Universities That Teach Cyber Security At Risk

The cyber security field is a dynamic, challenging and growing fast. Cyber is a field that needs new people to join the fight.  Earning a bachelor’s degree in cybersecurity has definite advantages although many cybersecurity positions require knowledge beyond  computers.

Top job candidate should know something about business, law, criminal justice, risk, statistics, political science and other disciplines. Learning a foreign language can help get a job in cyber intelligence, which is work that examines foreign threat actors. 

But one big problem is that universities are experiencing is cyberattacks targeted against them.

The University of Kentucky has fought off a month-long cyber-attack that impacted the universities healthcare and caused a system-wide slowdown.According to officials, the disruption was caused by crypto-currency mining malware installed by threat actors on the network in February. The malware caused daily interruptions to everyday functions and triggered temporary failures of th universities computer system.

Currently half of all universities in the UK say they are experiencing cyber-attacks on a weekly basis, and a majority believes that their security research has already been compromised as a result.

Universities that want to nurture and safeguard their cyber security research efforts need to keep two things in mind:

  • Firstly, they need to create a suitable environment for that research to take place in.
  • Secondly, they need to adequately protect both the research itself and the wider organisation from cyber security threats.

Cyber security research is fundamentally important if you want to understand the range of potential threats, then get a well-paid job and learn how you can best protect ourselves against them. But putting that protection in place starts at home for universities that want to discover the next cyber security research breakthrough.

Creating virtual safety mechanisms in the form of professional network segmentation and visibility solutions should be a key priority for any university that is serious about investing in its cyber security research capabilities.

Analysts at the University of Texas have found a way to bamboozle malicious hackers into giving away their secrets. The Deep-Dig method tricks hackers onto a decoy site set up to record whatever sneaky tactics are thrown at it. This information is then fed into a computer, where it is analysed to produce clues on how to identify and fend off future hacking attacks.

In response to the growing need for professionals skilled in the protection of digital information, the University of Alabama is about to set up a degree in cyber security. The University’s board of trustees recently approved the Bachelor of Science degree, which will be offered this Autumn. The degree will be housed in the department of computer science which is part of the College of Engineering.

A quality University/College program will offer students the advantage of taking courses not just in cybersecurity, but also in other topics, including writing courses. Taking courses outside of the college major also helps to build a well-rounded graduate with a strong foundation across multiple disciplines.

FE News:     InfoSecurity Magazine:       InfoSecurity Magazine:    Alabama News:      Greenville Business:   Image: Pexels

You Might Also Read: 

Lancaster University Hit By Data Thieves

 

« Artificial Intelligence, Automation, Training & Jobs
Stay Cyber-Secure Working From Home »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

TechRepublic

TechRepublic

TechRepublic is an online resource for enterprise technology analysis and advice from IT industry experts, covering topics ranging from cybersecurity and the cloud to AI and innovation.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

KnectIQ

KnectIQ

Building Trust Environments in a Zero-Trust World. KnectIQ offers KIQAssure, an Ultra High Security Solution for Data in Flight.