IT SECURITY AT
GEORGIA TECH LIBRARY
C U R R E N T E F F O R T S A N D
E M E R G I N G P R A C T I C E S
OVERVIEW: IT SECURITY AND LIBRARY SYSTEMS / SERVICES
IT
Security
Phishing
Authentication
Collaboration:
Vendors
Collaboration:
Patron Data
Internal Audit
and Risk Self-
Assessment /
Data Safeguards
Training and
Future Plans
PHISHING
2011
Go Phish
2012
SpearPhish
Training
Phish Bowl
AUTHENTICATION, AUTHORIZATION & ACCESS CONTROL
Authenticate
• Integration with CAS, Shibboleth
• Implementation of Duo (two-factor authentication)
• LastPass Enterprise
Authorize
• PersonAffiliation, curriculum, department
Access Control
• Proxy logs into Splunk
COLLABORATION: GEORGIA TECH LIBRARY & EMORY LIBRARIES
COLLABORATION: VENDORS AND DATA / IT SECURITY
Campus Security Review
• Data in the System
• Data Backup and
Disaster Recovery
• Vendor IT Security
Practice/Compliance
• Network Diagram and Firewalls and
VLANs
• Vendor’s internal testing, intrusion
prevention and training.
Results
• Data Sensitivity is Low
• Vendor use of independent
auditing firm for security
compliance (annual)
• Manage user access, permissions
and revocation
• Vendor provides description of
password complexity rules
• Vendor demonstrates protocols do
not transmit clear text
COLLABORATION: PATRON DATA
Share the least amount of patron
data necessary to support the
sharing of collections.
• First Name
• Last Name
• Unique identifier if using PPID
in lieu of employee ID
• Email Address
INTERNAL AUDIT AND RISK SELF-ASSESSMENT: OVERVIEW
INTERNAL AUDIT AND RISK SELF ASSESSMENT: STEWARDSHIP OUTCOMES
Training
• Provide
training for
library
employees
on IT Security
and Data
Stewardship
Data
Classification
• Audited 42
servers to
document
the
classification
of data on
the servers.
We did not
have
category IV
data.
Logon Banner
• Implemented
a logon
banner which
displays the
standard
usage
agreement
and a 15-
minute idle
timeout
Self Risk-
Assessment
• Conducted a
self risk-
assessment
with the
campus
online tool
INTERNAL AUDIT AND RISK SELF ASSESSMENT: TRAINING
Worked with Campus
Cybersecurity to provide
• 9 Training sessions for all
library employees
• Covered campus IT
policies
• Phishing
• 1 Training session for
Library IT employees on
security, confidentiality
of information and
software copyright laws
INTERNAL AUDIT AND RISK SELF ASSESSMENT: TRAINING OUTCOMES
• Computer & Network Usage and Security Policy (CNUSP)
• Data Access Policy & Data Classification
• Threats (Hacking and Phishing)
• Email Security Basics
• Common Phishing Attacks
• URL Dissection
• Password Policy
• Picking a Strong Password
INTERNAL AUDIT AND RISK SELF ASSESSMENT: DATA CLASSIFICATION
GT Data Categorization https://security.gatech.edu/DataCategorization
• Public Use
• Examples: Institute web site content, press releases, employee work
addresses, Library Catalog Information
Category I
• Internal Use
• Examples: directory listings, internal intranet web sites, gtID (alone),
Library Resources
• NOTE: This is the default data classification category.
Category II
• Sensitive
• Examples: Social Security Number, research data, intellectual
property of Georgia Tech, Library Circulation Records, Security
Camera Recordings
Category III
• Highly Sensitive
• Examples: Credit Card NumbersCategory IV
INTERNAL AUDIT AND RISK SELF ASSESSMENT: LOGON BANNER
IT&D Desktop and Collaboration
Services team updated the standard
usage agreement on all library
managed desktops and implemented
a 15-minute idle timeout to ensure
that computers do not become
accessible for unauthorized use.
INTERNAL AUDIT AND RISK SELF ASSESSMENT: SELF AUDIT SAMPLE 1
RISK: If unit data is not properly protected, the
unit’s ability to accomplish its organizational
objectives may be hindered.
CONTROLS:
1. Employees are notified of the CNUSP and DAP.
2. The data stored on information systems has
been classified in accordance with the Data
Access Policy (DAP).
3. Servers that store sensitive data are listed in
the OIT sensitive server list.
4. User access to sensitive data is properly
authorized
5. Policies / procedures are in place for data
security breaches
INTERNAL AUDIT AND RISK SELF ASSESSMENT: SELF AUDIT SAMPLE 2
RISK: Inadequately secured web servers may
result in compromise of data/campus network,
system corruption, loss of productivity & adverse
public relations or reputation.
CONTROLS:
1. Web site development adheres to the Institute
guide for the development of web sites.
2. Web site statistics are logged and maintained.
3. There are procedures/checklists in place to
ensure the security of the web server.
4. There are intrusion detection systems
protecting the network.
5. Proper change management procedures are
utilized when making changes to web servers.
INTERNAL AUDIT AND RISK SELF ASSESSMENT: SELF AUDIT SAMPLE 3
RISK: Unauthorized access to data.
CONTROLS:
1. Password Management process is in place.
2. Strong authentication controls for networks,
servers, and applications.
3. Logs are kept and reviewed on a regular basis
4. Users are uniquely identifiable.
5. Restrict access based on individual's job
6. System safeguards are in place
7. Vulnerability scans are completed against the
internal and external networks.
DATA SAFEGUARDS
Servers, Endpoints (e.g. Desktop Computers,
Laptop Computers, Workstations, USB Storage
Devices), Mobile
Devices (e.g. Smart Phones, Tablet Computers,
Personal Digital Assistants, Handheld Scanners),
Cloud Computing.
Each page in the spreadsheet contains a matrix
outlining the specific configurations or controls,
as well as whether the configuration or control
is Mandatory or Recommended based on the
category of data being stored on the computing
system in question.
https://security.gatech.edu/security-standards-
and-procedures
LIBRARY NEXT: PREPARING FOR THE FUTURE
Vendors Security Practices and Compliance
Vendor responses written into contracts
Patron data privacy and data not being sold
Data elimination written into contract
Improve management and access via relocation of
server room to centrally controlled facility
Ongoing employee training and awareness of
security issues, practices and policies
Ongoing risk assessment and mitigation strategies
(hardware, software, data, user behavior)
REFERENCES
Georgia Tech Library: Library Next
http://librarynext.gatech.edu/
Georgia Tech CNUSP
http://policylibrary.gatech.edu/information-technology/computer-and-network-
usage-and-security
Georgia Tech DAP
http://policylibrary.gatech.edu/data-access
Georgia Tech Phish Bowl
https://stats.security.gatech.edu/phishbowl/
Georgia Tech Security Standards and Procedures
https://security.gatech.edu/security-standards-and-procedures
THANK YOU
Doug Goans < doug.goans@library.gatech.edu >
Head of IT&D, Georgia Tech Library
Chris Helms <chris.helms@library.gatech.edu >
Application Development Manager, Georgia Tech Library

More Related Content

PDF
Carver IT Security for Librarians
PPTX
Wenger Replacing IP Filtering: Challenges for Academic Libraries
PDF
Hanson In Defense of the Proxy Server
PDF
Taking the Share out of Sharepoint: SharePoint Application Security.
PPTX
LLoyd - Web proxy vs. Federated SSO: A Practical Guide
PPTX
Leahy - What can SAML/Shibboleth do for your institution?
PPTX
Pawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
Carver IT Security for Librarians
Wenger Replacing IP Filtering: Challenges for Academic Libraries
Hanson In Defense of the Proxy Server
Taking the Share out of Sharepoint: SharePoint Application Security.
LLoyd - Web proxy vs. Federated SSO: A Practical Guide
Leahy - What can SAML/Shibboleth do for your institution?
Pawlowski and Beadles: Authentication and Access of Licensed Content in Ohio

What's hot (20)

PPTX
Information security - what is going on 2016
PDF
Identity & Authentication Management - Judy Luther
PPTX
Deep Web and Digital Investigations
PPTX
Hamparian - IP Authentication for STEM e-Content Access
PPT
Open source intelligence
PPTX
Technology and library support within an ODL environment
PPTX
Schwing Challenges to Successful Authentication Change
PPTX
Optimizing Protected Indexes
PPTX
The Notorious 9: Is Your Data Secure in the Cloud?
PDF
Rotenberg Provider's Perspective on Identity and Authentication Management
PPTX
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
PPTX
OSINT using Twitter & Python
PPTX
Redrawing the Cyber Defense Frontier
PDF
Visualizing Threats: Network Visualization for Cyber Security
PPTX
Gunter O
PPTX
Techniques for Electronic Resource Management: Crowdsourcing for Best Practices
KEY
Enterprise Open Source Intelligence Gathering
PPTX
Cyber security
PDF
Real-time Tweet Analysis w/ Maltego Carbon 3.5.3
PDF
Seclud it polesc_sjuly7
Information security - what is going on 2016
Identity & Authentication Management - Judy Luther
Deep Web and Digital Investigations
Hamparian - IP Authentication for STEM e-Content Access
Open source intelligence
Technology and library support within an ODL environment
Schwing Challenges to Successful Authentication Change
Optimizing Protected Indexes
The Notorious 9: Is Your Data Secure in the Cloud?
Rotenberg Provider's Perspective on Identity and Authentication Management
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
OSINT using Twitter & Python
Redrawing the Cyber Defense Frontier
Visualizing Threats: Network Visualization for Cyber Security
Gunter O
Techniques for Electronic Resource Management: Crowdsourcing for Best Practices
Enterprise Open Source Intelligence Gathering
Cyber security
Real-time Tweet Analysis w/ Maltego Carbon 3.5.3
Seclud it polesc_sjuly7
Ad

Viewers also liked (20)

PDF
Carver-IT Security for Librarians
PPTX
Chris Shillum: Overview of the RA21 proejct presentation
PDF
Carpenter: Getting Access Control from Here to There
PDF
Lavignino Do You Know Your Privacy Risks
PPTX
Presentation of NISO Altmetrics RP - Charleston Library Conference
PPTX
Ralph Youngen: Evolving Identity & Access Management at ACS Presentation
PDF
Madsen Digital Preservation Policy & Strategy
PDF
Ferrante Durable Access to Digital Primary Sources
PDF
Wittenberg Portico: Lessons From a Community Supported Archive
PDF
Wheeler & Benedict -- Enabling the Preservation Relay
PDF
VanDyck Long-Term Preservation of Digital Scholarly Literature
PDF
Goethals Harvard Library's Digital Preservation Repository
PPTX
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
PDF
Herdrich -The Digital Library of the Middle East (DLME)
PDF
Kettler Information Digitization in the Humanities
PDF
Waraksa Digital Library of the Middle East
PDF
Gonzalez Creating a Digital Makerspace
PDF
Neylon From Principles to Action
PDF
Weisberg - Museums and the Internet of Things
Carver-IT Security for Librarians
Chris Shillum: Overview of the RA21 proejct presentation
Carpenter: Getting Access Control from Here to There
Lavignino Do You Know Your Privacy Risks
Presentation of NISO Altmetrics RP - Charleston Library Conference
Ralph Youngen: Evolving Identity & Access Management at ACS Presentation
Madsen Digital Preservation Policy & Strategy
Ferrante Durable Access to Digital Primary Sources
Wittenberg Portico: Lessons From a Community Supported Archive
Wheeler & Benedict -- Enabling the Preservation Relay
VanDyck Long-Term Preservation of Digital Scholarly Literature
Goethals Harvard Library's Digital Preservation Repository
L’acquisition d’un outil de découverte_Expérience de l'Université Sherbrooke_...
Herdrich -The Digital Library of the Middle East (DLME)
Kettler Information Digitization in the Humanities
Waraksa Digital Library of the Middle East
Gonzalez Creating a Digital Makerspace
Neylon From Principles to Action
Weisberg - Museums and the Internet of Things
Ad

Similar to Goans-Helms-IT Security at Georgia Tech Library (20)

PPT
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
PPT
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
PDF
UNYCC Information Security Discussion
PPTX
An Introduction To IT Security And Privacy In Libraries
PPTX
ISACA ISSA Presentation
PDF
Acuent Security
PPTX
What is Information Security and why you should care ...
PDF
Enterprise Information Systems Security: A Case Study in the Banking Sector
PPTX
CS5300 class presentation on managing information systems
PPTX
Security Architecture
PPT
Cyber crime with privention
PDF
Top Security Challenges Facing Credit Unions Today
DOCX
ISE 510 Final Project Scenario Background Limetree In.docx
PDF
Accelerating OT - A Case Study
PPTX
Managing IT Risk and Assessing Vulnerability
PPTX
SoCal HIMSS Privacy Security Webinar
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PPT
Giving The Heave Ho To Worms, Spyware, And Bots!
PDF
9-Steps-Info-Sec-Whitepaper-final.pdf
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
UNYCC Information Security Discussion
An Introduction To IT Security And Privacy In Libraries
ISACA ISSA Presentation
Acuent Security
What is Information Security and why you should care ...
Enterprise Information Systems Security: A Case Study in the Banking Sector
CS5300 class presentation on managing information systems
Security Architecture
Cyber crime with privention
Top Security Challenges Facing Credit Unions Today
ISE 510 Final Project Scenario Background Limetree In.docx
Accelerating OT - A Case Study
Managing IT Risk and Assessing Vulnerability
SoCal HIMSS Privacy Security Webinar
Today's Cyber Challenges: Methodology to Secure Your Business
Giving The Heave Ho To Worms, Spyware, And Bots!
9-Steps-Info-Sec-Whitepaper-final.pdf

More from National Information Standards Organization (NISO) (20)

PPTX
Larry Bennett_ ALA Annual Convention 2025AL2 slides.pptx
PPTX
Potash "Our Journey & Vision for Accessible Content"
PPTX
O'Leary "Progress Assessment - How Far Are We from Delivery"
PPTX
Carpenter and O'Leary "Accessibility Standards and the Future of Inclusive Pu...
PPTX
Davidian "Transfer Code of Practice Standing Committee Update"
PPTX
Patham "NISO Open Discovery Initiative (ODI) Update"
PPTX
Hichliffe "A Standard Terminology for Peer Review"
PPTX
Levin "KBART RP Update at ALA Annual 2025"
PPTX
Carpenter "Advancing Infrastructure for Sustainable Collections: CCLP Project...
PPTX
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
PPTX
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
PDF
Carpenter "2025 NISO Annual Members Meeting"
PPTX
Allen "Social Marketing in Scholarly Communications"
PPTX
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
PDF
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
PDF
Pfeiffer "Secrets to Changing Behavior in Scholarly Communication: A 2025 NIS...
PPTX
Gilstrap "Accessibility Essentials: A 2025 NISO Training Series, Session 7, M...
PPTX
Turner "Accessibility Essentials: A 2025 NISO Training Series, Session 7, Lan...
PPTX
Comeford "Accessibility Essentials: A 2025 NISO Training Series, Session 7, A...
PPTX
Laverick and Richard "Accessibility Essentials: A 2025 NISO Training Series, ...
Larry Bennett_ ALA Annual Convention 2025AL2 slides.pptx
Potash "Our Journey & Vision for Accessible Content"
O'Leary "Progress Assessment - How Far Are We from Delivery"
Carpenter and O'Leary "Accessibility Standards and the Future of Inclusive Pu...
Davidian "Transfer Code of Practice Standing Committee Update"
Patham "NISO Open Discovery Initiative (ODI) Update"
Hichliffe "A Standard Terminology for Peer Review"
Levin "KBART RP Update at ALA Annual 2025"
Carpenter "Advancing Infrastructure for Sustainable Collections: CCLP Project...
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
Carpenter "2025 NISO Annual Members Meeting"
Allen "Social Marketing in Scholarly Communications"
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
Gibson "Secrets to Changing Behaviour in Scholarly Communication: A 2025 NISO...
Pfeiffer "Secrets to Changing Behavior in Scholarly Communication: A 2025 NIS...
Gilstrap "Accessibility Essentials: A 2025 NISO Training Series, Session 7, M...
Turner "Accessibility Essentials: A 2025 NISO Training Series, Session 7, Lan...
Comeford "Accessibility Essentials: A 2025 NISO Training Series, Session 7, A...
Laverick and Richard "Accessibility Essentials: A 2025 NISO Training Series, ...

Recently uploaded (20)

PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
Education and Perspectives of Education.pptx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
Climate Change and Its Global Impact.pptx
PDF
Complications of Minimal Access-Surgery.pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
Module on health assessment of CHN. pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
HVAC Specification 2024 according to central public works department
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
IP : I ; Unit I : Preformulation Studies
PDF
My India Quiz Book_20210205121199924.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
International_Financial_Reporting_Standa.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
What’s under the hood: Parsing standardized learning content for AI
Literature_Review_methods_ BRACU_MKT426 course material
Computer Architecture Input Output Memory.pptx
Education and Perspectives of Education.pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Climate Change and Its Global Impact.pptx
Complications of Minimal Access-Surgery.pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 1).pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Module on health assessment of CHN. pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
HVAC Specification 2024 according to central public works department
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
IP : I ; Unit I : Preformulation Studies
My India Quiz Book_20210205121199924.pdf
Introduction to pro and eukaryotes and differences.pptx
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
International_Financial_Reporting_Standa.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)

Goans-Helms-IT Security at Georgia Tech Library

  • 1. IT SECURITY AT GEORGIA TECH LIBRARY C U R R E N T E F F O R T S A N D E M E R G I N G P R A C T I C E S
  • 2. OVERVIEW: IT SECURITY AND LIBRARY SYSTEMS / SERVICES IT Security Phishing Authentication Collaboration: Vendors Collaboration: Patron Data Internal Audit and Risk Self- Assessment / Data Safeguards Training and Future Plans
  • 4. AUTHENTICATION, AUTHORIZATION & ACCESS CONTROL Authenticate • Integration with CAS, Shibboleth • Implementation of Duo (two-factor authentication) • LastPass Enterprise Authorize • PersonAffiliation, curriculum, department Access Control • Proxy logs into Splunk
  • 5. COLLABORATION: GEORGIA TECH LIBRARY & EMORY LIBRARIES
  • 6. COLLABORATION: VENDORS AND DATA / IT SECURITY Campus Security Review • Data in the System • Data Backup and Disaster Recovery • Vendor IT Security Practice/Compliance • Network Diagram and Firewalls and VLANs • Vendor’s internal testing, intrusion prevention and training. Results • Data Sensitivity is Low • Vendor use of independent auditing firm for security compliance (annual) • Manage user access, permissions and revocation • Vendor provides description of password complexity rules • Vendor demonstrates protocols do not transmit clear text
  • 7. COLLABORATION: PATRON DATA Share the least amount of patron data necessary to support the sharing of collections. • First Name • Last Name • Unique identifier if using PPID in lieu of employee ID • Email Address
  • 8. INTERNAL AUDIT AND RISK SELF-ASSESSMENT: OVERVIEW
  • 9. INTERNAL AUDIT AND RISK SELF ASSESSMENT: STEWARDSHIP OUTCOMES Training • Provide training for library employees on IT Security and Data Stewardship Data Classification • Audited 42 servers to document the classification of data on the servers. We did not have category IV data. Logon Banner • Implemented a logon banner which displays the standard usage agreement and a 15- minute idle timeout Self Risk- Assessment • Conducted a self risk- assessment with the campus online tool
  • 10. INTERNAL AUDIT AND RISK SELF ASSESSMENT: TRAINING Worked with Campus Cybersecurity to provide • 9 Training sessions for all library employees • Covered campus IT policies • Phishing • 1 Training session for Library IT employees on security, confidentiality of information and software copyright laws
  • 11. INTERNAL AUDIT AND RISK SELF ASSESSMENT: TRAINING OUTCOMES • Computer & Network Usage and Security Policy (CNUSP) • Data Access Policy & Data Classification • Threats (Hacking and Phishing) • Email Security Basics • Common Phishing Attacks • URL Dissection • Password Policy • Picking a Strong Password
  • 12. INTERNAL AUDIT AND RISK SELF ASSESSMENT: DATA CLASSIFICATION GT Data Categorization https://security.gatech.edu/DataCategorization • Public Use • Examples: Institute web site content, press releases, employee work addresses, Library Catalog Information Category I • Internal Use • Examples: directory listings, internal intranet web sites, gtID (alone), Library Resources • NOTE: This is the default data classification category. Category II • Sensitive • Examples: Social Security Number, research data, intellectual property of Georgia Tech, Library Circulation Records, Security Camera Recordings Category III • Highly Sensitive • Examples: Credit Card NumbersCategory IV
  • 13. INTERNAL AUDIT AND RISK SELF ASSESSMENT: LOGON BANNER IT&D Desktop and Collaboration Services team updated the standard usage agreement on all library managed desktops and implemented a 15-minute idle timeout to ensure that computers do not become accessible for unauthorized use.
  • 14. INTERNAL AUDIT AND RISK SELF ASSESSMENT: SELF AUDIT SAMPLE 1 RISK: If unit data is not properly protected, the unit’s ability to accomplish its organizational objectives may be hindered. CONTROLS: 1. Employees are notified of the CNUSP and DAP. 2. The data stored on information systems has been classified in accordance with the Data Access Policy (DAP). 3. Servers that store sensitive data are listed in the OIT sensitive server list. 4. User access to sensitive data is properly authorized 5. Policies / procedures are in place for data security breaches
  • 15. INTERNAL AUDIT AND RISK SELF ASSESSMENT: SELF AUDIT SAMPLE 2 RISK: Inadequately secured web servers may result in compromise of data/campus network, system corruption, loss of productivity & adverse public relations or reputation. CONTROLS: 1. Web site development adheres to the Institute guide for the development of web sites. 2. Web site statistics are logged and maintained. 3. There are procedures/checklists in place to ensure the security of the web server. 4. There are intrusion detection systems protecting the network. 5. Proper change management procedures are utilized when making changes to web servers.
  • 16. INTERNAL AUDIT AND RISK SELF ASSESSMENT: SELF AUDIT SAMPLE 3 RISK: Unauthorized access to data. CONTROLS: 1. Password Management process is in place. 2. Strong authentication controls for networks, servers, and applications. 3. Logs are kept and reviewed on a regular basis 4. Users are uniquely identifiable. 5. Restrict access based on individual's job 6. System safeguards are in place 7. Vulnerability scans are completed against the internal and external networks.
  • 17. DATA SAFEGUARDS Servers, Endpoints (e.g. Desktop Computers, Laptop Computers, Workstations, USB Storage Devices), Mobile Devices (e.g. Smart Phones, Tablet Computers, Personal Digital Assistants, Handheld Scanners), Cloud Computing. Each page in the spreadsheet contains a matrix outlining the specific configurations or controls, as well as whether the configuration or control is Mandatory or Recommended based on the category of data being stored on the computing system in question. https://security.gatech.edu/security-standards- and-procedures
  • 18. LIBRARY NEXT: PREPARING FOR THE FUTURE Vendors Security Practices and Compliance Vendor responses written into contracts Patron data privacy and data not being sold Data elimination written into contract Improve management and access via relocation of server room to centrally controlled facility Ongoing employee training and awareness of security issues, practices and policies Ongoing risk assessment and mitigation strategies (hardware, software, data, user behavior)
  • 19. REFERENCES Georgia Tech Library: Library Next http://librarynext.gatech.edu/ Georgia Tech CNUSP http://policylibrary.gatech.edu/information-technology/computer-and-network- usage-and-security Georgia Tech DAP http://policylibrary.gatech.edu/data-access Georgia Tech Phish Bowl https://stats.security.gatech.edu/phishbowl/ Georgia Tech Security Standards and Procedures https://security.gatech.edu/security-standards-and-procedures
  • 20. THANK YOU Doug Goans < doug.goans@library.gatech.edu > Head of IT&D, Georgia Tech Library Chris Helms <chris.helms@library.gatech.edu > Application Development Manager, Georgia Tech Library