Application Security //

Database Security

4/24/2013
01:10 PM
Connect Directly
LinkedIn
Google+
Twitter
RSS
E-Mail
50%
50%

Hacking Higher Education

The cybersecurity challenge on college campuses lies as much with the students as with malicious outsiders.

InformationWeek Green -  Mar. 4, 2013 InformationWeek Green
Download the entire May 2013 issue of InformationWeek Education, distributed in an all-digital format (registration required).


Hacking Higher Education When a faculty member at Miami University in Oxford, Ohio, logged in to the university's grade book last fall, she realized something was wrong: The grades in the online system didn't match her paper records. She was alert enough to see this was no mere glitch.

In March, after months of investigation, police charged two students with hacking the system to inflate grades. Police maintain that Beckley Parker, 21, of Weston, Conn., had changed his own grades for 17 classes since the spring of 2011, and also changed grades for 50 other students, according to the Dayton Daily News. David Callahan, 22, of Cambridge, Mass., reportedly changed his own grade once and two other students' grades. Although the facts are subject to interpretation, it seems the two were either trying to help fraternity brothers or other friends at the same time they were improving their own grades, or they may have been trying to cover their tracks by changing more than one grade in each case.

All it took for them to make the changes was an inexpensive keylogger device, inserted between the keyboard and the computer it was attached to, which allowed them to record the actions of teachers entering their passwords for the grading system. They were then able to access the system at will.

After cooperating with investigators, the students avoided being charged with a felony, instead accepting dismissal from the university and pleading guilty to multiple counts of "attempted unauthorized use of property," a misdemeanor.

Miami University's information security officer, Joe Bazeley, says an attack on the university's learning and grading systems is actually worse than the sort of attacks, namely information theft and exposure, that used to keep him up at night before the keylogger incident. "We produce knowledge and identify that via grades and a diploma," Bazeley says. The grade book hack "challenges the integrity of those grades and diplomas," he says.

Learn From The Hacks

Report Cover
Schools Do More With Less

Technology advances are providing new tools for learning. The challenge is how to take advantage of the opportunities when resources are stretched thin. Our report is free with registration.
Get This And All Our Reports

Unfortunately, examples abound in higher education of the other kind of security breach.

An undergraduate at the University of Nebraska last year was able to break into a database associated with the university's PeopleSoft system, exposing Social Security numbers and other sensitive information on about 654,000 students, alumni and employees. According to our sister website Dark Reading, the university was lucky enough to detect the breach and shut it down quickly. An IT staffer picked up on an error message that seemed like evidence of something amiss, and a recently installed security information and event management system helped network managers sort through system logs and collect enough evidence to allow police to get a warrant to confiscate the computer of the student believed to have been behind the attack.

In March, Salem State University in Massachusetts alerted 25,000 current and former students and staff that their Social Security numbers may have been compromised in a database breach. If the pattern of the last few years repeats itself, expect higher education institutions to experience another half dozen major security breaches by the end of 2013.

To read the rest of the article,
download the May 2013 issue of InformationWeek Education.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 6   >   >>
linkbuild
50%
50%
linkbuild,
User Rank: Apprentice
7/10/2018 | 2:31:31 PM
do my assignment
thanks for sharing valuable information. epass online
aashimahotkhan
50%
50%
aashimahotkhan,
User Rank: Apprentice
7/4/2018 | 2:27:31 AM
Re: Hacking Higher Education
Great article and learning for me! I found a considerable measure of data here!  This article is great for all novice here. Much thanks to you for sharing
williamlucas
50%
50%
williamlucas,
User Rank: Apprentice
6/13/2018 | 7:51:53 AM
re: Hacking Higher Education
Thanks for sharing an informative post and detailed explanation for the same.

 
petersmith43
100%
0%
petersmith43,
User Rank: Apprentice
5/19/2018 | 3:54:19 PM
Re:
I am totally agree with you that hacking in Higher education is affecting the study standard and universities required to take strict action against these type Hacking activities of students. 
Dissertationinci243
50%
50%
Dissertationinci243,
User Rank: Apprentice
4/6/2018 | 2:48:45 AM
joeym.silva
This is really great work. Jebel Ali Freezone UAE Company Registration Thank you for sharing such a good and useful information here in the blog for students.
JeroldWinslow
50%
50%
JeroldWinslow,
User Rank: Apprentice
3/26/2018 | 8:02:30 AM
Assignment helper Malaysia
We believe in best quality service for student which they will good thesis on any subject. We have top assignment helper Malaysia professional and expert to give the best guidance  to the student around the world.
JeroldWinslow
50%
50%
JeroldWinslow,
User Rank: Apprentice
3/20/2018 | 8:17:28 AM
Academic assignment
Students Assignment Help welcomes you to the kingdom of highest quality online assignment writing services. Students Assignment Help provides academic assignment service among the students who want to get top grades in their academic career.
JayceJohnson
50%
50%
JayceJohnson,
User Rank: Apprentice
3/19/2018 | 6:18:22 AM
Re: good Plumber Costa Mesa
Thanks for sharing knowlgable post.. I have bookmarked this website.. So keep more post for sharing.. https://www.singaporeassignmenthelp.com/reviews/
kate25
50%
50%
kate25,
User Rank: Apprentice
3/12/2018 | 11:27:10 PM
Re: good Plumber Costa Mesa
thanks for sharing all of this...
JeroldWinslow
50%
50%
JeroldWinslow,
User Rank: Apprentice
3/12/2018 | 6:00:43 AM
Annotated Bibliography Assignment
Bibliography is a tough subject it has many branches when it comes to writing assignments on bibliography every student require proper guidance and help to finish bibliography assignments if you need proper annotated bibliography assignment move to StudentsAssignmentHelp.
Page 1 / 6   >   >>
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14492
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVE-2018-3770
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
CVE-2018-3771
PUBLISHED: 2018-07-20
An XSS in statics-server <= 0.0.9 can be used via injected iframe in the filename when statics-server displays directory index in the browser.
CVE-2018-5065
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
CVE-2018-5066
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.