Information Security
Information Security
Information Security
NIST is the National Institute of Standards and Technology at the U.S. Department of Commerce. The
NIST Cybersecurity Framework helps businesses of all sizes better understand, manage, and reduce their
cybersecurity risk and protect their networks and data. The Framework is voluntary. It gives our business
an outline of best practices to help us decide where to focus our time and money for
cybersecurity protection.
It provides a set of cybersecurity best practices, organized into five core functions: Identify, Protect,
Detect, Respond, and Recover.
1. Protect: The Protect function is about implementing safeguards to ensure the delivery of critical
infrastructure services. It involves activities such as access control, data protection, and security
training.
2. Detect: This function involves the continuous monitoring and detection of cybersecurity events.
It helps organizations identify and respond to security incidents in a timely manner.
3. Respond: The Respond function outlines activities that should be taken when a cybersecurity
incident is detected. This includes response planning, communication, and mitigation of the
impact.
4. Recover: The Recover function addresses the restoration of capabilities and services after a
cybersecurity incident. It includes recovery planning, improvements, and communication.
Governance:
1. Unknown dedicated cybersecurity body: While a dedicated department for information security
is likely, its structure, size, and responsibilities are unclear from public information.
2. Potential involvement of IT department: The Information Technology department may play a
significant role in implementing and managing security controls.
3. Leadership by Vice Chancellor and Deans: Overall responsibility for cybersecurity likely rests
with the Vice Chancellor and Deans of each faculty, ensuring alignment with university goals and
risk appetite.
Personnel:
1. Dedicated cybersecurity staff: The presence of a dedicated BS program in Information Security
suggests the university employs staff with expertise in this field.
2. Potential IT staff involvement: IT staff may also be involved in security operations, depending on
the division of responsibilities.
3. Security awareness and training: The degree of security awareness and training among faculty,
staff, and students is unknown but should be assessed as part of a NIST CSF analysis.
Technology:
1. Critical infrastructure:
Website, online platforms, research databases, student/faculty information systems, email, and network
infrastructure are likely critical assets.
The specific technologies used and their security configurations are unknown.
2. Security controls:
Data:
1.Sensitive data:
Student records, financial information, research data, intellectual property, and personal information of
faculty and staff are likely stored and processed.
External relationships:
The university likely relies on external providers for various services, such as cloud computing, software,
and IT support.
The extent of cybersecurity risk assessments and management for these relationships is unknown.
High-Impact Risks:
Likelihood: Medium-High (due to lack of known controls and sensitive nature of data)
Medium-Impact Risks:
Low-Impact Risks:
1.Identify:
Asset Inventory:
o Conduct a comprehensive inventory of all critical IT assets, including:
Networks, systems, devices, software, and data
Prioritize sensitive data: student records, research data, financial
information, and intellectual property
o Classify assets based on sensitivity and criticality to prioritize protection
efforts.
Risk Assessment:
2.Protect:
Access Controls:
3.Detect:
Security Monitoring:
4.Respond:
5.Recover:
Implementation plan
This plan outlines a phased approach for aligning MUST's information security posture
with the NIST Cybersecurity Framework (CSF) across the five functions: Identify,
Protect, Detect, Respond, and Recover.
1.1 Governance:
o Legal: Collaborate with legal experts and industry partners to stay updated
on evolving data privacy regulations and best practices for ethical
compliance.
o Ethical: Share cyberthreat information and best practices through ethical
collaboration channels, protecting sensitive data while fostering a
collective effort against cyber threats.
By integrating these legal and ethical measures throughout the implementation plan,
MUST can establish a comprehensive information security framework that safeguards
its data, complies with regulations, and upholds its ethical obligations for responsible
research, data handling, and digital citizenship within the university community.