校园网络安全五步走

格雷格Kovich
2023年5月19日

Zero Trust Network Access (ZTNA) cybersecurity allows academic institutions to realise important benefits across all operations.

一个在电脑上工作的人

不要相信任何人. 听起来很不吉利,对吧?? Well, unfortunately, it’s today’s reality — at least when it comes to network security. 据专家介绍, the only network cybersecurity strategy that can effectively counter today’s threats is one that trusts no user, 没有设备和应用程序, 不管他们在哪里——在校园里, 在云端或校外. It’s a strategy known as Zero Trust Network Access (ZTNA), and is based on the following assertions:

•网络充满敌意

•外部和内部威胁始终存在

•地点不足以决定信任

• Every device, user and network flow must be authenticated and authorised

• Policies must be dynamic and use as many data sources as possible

Tackling these issues requires a thorough approach to security. A Zero Trust Network Access (ZTNA) strategy provides comprehensive protective mechanisms to stop unauthorised users, 设备和应用程序访问网络. 在啤酒, we’ve identified five steps to help you develop a ZTNA cybersecurity strategy to protect your academic institution from the nefarious actors who lurk among us.

步骤1 -监控: Monitor the network to create an inventory of all devices and applications — authorised and unauthorised — that request or deliver information on the network and the protocols they use to do so. T在这里 are many tools available to collect information from the network and create a report that categorises devices by type, 制造商, 模型, 操作系统等因素. Flow monitoring tools that identify the different application traffic flows on the network are also available.

第二步-评估: 评估和验证你的库存. Start by assessing devices and applications by their type and role. This process helps identify shadow IT devices that can be eliminated to reduce the attack surface, and limit risk and mitigation measures required in response to cyberattacks.

3 .计划: Plan your approach to authentication, authorisation auditing and administration. A multidimensional plan that includes macro-segmentation and micro-segmentation is best. Macro-segmentation segregates users, devices and applications on the network. 微细分定义了这些用户如何, devices and applications are mapped to their network segment and security policies.

步骤4 -模拟: 测试并验证步骤3中开发的方法. Use the insights to fine-tune security policies and ensure they cover all scenarios. 模拟应该包括颁发证书, 配置策略, 配置隔离场景, 模拟日志流和测试防火墙集成.

第五步-执行: 经过测试和验证后,执行安全策略, unauthorised devices are blocked from accessing the network and unexpected flows are dropped. In addition, devices can be put in quarantine and IT teams alerted to the situation.

While following these five-steps map out a path for ZTNA cybersecurity, it’s not enough on its own. 培训, patch management and vigorous shadow IT management are required to ensure comprehensive security.

成功的结果

A secure network means faculty and students can take advantage of innovative digital technologies that improve learning opportunities and student success. 例如:

•教师可以开发能够激励学生的课程, expose them to cutting-edge innovations and encourage them to participate, 无论是在教室还是远程.

•学生可以尝试新技术, 与他人和来自任何地方的教师合作, and incorporate the latest digital innovations into their assignments to showcase their potential.

With a deeper understanding of the institution’s cybersecurity status, IT teams can make better decisions about new technology strategies, such as adopting a cloud-first approach or supporting BYOD. They can also better protect and control the digital infrastructure and ensure the appropriate use of valuable network resources and bandwidth.

A trusted network foundation ensures academic institutions can remain focused on teaching and learning. 要了解更多信息,请查看我们的“重新思考教育中的网络安全“资讯图或 立即Contact我们 讨论您的具体需求.

Don’t forget to check back 在这里 for my next blog focused on what you need to know, 从头到尾, 全面的网络安全战略.

格雷格Kovich

格雷格Kovich

全球销售主管,教育垂直

格雷格Kovich leads global sales for ALE’s 教育 vertical.  Greg has overseen or created several 教育解决方案s including “The Fundamentals of Communications” – a vendor neutral course on digital network communications; “安全的校园” – a solution uniting emergency alerts with first responder collaboration and mass notification; “Secure Campus” – a solution that allows instructors to limit student network access to determined sites; and “Pandemic 教育的连续性” – a solution that enables classroom instruction in the event the institution is closed due to health or environmental crisis. 

He is a 1992 graduate of Indiana University with over 20 yrs experience in Information Technology.

作者简介

最新的博客

一个人在看笔记本电脑
业务连续性

供应链弹性和业务适应性

Strategic supply chain resilience and business adaptability to thrive in the face of adversity

网- mod -压力- edu -博客- 402 x226形象.jpeg
业务连续性

以现代化校园网解决教育挑战

现代化的校园网有助于简化运营, 降低成本, 并为工作和学习提供了一个安全和关怀的地方.

网- mod -振兴- edu -博客- 402 x226形象.jpeg
业务连续性

以现代化校园网络振兴教育

一个现代, campus-wide network upgrade aligns capabilities with academic, 今天和明天的研究和业务重点. 

网- mod -学校- edu -博客- 300 x170形象.jpeg
业务连续性

教育 today: Why modernising campus networks is a must

教育al institutions worldwide must modernise their networks to meet today’s new requirements.

标签- 教育, 安全

闲谈,聊天