tailieunhanh - IT Security and Academic Values : Computer and Network Security in Higher Education

In themanagement of privacy, organizations focus on two types of threats: Deliberatemisuse of information or theft of information can range from incidents where employees deliberately remove proprietary information, including trade secrets, customer lists, or financial data, and provide that information to unauthorized parties. The second type of internal threat stems from ignorance or carelessness in how proprietary data and information is used. This can result in information being unnecessarily compromised, putting an organization at risk, or having a negative impact on an organization’s ability to function or compete. In addition, improper disclosure can result in civil litigation by the parties who believe their privacy rights. | Chapter 1 IT Security and Academic Values Diana Oblinger Computer and Network Security in Higher Education Mark Luker and Rodney Petersen Editors A Publication of EDUCAUSE Copyright 2003 Jossey-Bass Inc. Published by Jossey-Bass A Wiley Company. Reprinted by permission of John Wiley Sons Inc. For personal use only. Not for distribution. 1 IT Security and Academic Values Diana Oblinger The networks and computer systems of colleges and universities abound with student medical and financial records institutional intellectual property for both research and education and a host of internal and external communications in digital form that are required for normal operations each and every day. Compromised computers on campuses have been used to attack other sites in government and industry. Maintaining a proper level of security for these digital resources is now a critical requirement for the institution. Although educators may agree with the need for security differences of opinion arise when specific practices are proposed. For example technology personnel may consider the use of a firewall a necessary precaution whereas faculty might see this restriction as an impediment to intellectual freedom. Logging user access is one method of tracking intruders it also can be considered a threat to privacy. Higher education is faced with the need to apply appropriate security without compromising the fundamental principles of the academy. As a result it will be important for colleges and universities to determine which principles are most relevant and valued by its particular community. Articulation of a common set of principles may serve as a starting point for campus discussions about computer and network security. 1 2 Computer and Network Security in Higher Education Unique Culture and Environment Critical aspects of higher education preclude the wholesale adoption of business or government security procedures. The unique mission of higher education and its role in developing

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.