Security Hits the Books

Barton County Community College enforces good cyber defense on Kansas campus

MAJOR cyber security breaches at higher education institutions have garnered headlines over the last couple years. Obviously, IT security continues to be a major challenge for colleges and universities. A recent survey from technology provider CDW Government found that 69 percent of higher education IT directors/managers polled said that IT security is a top priority for their institutions' administrations. Yet, 66 percent of respondents note they are able to dedicate less than one quarter of their time to security, citing lack of funding (50 percent) and lack of resources (12 percent) as the top two barriers to improving IT security on campus.

As higher education institutions face increasingly sophisticated security threats with sometimes limited resources, they must continue to foster education and self-discovery in safe environments to shape tomorrow's leaders. These principles must extend from the traditional classroom environment to the growing frontier of technology-powered education to protect students from outside cyber security threats and to ensure they follow proper cyber citizenry guidelines.

Barton County Community College in central Kansas is strengthening its cyber security posture to protect its 1,200 PC networks from increasingly sophisticated online threats without limiting the impact of IT-driven learning.

To manage a higher volume of increasingly complex cyber threats, Barton has segmented its IT campus in order to efficiently quarantine the student dormitories or other areas should they become infected by viruses or malicious code -- effectively keeping the rest of the campus safe from cyber attack. While this complex security segmentation reduces the risk of widespread infection, it also creates an exponential increase in management requirements. To purchase and implement a project of such complexity, Barton needed a trusted advisor to provide its new cyber security solution.

Working with CDW-G, Barton implemented a new firewall and virtual private network (VPN) solution to enhance cyber defenses while also providing a dashboard view of all subnets to simplify security management.

Balacing IT Management and Security
For more than 35 years, Barton has been preparing students for success through a blend of classroom and practical hands-on education. A majority of Barton's more than 50 degree programs incorporate the use of technology to prepare students to take their place in today's workforce. Barton also offers technology-focused degrees, including computer information systems and computer science. The college's wired buildings and computer labs ensure that technology access is at the fingertips of its more than 5,000 students. Although the Internet fosters increased communication and research capabilities, Barton's seven-member IT staff also must maintain vigilance against online threats.

Keeping Up with IT Gatekeeper Demands
"The increasing severity of computer viruses and malicious code has transformed information security from a low IT priority to an operational necessity," said Amy Oelke, co-team leader, information services at BCCC. "The evolving cyber threats were outpacing our existing firewall technology and making it increasingly challenging to monitor and manage our IT environment efficiently."

College administrators believe they have an obligation to prevent cyber mischief by their students. As a member of KanREN, a statewide research and education network that connects leading academic institutions and other organizations, Barton must ensure that student actions do not impact other KanREN members or other businesses.

"As Barton's IT gatekeepers, we have the dual responsibility of preventing outside cyber threats from affecting our infrastructure while also ensuring that curious students don't mistakenly unleash viruses within our network or tap outside systems that are private," Oelke said. "We also need to identify and repel malicious code at the edge of our network to prevent any IT problems."

Barton's IT staff monitors information security logs for suspicious activities of all types. Additionally, Barton's 14 physical and 31 logical network segments -- called subnets -- enable the college IT staff to isolate network areas infected by malicious code. This strategy prevents viruses detected in the student dormitory subnet, for example, from spreading across the entire network. Barton's network subnet capabilities, however, require the IT team to dedicate a considerable amount of time to managing the school's security infrastructure. The IT team used Sun Microsystems' SunScreen technology, which required Barton to use vendor-specific software/hardware and did not provide the VPN flexibility required for easy remote access. Importantly, today's cyber security realities also allow the IT team to view firewall logs in real time with sophisticated querying to gain immediate insight into potential security breaches.

Mapping Security to College Requirements
Barton's IT team faced numerous options when researching new security technologies.

"We required insight from a partner that understands the unique security requirements of an academic network and would help finalize product specifications within our budget," Oelke said. "We could not afford to make the wrong investment."

Barton selected CDW-G and its engineering team as a sounding board for product selection and to recommend software licensing and technical agreements that address the college's requirements. CDW-G combined its knowledge of the needs of higher education customers and of comprehensive product line from proven vendors to support Barton's security requirements. CDW-G helped the Barton team prepare for its presentation to the college board of trustees, during which it secured approval for funding for the new security solution.

"Barton is a leader in IT security," said Julie Smith, director of higher education, CDW-G. "They understand what is required to deal with today's ever-evolving security threats in order to manage their networks and protect student and administrative data effectively."

Deploying a Powerful, Flexible Security Infrastructure
Upon receiving IT funding approval, the Barton IT team deployed an initial pilot phase of its new solutions from CheckPoint Software Technologies in the late summer of 2004.

"Deploying a security solution effectively requires a strong understanding of your network, routing and how security product settings may impact other systems or users' access to important information," Perkins said.

The new and existing security solutions ran in tandem to ensure a high level of security while the pilot program was expanded. The new CheckPoint solution went live in November 2004.

"Our experience with our new security solution has been extremely positive and CDW-G has been very responsive during the entire process," Perkins said.

The new security solution enables Barton to manage its physical and logical subnets from a single dashboard that simplifies and accelerates network traffic monitoring and management. Additionally, the new security solution is intuitive, enabling multiple Barton IT staff members to manage the college's security infrastructure concurrently. The college's previous security solution was specialized -- only one staff member was trained to manage the technology.

The new solution's enhanced VPN and log-in capabilities simplify remote network access. The new security solution also consumes less processing power than its predecessor and operates on multiple vendor operating systems and hardware platforms.

Increasing Security Vigilance
Barton has planned a phased approach to broaden its cyber security capabilities. The college is expanding its cyber security management to the application level by increasing its monitoring of security and network infrastructure logs to identify additional malicious activities such as port scans that hackers use to locate network security vulnerabilities. By monitoring malicious activity on the network, IT staff can determine the techniques used to compromise network resources. Using the built-in application intelligence in the CheckPoint software, Barton can identify and block activity at the firewall in real time. The ability to look into each data packet to determine its validity provides another layer of protection and gives BCCC's IT team fine-grained control over all server requests.

BCCC also plans to systematically expand its multilayered hardware/software firewall strategy by further segmenting IT resources based on institutional goals to protect student data.

"Cyber security is a dynamic process that requires us to protect the college continually against ever-evolving threats," Oelke said. "We are confident that our new security technologies will provide the flexibility to expand our information defenses and address tomorrow's requirements. Our strategy to combine security products, policies and vigilance is integral to maintaining a safe and engaging online environment for the Barton community."


Featured Cybersecurity


New Products

  • ALTO Neoxx Electronic Padlock

    ALTO Neoxx Electronic Padlock

    Built to withstand all access control needs, the tough new SALTO Neoxx electronic padlock takes security beyond your expectations. 3

  • FlexPower® Global™ Series (FPG) from LifeSafety Power

    FlexPower® Global™ Series (FPG) from LifeSafety Power

    The FlexPower® Global™ Series (FPG) from LifeSafety Power—designed to provide DC power for access control systems in international applications—is now PSE listed for Japan and compatible with the country’s 100VAC applications. 3

  • Unique Oversized ID Card Printer

    Unique Oversized ID Card Printer

    Idesco Corp. is announcing its card printer – the XCR100 2.0 printer- that allows customers to personalize oversized ID cards on demand. The printer is ideal for assisting healthcare organizations find the right badging solution. As healthcare facilities continue to combat the spread of COVID-19, issuing oversized ID cards has helped identify staff clearly while adding an extra layer of security. The XCR100 2.0 printer is the only dye-sublimation printer on the market that can personalize CR100 cards (3.88" x 2.63"). The cards that are 42% larger than the standard credit card size. The printer can produce up to 180 full cards per hour in color, and up to 1,400 cards per hour in monochrome. An optional flipper is available to print dual-sided badges in one pass. Contactless encoding comes as an option to help healthcare facilities produce secure access badges on demand and the card printer features a 2-year warranty. 3