NASIG 2023 - Open the gate: Ensuring easy authentication while mitigating cybersecurity risks

MatthewRagucci 22 views 26 slides Oct 12, 2024
Slide 1
Slide 1 of 26
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26

About This Presentation

The pandemic has changed almost all aspects of our professional lives. Before shuttering their doors, libraries quickly mobilized to meet the anticipated demand of content usage happening from outside the building. The ability to work remotely has been a blessing in some ways, however, library users...


Slide Content

Tuesday, May 22, 2023 2:45 PM CST Open the Gate: Ensuring easy authentication while mitigating cybersecurity risks John Felts Head of Information Technology and Collections, Coastal Carolina University David W. Green Library Systems Analyst, State Library of Ohio Matthew Ragucci Associate Director of B2B Product Marketing, Wiley   https://unsplash.com/photos/jp8kEXKBVzU

Many thanks to our sponsors for making the NASIG 38th Annual Conference possible!

Session Speakers David W. Green Library Systems Analyst, State Library of Ohio John Felts Head of Information Technology and Collections, Coastal Carolina University Matthew Ragucci Associate Director of B2B Product Marketing, Wiley  

Introductions (Matthew) John’s section – Lib perspective and authentication overview David’s Section – Lib perspective and action Matthew’s Section – Pub perspective and SNSI information Questions Agenda

Session Abstract: The pandemic has changed almost all aspects of our professional lives. Before shuttering their doors, libraries quickly mobilized to meet the anticipated demand of content usage happening from outside the building. The ability to work remotely has been a blessing in some ways, however, library users still face challenges. Many content providers, in response to these challenges, unlocked swathes of content to prevent barriers for remote users. Upscaling remote authentication has always been a challenge. To compound matters, cybercrime risks loom large threatening campus security, specifically targeting users who are accessing resources remotely. This has uncovered skills gaps for both libraries and users, requiring libraries to examine their authentication methods. Thankfully, there are easy ways to ensure institutional security, while also reducing barriers to paywalled content for users. Hearing from both the library and publisher perspectives, you will learn more about remote authentication challenges, library cybersecurity risks, and some solutions for protecting institutions, while still providing seamless access. Learning Outcomes Attendees will understand the different means of remote authentication available for their users. Attendees will also learn the cybersecurity risks that come with unethical resource sharing. Attendees will walk away with a best practices resource for augmenting cybersecurity practices in the library. Session Abstract & Outcomes

Finding a Balance LIBRARY USERS NEED ACCESS TO RESEARCH! BUT THE SECURITY RISKS ! https://imgflip.com/memetemplate/274348045/Open-the-Gate IS THERE A WAY TO HAVE SECURITY AND ACCESS? OPENING THE GATE! CLOSING THE GATE! OPENING THE GATE… A LITTLE!

Population - Higher Education has a huge base of users, more opportunity for phishing emails Data - Higher Ed institutions hold a huge amount of data on both current and past students, faculty, and vendors. Getting in equals a gold mine. Espionage - The research conducted at Higher Ed Institutions is immensely valuable especially medical and engineering research. Easy targets - Crippling a college or university with hundreds if not thousands of users pressures the institutions into fast, expensive solutions. It’s estimated that 75% of Higher Ed cyber attacks succeed.² Known Higher Ed Cyber attacks⁴: University of California, San Francisco Medical School - paid $1.14million³ University of Colorado Medical Center⁴ University of Miami⁴ University of Michigan, Medical School⁴ University of Utah³ University of Washington, Medical School⁴ ¹ Bresnick, Peggy. ”4 Reasons Cyber Criminals Are Targeting Higher Education” Fierce Education . March 8, 2021. https://www.fierceeducation.com/best-practices/4-reasons-cyber-criminals-are-targeting-higher-education-part-1 ² ³ D’Agostino, Susan.”Ransomware Attacks Against Higher Education” Inside Higher Ed. July 22, 2022. https://www.insidehighered.com/news/2022/07/22/ransomware-attacks-against-higher-ed-increase . ⁴ U.S. Department of Health and Human Services Office for Civil rights. “Cases Currently Under Investigation” Continuous update. Accessed on February 21, 2023 Cybercrime Why hackers target colleges and universities?¹

Did you know?

Catalysts for our conversation

John Felts Library perspective Head of Information Technology and Collections

Why Library Cybersecurity Matters Remote access to services Library technical infrastructure Information assets Privacy *Don Hamparian, Senior Product Manager, OCLC *https://pixabay.com/

Libraries as Security Advocates Libraries have the Relationships to Protect: Patron privacy Institution assets and reputation Publisher assets *https://www.freepik.com/free-photo/woman-working-computer-network-graphic-overlay_17433985.htm

What can stolen credentials access? Personally Identifiable Information Email accounts Financial information Address Phone number Institutional Assets Research Budgets Licensed content *https://www.freepik.com/premium-photo/e-learning-concept-person-is-using-laptop-computer-learn_22783490.htm

Security Concerns w. IP Authentication IP Authentication is less secure than federated authentication We provide no infrastructure for personalization services Security vulnerabilities with URL rewriting One compromised user = blocked access for institution *https://pixabay.com/vectors/attack-unsecured-laptop-hacker-7647136/

Benefits of Federated Access SAML-based: highly secure, stable, open source Federated metadata, easier maintenance Support for multiple user affiliations Improve response to security incidents Authentication at the point of need

David W. Green Library perspective Library Systems Analyst

Shared Responsibility Collaboration is Key Not an IT problem Attacks not unique to IT …or to Fortune 500 companies We’re vulnerable Worst thing to do is do nothing

Engagement Connections Seek conference and workshop opportunities EDUCAUSE SNSI Upcoming Events What we’re doing OPLIN, SEO, OhioLINK Online webinars Cybersecurity Conference

Awareness Campaign for Information Security Consider patrons, faculty, yourself Connect with IT for potential collaboration What we’re doing Open Office Hours Cybersecurity Awareness Month Weekly Cyber Security Briefs CISA

Mature Security Practices Authentication Modern authentication SAML / OpenID Connect What we’re doing EZproxy OHID (State of Ohio’s SSO) Moving away from barcodes (TODO)

Mature Security Practices Passwords Password managers Complex Unique What we’re doing No more Post-It Notes! Password Manager for all staff Multi-Factor Authentication app

Mature Security Practices

Mature Security Practices Other things Security Hygiene SSL everywhere Backup (and restore!) Electronic resources PaaS/SaaS What we’re doing Let’s Encrypt haveibeenpwned “Tested” our backup… Static websites

Have a Plan Incident Response … Cyber Attack … Business Continuity … Cybersecurity … Communications …

Matthew Ragucci Associate Director, B2B Product Marketing Publisher Perspectives on Cybersecurity

Content Protection & Privacy Security is a multi-stakeholder concern Striking a balance We can have both privacy and protection Abuse monitoring systems Robust and effective Protects content and institutions Obligations to protect user and institutional data Regulation compliance https://unsplash.com/photos/7Qe9xOLMw3Q