Вы находитесь на странице: 1из 6

Raising information send information in electronic form at all.

Al-
though some of this, such as automatic updates of
security awareness virus fixes, can be provided as a background
service, there will always be points at which the
in the academic user has to make responsible decisions, with a
security risk attached.
setting The risks are as serious in the academic sector as
in, say, the financial sector. It may be more
straightforward to measure the potential cost of a
by Andrew Cox and Sarah Connolly, security breach or of system downtime at a bank.
The damage can be measured in terms of lost
LITC, South Bank University and
business, in monetary terms. But even if less easily
James Currall, University of Glasgow
quantifiable the risks for a University are still
great. And so too for users. For institutions secu-
rity failures can cause a loss of time, of data and of
This paper examines three approaches to reputation. The individual has those same things at
increasing awareness in an academic setting: stake, and also their privacy.
a discussion session, a checklist and a web
based tutorial. All three are found to be So it is important that users need to understand
effective in raising motivation and security at some level, but there are some barriers
understanding of security because they to this. On the surface security does not seem an
present the issues in an accessible, interesting inherently interesting topic, particularly as usually
way. presented. A student comes to a computer to write
a paper or do research, how the computer works is
The research for the paper was funded by the not usually of inherent interest. Security may
JISC Committee for Awareness, Liaison and threaten their ability to complete work, but it is not
Training as part of a project on the human and something they wish to be concerned with. Users
organisational issues associated with network are already struggling to understand computers and
security. http://litc.sbu.ac.uk/jcalt/ networks. Is trying to explain security issues to
them just adding another layer of complexity that
they probably wont be able to cope with ? Even if
one acknowledges this but decides that training
Universities, like many other institutions, are users is unavoidable, there is a further barrier. It is
working more and more online. Vital and confi- difficult to come to terms with the nature of risk: ie
dential messages about research or administrative how much effort should one spend on countering a
arrangements are exchanged by email. Documents very unlikely event, which would be absolutely
sitting on computers or the network represent disastrous if it happened? But ultimately the
many man hours of work. Budget is spent online. difficulty of the topic is an argument for more
The more institutions depend on computers the training, rather than less.
more important computer security becomes.
This article evaluates three simple approaches to
By security we could mean anything from virus raising awareness, that may be able to overcome
scanning, backing up work, choosing and changing these apparent barriers. One of the assumptions the
passwords - to interacting with secure servers and paper makes is that in fact security is not necessar-
encrypting or signing electronic messages. We ily boring. It is also the contention here that users,
have seen great advances in security technology, though struggling with the technology, are both
and the reliability of the network in the last few interested and motivated to use the network re-
years, but technology cannot mitigate all the risks. sponsibly. It probably goes without saying that an
All along the line users have to make decisions awareness programme should be developed as part
with security implications, e.g. to keep their virus of a wider Information Strategy (for which see
files up to date, to update software, to treat email Alan Robiette. “Developing an information secu-
attachments with caution, to make sensible choices rity policy”. http://www.jisc.ac.uk/pub01/
about when to encrypt message - or when not to security_policy.html).

VINE 123 — 11
Raising information security awareness in the academic setting

The discussion session The main body of the session was based around a
series of headlines and extracts from newspapers
which were used as jumping off points to stimulate
One approach to increasing security awareness is more discussion of the issues.
through courses. Ideally aspects of security should
be covered in training for the use of any applica- • Basic security practice
tion, e.g. the dangers of viruses should be covered “Watch out there is a hacker about”. (The
in a course on email. But there is also a need for Daily Telegraph, January 8 th 2001) In this
general security awareness raising sessions, e.g. article there is advice on backups,
about choosing good passwords or anti-virus passwords, securing information. Looking at
protection. There is a danger that such training this story led to a discussion of how well
could be boring or even anxiety provoking, be- people felt they, colleagues and students
cause it would be easy to take the approach of performed against these ‘common sense’
simply setting out a list of do’s and don’ts, and criteria. The session leaders tried to tease
restrictive rules - and the consequences of not out non-obvious aspects of the issues. For
observing them. It is doubtful that if attendance example one of the pieces of advice is not to
was voluntary that many would attend this sort of ‘ send sensitive information by email, except
training session. The approach also does not encrypted.’ This is not a straight forward
accord very well with the typical liberal, relaxed piece of advice. To follow it one needs to
culture of University life. determine what is sensitive information, and
ideally identify different levels of
But there is scope for a more discursive approach, sensitivity, one needs a strategy to evaluate
that even excites interest in the topic. One only has sensitivity systematically. It also begs the
to read the newspaper regularly to understand that question of whether people know how to
the activities and mind set of hackers, the theft of encrypt information, how to send it once
identity and the hazards to privacy of email are encrypted and whether they understand the
fascinating. Running stories about online privacy, different levels of encryption.
say, are full of human and ethical interest. The
technology is secondary, essentially the interest is • Vulnerabilities
in the human communication. “Thieves of the future will steal your
identity”. (Sunday Times, December 10th
At South Bank University in Spring 2001 we 2000). The aim was to again problematise
experimented with a consciousness raising session perceptions of what is at risk online,
with a selected group of support staff. This was recognising that increased awareness of the
part of a series of lunch time lectures, offered to risks will increase motivation. What is at
staff as a Continuing Professional Development on risk if someone breaks into your account? Is
a voluntary basis. The session lasted around an it simply loss of data (they delete a file),
hour. corruption of data (they make small difficult
to detect changes), loss of privacy (they read
Structure of the session your files) or loss of reputation/trust (they
send messages under your identity)? The last
The session started with a review of the literature risk is arguably the most serious, but it is
of computer security, pointing out that much of it also the least obvious. We also discussed
concentrates on hardware and software solutions, whether Universities can measure risk to
and ignores the whole issue of human interaction themselves, and what the University has at
with systems. The fraction of the literature that risk.
does stress human issues is largely taken up with
the hacker and hacker culture. Some literature • Enforcement of policies
acknowledges the importance of the ‘insider’ as a “Policing online: three companies tell us
threat. But even this is again to stress malice above how they deal with email and web issues”
incompetence, ignorance or shortage of time as the (Evening Standard, January 16 2001). This
main causes of security failures. The opening article described the policies of three
presentation also discussed the difficulties inherent companies towards people who broke
in the concepts of trust and risk. company rules on computer use in some

12 — VINE 123
Raising information security awareness in the academic setting

way, such as by sending an executable file The precise content of the ‘top ten’ would obvi-
to a colleague or a document with a virus to ously vary depending on the local computing
a business contact. The issue to discuss here environment, any perception of specific problems
was how strict should the rules be, because that were to be addressed or the level of under-
many of these companies were much harsher standing among the target user group. The
than the University would be likely to be. approach was found to be effective in stimulating
staff at Glasgow to reflect on their own practice
• Online shopping and recognise the importance of good practices
• “Shoppers hacked off over online that are known about but easy to let lapse.
dangers” (Daily Telegraph, Nov 9 2000)

• “Increasing consumer confidence in Online tutorial


the internet and security of online
shopping has uncovered a burgeoning A third approach to awareness raising is through
world-wide appetite for laver bread” an online tutorial, (See Figure 2) perhaps built into
(Daily Telegraph, September 21 some process every user must perform, such as
2000) logging in. The most interesting example of this
we have found was designed by James Madison
• “How best to shop securely online” University. Periodically users are forced to make
(The Times, October 16 2000) changes to their password, before they can do this
To close off the discussion the they have to pass through a series of screens which
perennial issue of the security of briefly describe scenarios that raise information
online shopping systems and security issues, and challenge the user to say which
perceptions of their usefulness, of the options presented they would choose. Users
security and reliability was raised. are offered different scenarios if they are students,
‘faculty’ (ie academic staff) or staff. The dilemmas
Success of the exercise posed by the tutorial very much present the issues
as ethical ones, rather than simple cases of choos-
The session was successful in stimulating a vigor- ing right or wrong practice. In this sense the
ous and well informed discussion, with a high level approach is similar to the awareness raising ses-
of participation. People enjoyed the event. The sion tried at SBU. It also takes a broad view of
mixture of technical and non-technical staff was what security encompasses: including such things
good in allowing participants to inform each other. as IPR and use of Napster. At the end of the
An immediate benefit was the realisation that we tutorial, the lessons are summed up on a page that
should try and increase awareness that the Univer- can be printed out, and the user can continue on to
sity virus scanning software is available for free to change their password.
all staff to install on their computers at home.
A sample of the tutorials can be viewed at http://
This was only a one off experimental event. raven.jmu.edu/~dixonlm/quiz/ A report on their
Clearly to be effective it might need to be tied to philosophy and the success of the JMU tutorial can
more direct instruction. It did though appear to be be found summarised in a paper given to the
a simple, effective (if somewhat unscaleable) way Commonwealth Virginia Information Technology
to increase understanding of the issues. Symposium in 2000 (http://www.covits.com/
Session%20Descriptions/Workshop%20D.htm).

The checklist There is also their own checklist of safe practices,


called RUNSAFE. It is somewhat more technical
Another simple but effective approach to raising in approach to the issues than the Glasgow docu-
awareness is a checklist of do’s and don’ts that can ment.
be easily circulated among staff (perhaps by
email), presented in an accessible, helpful way. An The tutorial approach seems a valuable model for
example developed at University of Glasgow as a HE to pursue. It is scaleable and would work with
spin off from the JCALT project, and is repro- students as well as staff for whom the other meth-
duced in Figure 1. ods described here are more obviously attuned.

VINE 123 — 13
Raising information security awareness in the academic setting

University of Glasgow Information Services

IT Security Action Points


James Currall and Others
February 2001

Introduction

Most staff and students within the University are heavily dependant on IT systems to do their work. Over recent years the
reliability of the machines and networks has improved enormously, to a point where the reliability of IT systems is
determined much more by the actions of individuals in the way that the systems are used. Essentially e-mail systems,
word processing programs, etc. are simply tools and like any tools they should be used carefully and with common sense.

It is important to remember that no amount of computer and network security is any use if machines, floppy disks, printouts,
etc. are left lying around in unlocked offices which anyone can wander in to. There is a particular problem in this respect
in relation to Sensitive and Personal data which are covered by the Data Protection Act 1998. A “Checklist for Personal
Data” is available to clarify the requirements of the Act and more information is to be found at the University Data Protection
Act web pages.

If you need help or advice in carrying out the actions suggested below, consult with your Faculty or Departmental IT staff
or with the Computing Service via the Advisory Service.

10 Action Points

Passwords and User Accounts

Remember that you will be held responsible for any actions originating from your workstation while you are logged in to
it.

Action point 1. Make sure a password is needed to access your machine whenever you are away from it; use a screen
saver password or workstation locking for short breaks and ensure that you log out if you are away for longer periods.

Action point 2. Don’t allow others to use your machine unattended (or a machine logged in as you) or to send e-mail from
your account.

Action point 3. Select passwords which are not to be found in dictionaries in any language, suitable passwords consist
of combinations of letters, numbers and punctuation!! (they should also be at least 6 characters long).

Action point 4. In general do not write down passwords, but as a last resort, if you feel that you are likely to forget your
password(s), hide the written copy away where only you would think of looking for it.

Action point 5. It is not good practice to tell other people your password; if it is necessary for someone to do something
on your machine, type the password for them (whilst they are not looking) and don’t under any circumstances give your
password to anyone asking for it over the phone or change it to something which someone else tells you to.

E-mail

As with any other form of communication you need to beware of the people out there who cannot be trusted and who can
make e-mail appear to come from your friends or colleagues. You might also wish to refer to the documents “Guidance
on the Use of E-mail” and “Security of Electronic Mail”.

Action point 6. Do not open e-mail attachments unless you are expecting them and there are no suspicious circumstances
surrounding the message containing them, if in doubt check with the supposed originator before opening them.

Viruses
We read about new computer viruses in the papers every week and the havoc that they can cause to businesses and
educational institutions. You can become the unwitting vehicle for disrupting the work of your colleagues and associates
if you do not take precautions.

Action point 7. Install a virus checker, keep it up-to-date and make sure that it is set to check files automatically - new
viruses appear at very frequent intervals.

Figure 1 – A Checklist example (continued opposite)

14 — VINE 123
Raising information security awareness in the academic setting

Software
Most of the software that you need to do your work will be provided from reputable sources. There are many useful
programs available on the Internet to do particular tasks, but there can be risks associated with obtaining and using them.

Action point 8. Do not download software from the Internet unless there is a clear business need for it and you can trust
the source/server that is providing it; people do make copies of legitimate shareware/freeware programs available with
viruses or modifications which compromise the security of your machine and disguise damaging programs as seemingly
harmless games or cute animations which open up backdoors into your machine or unleash viruses on all those you
communicate with.
Personal Details
Would you give your personal details to a complete stranger if they asked you? The Internet is no different!
Action point 9. Do not leave your details (or anyone else’s) in web forms unless you have good reason to trust that the
organisation running the web site will use the information in a responsible way (many web sites offer rather dubious
benefits in exchange for details which they then use to send you junk mail or sell to other organisations for the same
purpose).
Backups and Information Loss
If the work that you do has value to either yourself or the University, then loss of that work due to failure of equipment
or human error is an issue that you ought to take seriously. You are the only person who can ensure that this does not
happen!

Action point 10. Store all the documents and data that you work with on a fileserver that is backed-up regularly rather
than on your machine’s built-in hard disk and if there are files for which you cannot do this then make backup copies to
a server or to floppy disk regularly, otherwise you might find that all the work that you have been doing for the last few
weeks is wiped out by damage to or breakdown of your machine.

Figure 1 – A Checklist example (continued from Page 14)

Figure 2 – Online tutorial

VINE 123 — 15
Raising information security awareness in the academic setting

Although it is quite intrusive users can choose to or support the introduction of relatively novel
click through if they are in a hurry or impatient. technologies such as the encryption of email.
There is no sense that giving the wrong answer
denies you access to the service. The scenarios are Contact details
interesting enough to excite comment and thought Andrew Cox
for those with the time to spare. LITC
South Bank University
Conclusion 103 Borough Road
London SE1 0AA
This paper argues that in Universities (as every- Email:coxam@sbu.ac.uk
where else) information security on the network is
of growing importance, that there can be no purely Dr. James Currall
technical solution to making systems secure and Computing Service
that for these reasons users’ behaviour is critical to University of Glasgow
the security of all. There needs to be a security Glasgow G12 8QQ
culture among users. Several approaches to raising Tel: +44 (0)141 339 8855 ext. 4855
awareness are then discussed. All seem valid Fax: +44 (0)141 330 4808
approaches, whether to raise awareness generally Email: J.Currall@compserve.gla.ac.uk

16 — VINE 123

Вам также может понравиться