Ayyagari and Tyks, 2012

Disaster at a University: A Case Study in Information Security

Type

Article

Year

2012

Authors

Ayyagari, R., Tyks, J.

Identifiers

Publication

Journal of Information Technology Education, Volume 11

Pages

85-96

Abstract

Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums. Accordingly, information security and privacy have become core concepts in information system education. Providing IT security on a shoestring budget is always difficult and many small universities are challenged with balancing cost and effectiveness. Many colleges and universities have additional security challenges, such as relaxed working environments, less formalized policies and procedures, and employees that “wear many hats.” Therefore, it is not surprising to note that majority of data breaches since 2005 occur in educational settings. So, it is imperative that this segment (i.e., educational settings) be represented in classroom discussions to prepare future employees.

To this end, we present a case that addresses a data breach at a university caused by lax security policies and includes an element of social engineering. The data breach at the university resulted in a number of students’ losing personally identifiable information. The resulting aftermath placed a significant financial burden on the university as it was not prepared to handle an information security disaster. This case can be used as a pedagogical tool as it uniquely captured a data breach in a university setting. Readers of the case will identify that at the management level the case raised a number of issues regarding the security culture at the university and management of security function. The case also highlights the issues of lack of training and access control.

(https://open-measure.atlassian.net/wiki/pages/resumedraft.action?draftId=1378091359, p. 1)

Citation

Ayyagari, R., Tyks, J., 2012. Disaster at a University: A Case Study in Information Security. JITE:IIP 11, 085–096. https://doi.org/10/gjkm86

 


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.