Application Security //

Database Security

4/24/2013
01:10 PM
Connect Directly
LinkedIn
Google+
Twitter
RSS
E-Mail
50%
50%

Hacking Higher Education

The cybersecurity challenge on college campuses lies as much with the students as with malicious outsiders.

InformationWeek Green -  Mar. 4, 2013 InformationWeek Green
Download the entire May 2013 issue of InformationWeek Education, distributed in an all-digital format (registration required).


Hacking Higher Education When a faculty member at Miami University in Oxford, Ohio, logged in to the university's grade book last fall, she realized something was wrong: The grades in the online system didn't match her paper records. She was alert enough to see this was no mere glitch.

In March, after months of investigation, police charged two students with hacking the system to inflate grades. Police maintain that Beckley Parker, 21, of Weston, Conn., had changed his own grades for 17 classes since the spring of 2011, and also changed grades for 50 other students, according to the Dayton Daily News. David Callahan, 22, of Cambridge, Mass., reportedly changed his own grade once and two other students' grades. Although the facts are subject to interpretation, it seems the two were either trying to help fraternity brothers or other friends at the same time they were improving their own grades, or they may have been trying to cover their tracks by changing more than one grade in each case.

All it took for them to make the changes was an inexpensive keylogger device, inserted between the keyboard and the computer it was attached to, which allowed them to record the actions of teachers entering their passwords for the grading system. They were then able to access the system at will.

After cooperating with investigators, the students avoided being charged with a felony, instead accepting dismissal from the university and pleading guilty to multiple counts of "attempted unauthorized use of property," a misdemeanor.

Miami University's information security officer, Joe Bazeley, says an attack on the university's learning and grading systems is actually worse than the sort of attacks, namely information theft and exposure, that used to keep him up at night before the keylogger incident. "We produce knowledge and identify that via grades and a diploma," Bazeley says. The grade book hack "challenges the integrity of those grades and diplomas," he says.

Learn From The Hacks

Report Cover
Schools Do More With Less

Technology advances are providing new tools for learning. The challenge is how to take advantage of the opportunities when resources are stretched thin. Our report is free with registration.
Get This And All Our Reports

Unfortunately, examples abound in higher education of the other kind of security breach.

An undergraduate at the University of Nebraska last year was able to break into a database associated with the university's PeopleSoft system, exposing Social Security numbers and other sensitive information on about 654,000 students, alumni and employees. According to our sister website Dark Reading, the university was lucky enough to detect the breach and shut it down quickly. An IT staffer picked up on an error message that seemed like evidence of something amiss, and a recently installed security information and event management system helped network managers sort through system logs and collect enough evidence to allow police to get a warrant to confiscate the computer of the student believed to have been behind the attack.

In March, Salem State University in Massachusetts alerted 25,000 current and former students and staff that their Social Security numbers may have been compromised in a database breach. If the pattern of the last few years repeats itself, expect higher education institutions to experience another half dozen major security breaches by the end of 2013.

To read the rest of the article,
download the May 2013 issue of InformationWeek Education.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 6   >   >>
Dissertationinci243
50%
50%
Dissertationinci243,
User Rank: Apprentice
4/6/2018 | 2:48:45 AM
joeym.silva
This is really great work. Jebel Ali Freezone UAE Company Registration Thank you for sharing such a good and useful information here in the blog for students.
JeroldWinslow
50%
50%
JeroldWinslow,
User Rank: Apprentice
3/26/2018 | 8:02:30 AM
Assignment helper Malaysia
We believe in best quality service for student which they will good thesis on any subject. We have top assignment helper Malaysia professional and expert to give the best guidance  to the student around the world.
JeroldWinslow
50%
50%
JeroldWinslow,
User Rank: Apprentice
3/20/2018 | 8:17:28 AM
Academic assignment
Students Assignment Help welcomes you to the kingdom of highest quality online assignment writing services. Students Assignment Help provides academic assignment service among the students who want to get top grades in their academic career.
JayceJohnson
50%
50%
JayceJohnson,
User Rank: Apprentice
3/19/2018 | 6:18:22 AM
Re: good Plumber Costa Mesa
Thanks for sharing knowlgable post.. I have bookmarked this website.. So keep more post for sharing.. https://www.singaporeassignmenthelp.com/reviews/
kate25
50%
50%
kate25,
User Rank: Apprentice
3/12/2018 | 11:27:10 PM
Re: good Plumber Costa Mesa
thanks for sharing all of this...
JeroldWinslow
50%
50%
JeroldWinslow,
User Rank: Apprentice
3/12/2018 | 6:00:43 AM
Annotated Bibliography Assignment
Bibliography is a tough subject it has many branches when it comes to writing assignments on bibliography every student require proper guidance and help to finish bibliography assignments if you need proper annotated bibliography assignment move to StudentsAssignmentHelp.
JayceJohnson
50%
50%
JayceJohnson,
User Rank: Apprentice
3/6/2018 | 6:23:35 AM
do my assignment
Thanks a lot for sharing it, that's truly has added a lot to our knowledge about this topic. Have a more successful day. do my assignment
LynnL703
50%
50%
LynnL703,
User Rank: Apprentice
2/26/2018 | 1:47:20 AM
Re: Interesting Post
 Thank you so much for sharing this article.  
kakbrus
50%
50%
kakbrus,
User Rank: Apprentice
2/22/2018 | 10:17:38 PM
Re:assignment help
Thank you for posting such a great article! I found your website perfect for my needs. It contains wonderful and helpful posts. Keep up the good work!. Thank you for this wonderful Article! five nights at freddy's
Michellejohnson1
50%
50%
Michellejohnson1,
User Rank: Apprentice
2/19/2018 | 8:42:16 AM
Re: Hacking Higher Education
Hacking Higher Education is not eassy for everyone, but I'm sure experts can do this. This is very interesting and useful inforamtion I love to dissucss with my firnds. I agree with you about the thoughts you have shared too. Darkreadings always have something to offer. 
<<   <   Page 2 / 6   >   >>
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: So now we are monitoring the monitor?
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14623
PUBLISHED: 2018-12-14
A SQL injection flaw was found in katello's errata-related API. An authenticated remote attacker can craft input data to force a malformed SQL query to the backend database, which will leak internal IDs. This is issue is related to an incomplete fix for CVE-2016-3072. Version 3.10 and older is vulne...
CVE-2018-18093
PUBLISHED: 2018-12-14
Improper file permissions in the installer for Intel VTune Amplifier 2018 Update 3 and before may allow unprivileged user to potentially gain privileged access via local access.
CVE-2018-18096
PUBLISHED: 2018-12-14
Improper memory handling in Intel QuickAssist Technology for Linux (all versions) may allow an authenticated user to potentially enable a denial of service via local access.
CVE-2018-18097
PUBLISHED: 2018-12-14
Improper directory permissions in Intel Solid State Drive Toolbox before 3.5.7 may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2018-3704
PUBLISHED: 2018-12-14
Improper directory permissions in the installer for the Intel Parallel Studio before 2019 Gold may allow authenticated users to potentially enable an escalation of privilege via local access.