Security Hits the Books

Barton County Community College enforces good cyber defense on Kansas campus

MAJOR cyber security breaches at higher education institutions have garnered headlines over the last couple years. Obviously, IT security continues to be a major challenge for colleges and universities. A recent survey from technology provider CDW Government found that 69 percent of higher education IT directors/managers polled said that IT security is a top priority for their institutions' administrations. Yet, 66 percent of respondents note they are able to dedicate less than one quarter of their time to security, citing lack of funding (50 percent) and lack of resources (12 percent) as the top two barriers to improving IT security on campus.

As higher education institutions face increasingly sophisticated security threats with sometimes limited resources, they must continue to foster education and self-discovery in safe environments to shape tomorrow's leaders. These principles must extend from the traditional classroom environment to the growing frontier of technology-powered education to protect students from outside cyber security threats and to ensure they follow proper cyber citizenry guidelines.

Barton County Community College in central Kansas is strengthening its cyber security posture to protect its 1,200 PC networks from increasingly sophisticated online threats without limiting the impact of IT-driven learning.

To manage a higher volume of increasingly complex cyber threats, Barton has segmented its IT campus in order to efficiently quarantine the student dormitories or other areas should they become infected by viruses or malicious code -- effectively keeping the rest of the campus safe from cyber attack. While this complex security segmentation reduces the risk of widespread infection, it also creates an exponential increase in management requirements. To purchase and implement a project of such complexity, Barton needed a trusted advisor to provide its new cyber security solution.

Working with CDW-G, Barton implemented a new firewall and virtual private network (VPN) solution to enhance cyber defenses while also providing a dashboard view of all subnets to simplify security management.

Balacing IT Management and Security
For more than 35 years, Barton has been preparing students for success through a blend of classroom and practical hands-on education. A majority of Barton's more than 50 degree programs incorporate the use of technology to prepare students to take their place in today's workforce. Barton also offers technology-focused degrees, including computer information systems and computer science. The college's wired buildings and computer labs ensure that technology access is at the fingertips of its more than 5,000 students. Although the Internet fosters increased communication and research capabilities, Barton's seven-member IT staff also must maintain vigilance against online threats.

Keeping Up with IT Gatekeeper Demands
"The increasing severity of computer viruses and malicious code has transformed information security from a low IT priority to an operational necessity," said Amy Oelke, co-team leader, information services at BCCC. "The evolving cyber threats were outpacing our existing firewall technology and making it increasingly challenging to monitor and manage our IT environment efficiently."

College administrators believe they have an obligation to prevent cyber mischief by their students. As a member of KanREN, a statewide research and education network that connects leading academic institutions and other organizations, Barton must ensure that student actions do not impact other KanREN members or other businesses.

"As Barton's IT gatekeepers, we have the dual responsibility of preventing outside cyber threats from affecting our infrastructure while also ensuring that curious students don't mistakenly unleash viruses within our network or tap outside systems that are private," Oelke said. "We also need to identify and repel malicious code at the edge of our network to prevent any IT problems."

Barton's IT staff monitors information security logs for suspicious activities of all types. Additionally, Barton's 14 physical and 31 logical network segments -- called subnets -- enable the college IT staff to isolate network areas infected by malicious code. This strategy prevents viruses detected in the student dormitory subnet, for example, from spreading across the entire network. Barton's network subnet capabilities, however, require the IT team to dedicate a considerable amount of time to managing the school's security infrastructure. The IT team used Sun Microsystems' SunScreen technology, which required Barton to use vendor-specific software/hardware and did not provide the VPN flexibility required for easy remote access. Importantly, today's cyber security realities also allow the IT team to view firewall logs in real time with sophisticated querying to gain immediate insight into potential security breaches.

Mapping Security to College Requirements
Barton's IT team faced numerous options when researching new security technologies.

"We required insight from a partner that understands the unique security requirements of an academic network and would help finalize product specifications within our budget," Oelke said. "We could not afford to make the wrong investment."

Barton selected CDW-G and its engineering team as a sounding board for product selection and to recommend software licensing and technical agreements that address the college's requirements. CDW-G combined its knowledge of the needs of higher education customers and of comprehensive product line from proven vendors to support Barton's security requirements. CDW-G helped the Barton team prepare for its presentation to the college board of trustees, during which it secured approval for funding for the new security solution.

"Barton is a leader in IT security," said Julie Smith, director of higher education, CDW-G. "They understand what is required to deal with today's ever-evolving security threats in order to manage their networks and protect student and administrative data effectively."

Deploying a Powerful, Flexible Security Infrastructure
Upon receiving IT funding approval, the Barton IT team deployed an initial pilot phase of its new solutions from CheckPoint Software Technologies in the late summer of 2004.

"Deploying a security solution effectively requires a strong understanding of your network, routing and how security product settings may impact other systems or users' access to important information," Perkins said.

The new and existing security solutions ran in tandem to ensure a high level of security while the pilot program was expanded. The new CheckPoint solution went live in November 2004.

"Our experience with our new security solution has been extremely positive and CDW-G has been very responsive during the entire process," Perkins said.

The new security solution enables Barton to manage its physical and logical subnets from a single dashboard that simplifies and accelerates network traffic monitoring and management. Additionally, the new security solution is intuitive, enabling multiple Barton IT staff members to manage the college's security infrastructure concurrently. The college's previous security solution was specialized -- only one staff member was trained to manage the technology.

The new solution's enhanced VPN and log-in capabilities simplify remote network access. The new security solution also consumes less processing power than its predecessor and operates on multiple vendor operating systems and hardware platforms.

Increasing Security Vigilance
Barton has planned a phased approach to broaden its cyber security capabilities. The college is expanding its cyber security management to the application level by increasing its monitoring of security and network infrastructure logs to identify additional malicious activities such as port scans that hackers use to locate network security vulnerabilities. By monitoring malicious activity on the network, IT staff can determine the techniques used to compromise network resources. Using the built-in application intelligence in the CheckPoint software, Barton can identify and block activity at the firewall in real time. The ability to look into each data packet to determine its validity provides another layer of protection and gives BCCC's IT team fine-grained control over all server requests.

BCCC also plans to systematically expand its multilayered hardware/software firewall strategy by further segmenting IT resources based on institutional goals to protect student data.

"Cyber security is a dynamic process that requires us to protect the college continually against ever-evolving threats," Oelke said. "We are confident that our new security technologies will provide the flexibility to expand our information defenses and address tomorrow's requirements. Our strategy to combine security products, policies and vigilance is integral to maintaining a safe and engaging online environment for the Barton community."

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3