Data security breaches make the headlines. We’ve read about the recent incidents at Target, Neiman-Marcus, and more locally at The Sands Bethlehem. Security professionals work to protect sensitive customer and employee data from cyber-attackers, but any gaps in security leave data vulnerable to attack. In 2013 alone, *740 million data records were exposed, and a whopping 89% of those breaches/data loss incidents could have been prevented. At an average cost of almost $200 per breached record it’s easy to see why data security is a hot topic.
In Professor Thiep Pham’s Business Information Systems 333 "Enterprise Security & Risk Management" class, students took on the role of the security professional and got hands-on experience with tools used to defend sensitive data against cyber-attackers. Pham and Lehigh’s Information Security and Policy Officer Keith Hartranft guided the students in loading Kali LINUX, a suite of tools that can be used to profile and exploit information systems vulnerabilities. Both security professionals and cyber-attackers use this suite. Students explored several of the individual tools to analyze purposefully misconfigured servers to assess how data might be compromised. Students also took part in a wardrive, which is a tactic used to discover insecure wireless access points.
Pham gives students the opportunity to learn from active practitioners and see first-hand many of the tools and techniques both attackers and defenders use. This gives his business students a greater understanding of the challenges and issues of securing electronic information. Additionally, students hear from a data investigations & forensics expert as well as a risk management professional over the course of the semester.
Over *29% of all data compromises occur via social engineering, where an attacker uses psychological manipulation to get a person to perform a specific action or to divulge confidential information. In addition to many applied projects, Pham’s class viewed "Securing the Human" training videos. These videos, which are available through LTS and produced by the SANS Institute, raise user awareness of security issues, especially social engineering attacks. Each video addresses a single topic in information security and usually runs from two to five minutes in length.
You can improve security practices in your own department -- participate in security training from LTS!
For more information about LTS security, go to lehigh.edu/security.
* Report from the Online Trust Alliance (OTA)
Library & Technology Services
8A East Packer Ave,
Bethlehem, PA 18015
Lehigh University provides a leading-edge library and technology environment that enables flexibility, innovation, and effectiveness in all areas of the academic enterprise, including learning and the student experience, research, administration, community-building and outreach.
27 Memorial Drive West, Bethlehem, PA 18015