported level to ensure software accuracy and integrity. Maintenance of College-developed software will be logged to ensure changes are authorized, tested and accepted by College management. Also, all known information security patches must be reviewed and applied in a timely manner to reduce the risk of security incidents that could affect the confidentiality, integrity and availability of data or software integrity.
The scope of this program is limited to the IT infrastructure, and the data and applications of the local College environment. To ensure interruptions to normal College operations are minimized, and critical College applications and processes are protected from the effects of major failures, each College unit, in cooperation with the College IT organization, must develop plans that can meet the backup requirements of the College. Backups of critical College data and software must be performed regularly.
System Security Checking
A. Systems and services that process or store sensitive or confidential information or provide support for critical processes must undergo technical security reviews to ensure compliance with implementation standards and to assess vulnerabilities to subsequently discovered threats. Reviews of systems and services that are essential to supporting a critical College function must be conducted at least once every year. Reviews of a representative sample of all other systems and services must be conducted periodically.
B. Any deviations from expected or required results that are detected by the technical security review process must be reported to the College ISO and corrected immediately. In addition, the College application owner should be advised of the deviations and must initiate investigation of the deviations (including the review of system activity log records if necessary).
Disposal of Media
Sensitive information could be leaked to outside persons through careless disposal of media. Formal processes must be established to minimize this risk. Media such as tapes, diskettes, servers, mainframe and PC hard drives, and mobile devices such as phones, PDAs or USB drives containing sensitive College data must be destroyed by incineration, shredding, or electronic erasure of data before disposal, consistent with applicable record retention and disposition laws.
A. To preserve the properties of integrity, confidentiality and availability, the College’s information assets will be protected by logical and physical access control mechanisms commensurate with the value, sensitivity, consequences of loss or compromise, legal requirements and ease of recovery of these assets.
B. Information owners are responsible for determining who should have access to information assets within their jurisdiction, and what those access privileges will be (read, update, etc.). These access privileges will be granted in accordance with the user’s job responsibilities.
User Registration and Management
A. A process shall be established by the College to outline and identify all functions of user management, to include the generation, distribution, modification and deletion of user accounts for access to resources. The purpose of this process is to ensure that only authorized individuals have access to College applications and information and that these users only have access to the resources required for authorized purposes.
B. The User Management Process should include the following sub-processes:
C. In most cases the appropriate information owner or supervisor will make requests for the registration and granting of access rights for employees. In some cases access can be automatically granted or taken away based on employment status.
D. For applications that interact with individuals that are not employed by the College, the information owner is responsible for ensuring an appropriate user management process is implemented. Standards for the registration of such external users must be defined, to include the credentials that must be provided to prove the identity of the user requesting registration, validation of the request and the scope of access that may be provided.
Privileged Account Management
A. The issuance and use of privileged accounts will be restricted to only those individuals necessary in the normal performance of their job responsibilities. All individuals (systems programmers, database administrators, network and information security administrators, etc.) will have a unique privileged account (user-ID) for their personal and sole use so that activities can be traced to the responsible person. User-ids must not give any indication of the user’s privilege level, e.g., supervisor, manager, administrator. These individuals should also have a second user-ID when performing normal transactions, such as when accessing the College e-mail system.
B. In certain circumstances, where there is a clear requirement or system limitation, the use of a shared user-id for a group of users or a specific job can be used. Additional compensatory controls must be implemented to ensure accountability is maintained.
C. Passwords of privileged accounts should be changed at least every 90 days.
A. Passwords are a common means of authenticating a user’s identity to access an information system or service. Password standards will be implemented to ensure all authorized individuals accessing College resources follow proven password management practices. These password rules must be mandated by automated system controls whenever possible.
B. To ensure good password management, the following password standards will be implemented where feasible:
Network Access Control
Access to the College’s internal networks must require all authorized users to authenticate themselves through use of an individually assigned user-id and an authentication mechanism, e.g., password, token or smart card, or digital certificate. Network controls must be developed and implemented that ensure that an authorized user can access only those network resources and services necessary to perform their assigned job responsibilities.
User Authentication for External Connections (Remote Access Control)
A. To maintain information security, the College requires that individual accountability be maintained at all times, including during remote access. For the purposes of this program, “remote access” is defined as any access coming into a College network from a non-College network. This includes, but is not limited to:
B. Connection to the College’s networks must be done in a secure manner to preserve the integrity of the networks, data transmitted over those networks, and the availability of those networks. Security mechanisms must be in place to control access to College systems and networks remotely from fixed or mobile locations.
C. Because of the level of risk inherent with remote access, use of a strong password or another comparable method is required prior to connecting to a College network.
D. When accessing the College networks remotely, identification and authentication of the entity requesting access must be performed in such a manner as to not disclose the password or other authentication information that could be intercepted and used by a third party.
E. Use of a common access point is required. This means that all remote connections to a computer must be made through managed central points-of-entry. Using this type of entry system to access the College computer provides many benefits, including simplified and cost effective information security, maintenance, and support.
F. For a vendor to access College computers or software, individual accountability is also required. For those systems (hardware or software) for which there is a built-in user-id for the vendor to perform maintenance, the account must be disabled until the user-id is needed. The activity performed while this vendor user-id is in use must be logged. When the vendor has completed his work, the vendor user-id should be disabled, or the password changed to prevent unauthorized use of this privileged account. Vendor user-ids will be named to be easily identifiable.
G. In the special case where servers, storage devices or other computer equipment has the capability to automatically connect to a vendor to report problems or suspected problems, the College Information Security Administrator must review any such connection to ensure that connectivity does not compromise the College networks.
H. Employees working from a remote location must ensure that the work environment at the remote location provides adequate information security for College data and computing resources. Appropriate protection mechanisms must be in place at the remote location to protect against theft of the equipment, unauthorized disclosure of College information, misuse of College equipment or unauthorized access to the College internal networks or other facilities. To ensure the proper information security controls are in place and all College information security standards are followed, the following must be considered:
I. The following controls must be considered but are not limited to:
Segregation of Networks
Routers, Firewalls, VPN’s or other technologies should be implemented to control access to secured resources on the College networks.
Monitoring System Access and Use
Systems and applications must be monitored and analyzed to detect deviation from the access control program and record events to provide evidence and to reconstruct lost or damaged data. Audit logs recording exceptions and other information security-relevant events must be produced and kept consistent with record retention schedules developed in cooperation with the State Archives and Records Administration (SARA) and College requirements to assist in future investigations and access control monitoring. Audit logs will include but are not limited to:
A. Software applications are developed or acquired to provide efficient solutions to College problems. These applications generally store, manipulate, retrieve and display information used to conduct College business. The College units become dependent on these applications, and it is essential the data processed by these applications be accurate, and readily available for authorized use. It is also critical that the software that performs these activities be protected from unauthorized access or tampering.
B. To ensure that information security is built into all College information systems, all security requirements, including the need for rollback arrangements, must be documented.
C. Information security requirements and controls must reflect the value of the information assets involved, and the potential damage that might result from a failure or absence of information security measures. This is especially critical for online applications. The framework for analyzing the information security requirements and identifying controls to meet them is associated with threat assessment and risk management which must be performed by the College ISO and the information owner.
Control of Internal Processing
Data which have been entered correctly can be corrupted by processing errors or through deliberate acts. Application design must ensure that controls are implemented to minimize the risk of processing failures leading to a loss of data or system integrity. Specific areas to consider include:
Use of cryptography for protection of high-risk information must be considered when other controls do not provide adequate protection. Encryption is a technique that can be used to protect the confidentiality of information. It must be considered for the protection of sensitive or critical information. Based on a risk assessment, the required level of protection will be identified taking into account the type and quality of the encryption algorithm used and the length of cryptographic keys employed.
Change Control Procedures
A. To minimize the possibility of corruption of information systems, strict controls over changes to information systems must be implemented. Formal change control procedures for applications must be developed, implemented and enforced. They must ensure that information security and control procedures are not compromised, that support programmers are given access only to those parts of a system necessary to perform their jobs, and that formal agreement and approval processes for changes are implemented. These change control procedures will apply to College applications as well as systems software used to maintain operating systems, network software, hardware changes, etc.
B. In addition, access to source code libraries for both College applications and operating systems must be tightly controlled to ensure that only authorized individuals have access to these libraries and that access is logged to ensure all access can be monitored.
The designs, operation, use and management of information systems are subject to legal and vendor contractual information security requirements.
A. The Gramm-Leach-Bliley Act (GLBA) requires “financial institutions” as defined by the Federal Trade Commission (FTC), to protect and secure customer information such as names, Social Security numbers, addresses, account and credit card information. The GLBA sets forth extensive privacy rules which the College is deemed to be in compliance with because of its adherence to the provisions of the Family Education Rights and Privacy Act (FERPA). The GLBA also establishes a Safeguards Rule, from which the College is not exempt, that requires the College to protect and safeguard customer information.
Payment Card Industry Data Security Standard
A. The Payment Card Industry Data Security Standard (PCI-DSS) requires any entity that collects credit card data to protect customer data and card numbers.through security management, policies, procedures, network architecture, software design and other critical protective measures. The College will comply with the PCI-DSS.
Safeguarding of College Records
A. College records must be protected from loss, destruction or unauthorized modification. Some records may need to be retained in a secure manner for extended periods to meet state and Federal legal retention requirements, as well as to support essential operations.
B. The General Retention and Disposition Schedule for New York State Government Records contains guidelines for complying with legal, fiscal, and administrative requirements for records retention and provides advice on management of records. The College will develop procedures to dispose of any records in accordance with the provisions of Section 57.05 of Arts and Cultural Affairs Law. New York State Archives and Records Administration (SARA) issues general schedules to authorize the retention and disposition of records.
C. Safeguards that will be taken to protect customer information include the following:
Prevention of Misuse of Information Technology Resources
The information technology resources and the data processed by these resources are provided for College purposes. Management should authorize their use. Any use of IT facilities or data for non-College or unauthorized purposes, without management’s consent, should be considered a misuse of College facilities.
A. Compliance with this IT Security program is mandatory. Each user must understand his/her role and responsibilities regarding information security issues and protecting the College’s information assets. The failure to comply with this or any other information security program that results in the compromise of College information confidentiality, integrity, privacy, and/or availability may result in appropriate action as permitted by law, rule, regulation or negotiated agreement. The College will take every reasonable step necessary, including legal and administrative measures, to protect its information assets.
B. The College Information Security Officer shall review this document annually. If significant changes are needed the ISO shall propose the changes to the President’s Cabinet.
C. The College managers and supervisors will ensure that all information security processes and procedures within their areas of responsibility are followed. In addition, all units within the College may be subject to regular reviews to ensure compliance with information security policies and standards. Areas where compliance with the program requirements is not met will be documented and reported to the College’s Information Security Officer. For each area of non-compliance, a plan will be developed to address the deficiencies.
This is the exchange of security information to verify the claimed identity of a communications partner. In security terms it is particularly to counter attempts to masquerade as an authorized user to enable new connections or associations.
The granting of rights, which includes the granting of access based on an authenticated identity.
This is the ‘property’ of being available and usable upon demand by an authorized entity, e.g. a system or user.
The designation given to information or a document from a defined category on the basis of its sensitivity to disclosure, modification or destruction.
All physical, electronic and other components, types and uses of computers, including but not limited to hardware, software, central processing units, electronic communications and systems, databases, memory, Internet service, information systems, laptops, Personal Digital Assistants and accompanying equipment used to support the use of computers, such as printers, fax machines and copiers, and any updates, revisions, upgrades or replacements thereto.
The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.
Countermeasures or safeguards that are the devices or mechanisms that are needed to meet the requirements of program.
Cracking or Hacking:
Attempting to break into another system in which you have no account, and is treated as malicious intent.
A condition, vulnerability or threat that could cause danger to data, a system, network, or a component thereof.
Faculty, staff, students and others conducting business with the College.
The collection of information assets complied, generated or maintained to support the College.
Denial of Service:
An attack that takes up so much of the College’s resources that it results in degradation of performance or loss of access to the company’s business services or resources.
A condition in which an information asset is unavailable, as a result of a natural or man-made occurrence, that is of sufficient duration to cause significant disruption in the accomplishment of the College’s objectives as determined by College management.
The cryptographic transformation of data to render it unintelligible through an algorithmic process using a cryptographic key.
A security mechanism that creates a barrier between an internal network and an external network.
The Gramm-Leach-Bliley Act was passed by Congress in 1999 to protect the privacy and security of customer financial information.
A system or computer that contains business and/or operational software and/or data. Incident Response: The manual and automated procedures used to respond to reported network intrusions (real or suspected); network failures and errors; and other undesirable events.
Information is defined as the representation of facts, concepts, or instructions in a formalized manner suitable for communication, interpretation, or processing by human or automated means.
(1) All categories of automated information, including but not limited to: records, files, and databases, and (2) information technology facilities, equipment (including microcomputer systems), and software owned or leased by the State.
An individual or organizational unit having responsibility for making classification and control decisions regarding use of information.
The protection of automated information from accidental or intentional unauthorized access, modification, destruction, or disclosure.
Instant Messaging (IM):
The ability to exchange short messages online with co-workers or others. IM solutions can take several forms. They can use an existing Internet based service, or they can be an Intranet only solution implemented and controlled within an IT department. The latter is significantly more secure than the former, but lacks access to business partners.
The property that data has not been altered or destroyed from its intended form or content in an unintentional or an unauthorized manner.
This shall mean a system of linked computer networks, international in scope, that facilitate data transmission and exchange, which all use the standard Internet protocol, TCP/IP, to communicate and share data among each other.
The Intranet is an internal (i.e., non-public) network that uses the same technology and protocols as the Internet.
The monitoring of network activities, primarily through automated measures, to detect, log and report upon actual or suspected authorized access and events for investigation and resolution.
Information Security Officer
Un-forgeable evidence that a specific action occurred. This action could be the transmission of an electronic message, the competition of a transaction, or some other action.
The Payment Card Industry Data Security Standard was adopted to assure the protection of customer data and credit card numbers.
The protection of information processing equipment from damage, destruction or theft; information processing facilities from damage, destruction or unauthorized entry; and personnel from potentially harmful situations.
The right of individuals and organizations to control the collection, storage, and dissemination of information about themselves.
The user-ID or account of an individual whose job responsibilities require special system authorization, such as a network administrator, security administrator, etc. Special authorizations are allocated to this account such as RACF Administrator, auditor, Special or UNIX root.
Specific operational steps that individuals must take to achieve goals stated in this program.
Remote Access Server (RAS):
A server that allows users to gain access to a LAN from a remote location. Once a user has authenticated he can access network resources as if he were physically connected to the LAN.
The likelihood or probability that a loss of information assets or breach of security will occur.
The process of identifying threats to information or information systems, determining the likelihood of occurrence of the threat, and identifying system vulnerabilities that could be exploited by the threat.
The process of taking actions to assess risks and avoid or reduce risk to acceptable levels.
The responsibility and actions required to manage the security environment including the security policies and mechanisms.
The set of criteria for the provision of security services based on global rules imposed for all users. These rules usually rely on a comparison of the sensitivity of the resources being accessed and the possession of corresponding attributes of users, a group of users, or entities acting on behalf of users.
This, in terms of confidentiality, would cause a negative impact to the organization if the information were leaked or disclosed.
Monitoring network traffic.
Blindly posting something to a large number of groups.
Representing yourself as someone else.
Sets of rules for implementing program. Standards make specific mention of technologies, methodologies, implementation procedures and other detail factors.
Shall mean the State of New York.
Technical Security Review:
A technical security review would consist of reviewing the controls built into a system or application to ensure they still perform as designed. It would also include reviewing security patches to ensure they have been installed and are operational, review of security rules such as access control lists for currency, testing of firewall rules, etc.
The State University of New York, College at Oneonta
Any non-College entity such as a contractor, vendor, consultant, another College, etc.
A threat is a force, organization or person, which seeks to gain access to, or compromise, information. A threat can be assessed in terms of the probability of an attack. Looking at the nature of the threat, its apability and resources, one can assess it, and then determine the likelihood of occurrence, as in risk assessment.
Illegal code hidden in a legitimate program that when executed performs some unauthorized activity or function.
Unauthorized Access Or Privileges:
Insider or outsider who gains access to network or computer resources without permission.
USENET News group:
A USENET news group is a bulletin board where people can read or post Netnews messages on specific topics. There are many specialized business news groups. Many news groups are subscribed to by experts in the given topic and these individuals can provide valuable information and will sometimes respond to direct queries.
One who has authorized access to information on a computer. The authorization may include the ability to add or update information as well as access.
Any security threat that executes in a manner so that computer resources are damaged, lost or otherwise occupied so they are unavailable.
Virtual Private Network. Internet protocol (IP) virtual private networks (VPNs) are a collection of technologies that ensure the privacy of data over a shared unsecured IP network infrastructure. The two key points as to what constitutes an IP VPN are privacy and an IP network.
A weakness of a system or facility holding information which can be exploited to gain access. Vulnerability can be assessed in terms of the means by which the attack would be successful.
World Wide Web (WWW):
The World Wide Web is a hypertext-based system designed to allow access to information in such a way that the information, may physically reside on locally or geographically different servers. This access was greatly improved through the introduction of a graphical interface to the World Wide Web called a web browser. Netscape and Internet Explorer are two of the most popular web browsers.
A program similar to a virus that can consume large quantities of network bandwidth and spread from one network to another.