Data Breaches & Identity Theft: Is Your Online Classroom Secure?

Thousands of online college students in Utah recently logged in to see more than their classes. Due to a programming error, they had full access to grades from every member of their classes and could even edit and input grades for any of their peers. For two hours, only 78 students out of over 5,000 active users made changes.

As an online learner, you have easy access to your grades, information, and course materials. But, you may also be at risk for security breaches.

The national Family Educational Rights and Privacy Act (FERPA) makes it illegal for colleges to share information about your grades and enrollment with others. But, external learning management systems and the need for technical support puts a lot more eyes on your information and make it easier for security breaches to occur.
You can’t be immune to all security issues, but you can understand the risks and take steps to protect yourself as an online learner. Take a look at the three major security issues online college students face and find out what you can do to protect yourself.

Problem: Bugs in the Learning Management System

A software glitch (like the one previously discussed) can open up access to the wrong people. Most colleges contract with a third-party software service to provide the learning management system that handles online courses. Although major issues are rare, they do happen. Be aware that software the problem may make your enrollment, grades, and submitted assignments accessible to other teachers, peers, or outside users.

What You Can Do: Inform Your IT Department and Sit Tight

There’s no way to anticipate or protect your data from software problems. But, you can know what actions to take. Make sure that you give your college’s IT department a call and let them know what you are seeing. Don’t mess around with the system or experiment with changing grades. Remember, almost all systems are tracking user changes in real-time. When this happened in the past, students were called in to explain why they made changes. After the issue is resolved, you may want to change your login password.

Problem: Virus-Ridden File Transfers

When you upload or download a file within your online class, there’s a chance that you may be giving or receiving a virus. Downloading files for peer review or collaborative work can be risky because the same virus can spread throughout an entire online section.

What You Can Do: Download a Solid Security Program. Now.

This is a problem that you can (and should) address today. If you don’t already have an anti-virus program, download one now. Programs like McAffee can find and isolate viruses before they affect your computer. Make sure that you set up the program to run consistently or run manual checks yourself regularly. Remember, antivirus programs are like a vaccine and don’t work as well once your computer is already affected. Don’t wait until you have a problem downloading the necessary software.

Problem: Unclear Understanding of Internal and External Websites

While learning management programs tend to be private, an increasing number of professors are sending students to complete work on external websites. If you are assigned to create a blog, post to a Flickr account, or upload files to Pinterest, keep in mind that this work is likely public and accessible through search engines.

What You Can Do: Be Aware of Your Online Persona

The best thing that you can do is just be aware of the information you are making available to the public. Keep in mind that if your name (or your email address or any identifying information) is attached to a publicly-available website, people will likely be able to find it when they search for your name. In some cases, you may want to change the way you approach an assignment knowing that future employers, family members, and friends will be able to see it.

Don’t rely on the idea that you can just remove an assignment from the web after the class ends - even if you do, several sites such as the Way Back Machine store archived versions of webpages for an indefinite period.

Diane Wong writes on technology and marketing issues at essaywritercheap.org 

You Might Also Read:

Schoolchildren Are Better At Cyber Security Than Their Teachers:

 

« Human Brain Changes With Digital Technology & Implants
Ransomware & Cybercrime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Delphix

Delphix

Delphix is the industry leader for DevOps test data management.

National Agency for the Security of Information Systems (ANSSI) - France

National Agency for the Security of Information Systems (ANSSI) - France

The role of Agence Nationale de la Sécurité des Systèmes d'Information (ANSSI) is to foster a coordinated, ambitious, pro-active response to cybersecurity issues in France.

InfoSec World

InfoSec World

InfoSec World conference and expo covers all aspects of information security with a broad agenda of sessions on key security issues.

Paladion

Paladion

Paladion is a provider of managed IT security services.

Gulf Computer Services Co (GCSC)

Gulf Computer Services Co (GCSC)

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

Salt Security

Salt Security

Salt Security protects the APIs that are the core of every SaaS, web, mobile, microservices and IoT application.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

BoldCloud

BoldCloud

BoldCloud's award winning Cybersecurity Advisory services and Layered Security approach adds new critical layers of protection for your data and your business.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

Antigen Security

Antigen Security

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats.

Cyera

Cyera

Cyera is the data security company that gives businesses context and control over their most valuable asset: data.

CAT Labs

CAT Labs

CAT Labs is building digital asset recovery and cybersecurity tools to enable governments to fight crypto crime and to protect investors from hacks, fraud and scams.

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

AI Safety Institute (AISI)

AI Safety Institute (AISI)

The AI Safety Institute’s mission is to minimise surprise to the UK and humanity from rapid and unexpected advances in AI.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.