{"title":"学术机构的资讯安全","authors":"Steffani A. Burd, Scott Cherkin, J. Concannon","doi":"10.1300/J460v01n02_05","DOIUrl":null,"url":null,"abstract":"Abstract Academic institutions face unique information security threats as well as increasingly frequent and severe incidents, yet they have invested relatively few resources to define and address these issues. Incidents such as information theft, data tampering, viruses, worms, and terrorist activity constitute significant threats to the security of academic institutions. Adverse impacts on academic institutions and the general public include compromised private data, potential attacks on U.S. critical infrastructure, and substantial financial losses. Strategies to remediate these issues must be identified, developed and implemented to curb the trend of increasingly frequent and severe information security incidents as well as the damage they incur. The purpose of this article is to define these emerging information security issues and to propose strategies to remediate them. First, empirically based knowledge of information security in academic institutions must be developed and shared, including quantification of issues, use of appropriate metrics, and identification of best and worst practices. Second, policies for information security must be developed, promulgated and implemented. These policies must balance learning, experimentation, and openness with adequate security measures. Third, the current narrow and fragmented approach to information security practices must be expanded to a holistic, integrated view and the current reactive stance must be changed to a proactive, prescriptive orientation toward information security. Directions for future research, suggestions for policy and practice, and recommendations for information sharing between universities, research institutions, government and law enforcement are provided.","PeriodicalId":345897,"journal":{"name":"Journal of Security Education","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Information Security in Academic Institutions\",\"authors\":\"Steffani A. Burd, Scott Cherkin, J. Concannon\",\"doi\":\"10.1300/J460v01n02_05\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract Academic institutions face unique information security threats as well as increasingly frequent and severe incidents, yet they have invested relatively few resources to define and address these issues. Incidents such as information theft, data tampering, viruses, worms, and terrorist activity constitute significant threats to the security of academic institutions. Adverse impacts on academic institutions and the general public include compromised private data, potential attacks on U.S. critical infrastructure, and substantial financial losses. Strategies to remediate these issues must be identified, developed and implemented to curb the trend of increasingly frequent and severe information security incidents as well as the damage they incur. The purpose of this article is to define these emerging information security issues and to propose strategies to remediate them. First, empirically based knowledge of information security in academic institutions must be developed and shared, including quantification of issues, use of appropriate metrics, and identification of best and worst practices. Second, policies for information security must be developed, promulgated and implemented. These policies must balance learning, experimentation, and openness with adequate security measures. Third, the current narrow and fragmented approach to information security practices must be expanded to a holistic, integrated view and the current reactive stance must be changed to a proactive, prescriptive orientation toward information security. Directions for future research, suggestions for policy and practice, and recommendations for information sharing between universities, research institutions, government and law enforcement are provided.\",\"PeriodicalId\":345897,\"journal\":{\"name\":\"Journal of Security Education\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-03-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Security Education\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1300/J460v01n02_05\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Security Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1300/J460v01n02_05","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Abstract Academic institutions face unique information security threats as well as increasingly frequent and severe incidents, yet they have invested relatively few resources to define and address these issues. Incidents such as information theft, data tampering, viruses, worms, and terrorist activity constitute significant threats to the security of academic institutions. Adverse impacts on academic institutions and the general public include compromised private data, potential attacks on U.S. critical infrastructure, and substantial financial losses. Strategies to remediate these issues must be identified, developed and implemented to curb the trend of increasingly frequent and severe information security incidents as well as the damage they incur. The purpose of this article is to define these emerging information security issues and to propose strategies to remediate them. First, empirically based knowledge of information security in academic institutions must be developed and shared, including quantification of issues, use of appropriate metrics, and identification of best and worst practices. Second, policies for information security must be developed, promulgated and implemented. These policies must balance learning, experimentation, and openness with adequate security measures. Third, the current narrow and fragmented approach to information security practices must be expanded to a holistic, integrated view and the current reactive stance must be changed to a proactive, prescriptive orientation toward information security. Directions for future research, suggestions for policy and practice, and recommendations for information sharing between universities, research institutions, government and law enforcement are provided.