US Colleges Open Networks in a Cyberwar

hqdefault.jpg

A cyberattack that crippled Rutgers University recently was part of a string of attacks that attempt to exploit weaknesses that are unique to the way US colleges operate.
The attack, which was the third at Rutgers since November, came as institutions of higher education try to make it as easy to use a computer at school as at home, allowing students to do everything from downloading a song to accessing information from around the globe, all while keeping vast computer networks operating.
“It’s not to say we don’t also protect,” said Neal Sturm, chief information officer at Farleigh Dickinson University, which also was hit by a cyberattack last month. “But a university has students and has faculty, and it becomes much more challenging for universities to completely lock the door from a security perspective because universities are supposed to be open by their very nature.”
In the attempt to infiltrate colleges and universities, cyber criminals are using smarter, more sophisticated methods than ever. They set out to steal financial information, make a splash or a statement or carry out a vendetta against a school. School employees update programs and block suspicious users daily while they plead with staff and students not to open those links that pretend to be from a bank or a friend.
At Rutgers the Internet service was crippled just nine days before finals were to begin. Students couldn’t finish papers, take online classes or register for courses. The university has made no public statements on the attack except to tell students two to three times a day that they were working on the problem.
It has gotten easier and cheaper to launch a denial of service attack, and infected computers can be rented for that purpose, experts say. It’s hard to prevent them and even large companies, like Sony and Microsoft, have been victims.
In a spate of attacks last year at schools, including Indiana University and the University of Maryland, student and staff data were exposed. The hackers gained access to the names, addresses and Social Security numbers of thousands of current and former students.
The FBI has also warned that foreign interests are trying to steal research from universities for political and economic gain.
Certainly, Rutgers’ reputation has taken a hit, with its problems being aired in the media as high school seniors are deciding which colleges to attend.
Students have vented in hundreds of online comments. They complained that they couldn’t get their work done and that they needed to use their own phones at their own expense for Internet service. A few said on Twitter that they felt like switching schools.
Crime rings and hackers are going after universities because they view them as easy targets, security experts say. Colleges and universities want to promote learning and want students living on campus to feel like they’re home. At the same time, they store a wealth of information, like credit card and Social Security numbers and faculty research papers.
In response to the growing threat, schools have to revise their plans constantly and be prepared for a crisis as it’s not if it happens, it’s when.
Ein News:  http://bit.ly/1Fw4y8N

 

« Countering Cyber Criminals with Biometrics
Nine Strange Flying Robots from the 2015 Drone Show »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

Cygilant

Cygilant

Cygilant is a SOC2 certified service provider that combines MSSP and Incident Detection and Response (IDR) capabilities managed by global SOCs staffed with trained security engineers.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

iSolutions

iSolutions

iSolutions is an official reseller and engineering company of leading products and solutions for cybersecurity and information protection, optimization, visualization and control of applications

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Naq Cyber

Naq Cyber

Naq is the number one platform for SMEs looking to become legally compliant and protect against cybercrime and other data-related incidents.

Dazz

Dazz

Dazz is the cloud security remediation platform for smart security and development teams.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators provides services and information about financial fraud, fraud investigation and fraud prevention.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

IONIX

IONIX

IONIX is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your real attack surface and its digital supply chain.

Resemble AI

Resemble AI

Resemble AI is an innovator in Generative Voice AI technology and tools to combat AI fraud including audio watermarking and deepfake detection.