US Colleges Open Networks in a Cyberwar

hqdefault.jpg

A cyberattack that crippled Rutgers University recently was part of a string of attacks that attempt to exploit weaknesses that are unique to the way US colleges operate.
The attack, which was the third at Rutgers since November, came as institutions of higher education try to make it as easy to use a computer at school as at home, allowing students to do everything from downloading a song to accessing information from around the globe, all while keeping vast computer networks operating.
“It’s not to say we don’t also protect,” said Neal Sturm, chief information officer at Farleigh Dickinson University, which also was hit by a cyberattack last month. “But a university has students and has faculty, and it becomes much more challenging for universities to completely lock the door from a security perspective because universities are supposed to be open by their very nature.”
In the attempt to infiltrate colleges and universities, cyber criminals are using smarter, more sophisticated methods than ever. They set out to steal financial information, make a splash or a statement or carry out a vendetta against a school. School employees update programs and block suspicious users daily while they plead with staff and students not to open those links that pretend to be from a bank or a friend.
At Rutgers the Internet service was crippled just nine days before finals were to begin. Students couldn’t finish papers, take online classes or register for courses. The university has made no public statements on the attack except to tell students two to three times a day that they were working on the problem.
It has gotten easier and cheaper to launch a denial of service attack, and infected computers can be rented for that purpose, experts say. It’s hard to prevent them and even large companies, like Sony and Microsoft, have been victims.
In a spate of attacks last year at schools, including Indiana University and the University of Maryland, student and staff data were exposed. The hackers gained access to the names, addresses and Social Security numbers of thousands of current and former students.
The FBI has also warned that foreign interests are trying to steal research from universities for political and economic gain.
Certainly, Rutgers’ reputation has taken a hit, with its problems being aired in the media as high school seniors are deciding which colleges to attend.
Students have vented in hundreds of online comments. They complained that they couldn’t get their work done and that they needed to use their own phones at their own expense for Internet service. A few said on Twitter that they felt like switching schools.
Crime rings and hackers are going after universities because they view them as easy targets, security experts say. Colleges and universities want to promote learning and want students living on campus to feel like they’re home. At the same time, they store a wealth of information, like credit card and Social Security numbers and faculty research papers.
In response to the growing threat, schools have to revise their plans constantly and be prepared for a crisis as it’s not if it happens, it’s when.
Ein News:  http://bit.ly/1Fw4y8N

 

« Countering Cyber Criminals with Biometrics
Nine Strange Flying Robots from the 2015 Drone Show »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Giesecke+Devrient (G+D)

Giesecke+Devrient (G+D)

Giesecke+Devrient develop security technologies in four major areas: enabling secure payment, providing trusted connectivity, safeguarding identities and protecting digital infrastructures.

Ubiq Security

Ubiq Security

Ubiq has developed a software solution that secures any type of data, on any device, anywhere, with nearly no impact to system performance or user experience.

Dreamlab Technologies

Dreamlab Technologies

Over the last 20 years, Dreamlab Technologies has established itself as a source of constant innovation within the information security landscape.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

BOXX Insurance

BOXX Insurance

BOXX Insurance Inc. is a new type of insurance company for a new type of risk. Cyberboxx is the first fully-integrated cybersecurity and insurance solution for small-to-medium-sized businesses.

HashDit

HashDit

HashDit products and services focus on helping build a safe ecosystem for both protocol users and smart contract developers on BNB Chain.

RapidSpike

RapidSpike

RapidSpike is the only website monitoring solution that focuses all three key aspects of website health: performance, reliability AND security.

PDQ

PDQ

PDQ helps IT professionals to manage and organize hardware, software, and configuration data for Windows- and Apple-based devices.

CyberMass

CyberMass

CyberMass provides Cyber Advisory/Consulting, Professional and Managed Services offering complete cybersecurity as a service protection to businesses.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.

iConnect IT Business Solutions DMCC

iConnect IT Business Solutions DMCC

iConnect is a trusted IT Solutions and Technology Services company, proudly serving clients across the Middle East and Africa.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.