Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Hacking Higher Education
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 4 / 11   >   >>
tdsan
50%
50%
tdsan,
User Rank: Ninja
7/19/2019 | 5:47:49 PM
Identified the problem, now what is the fix
I do agree with the most recent commenter, thank you for sharing. But now that we understand the problem, how do we resolve the issue so it does not happen again.
  • Do we purchase cameras so we see who is going in and out of the various buildings
  • Do we purchase software to help us detect devices on the network that are out of the norm
  • Do we perform audits of the network and inventory the environment so issues are caught ahead of time (is there a program in place that does it every 6 months)
  • Is there an educational program to train the students and teachers about the use of the network and approved usage

However, removing the students is somewhat harsh, I do think this is a real-world attack and their exploit can be used by the other departments, don't kill their dreams, but have them work with the Cybersecurity teams to demonstrate real-world examples. Punish them but have them teach how a hacker thinks, there is a psychological evaluation that could help the students find ways to address real-world attacks (this is a perfect example). Put them on probabation but send them to the psychological evaluation unit where they can be evaluated and studied. This helps everyone understand how the mind works so you can combat the problem, if you have never been a hacker, then how do you know what to look for in order to defend against a potential theat (there was a movie called "To understand the mind of a killer" or "How to get away with murder", well why not do the samething but do it in a classroom setting.

Just a thought.

Todd
hazrataliquotes
50%
50%
hazrataliquotes,
User Rank: Apprentice
7/19/2019 | 4:05:12 AM
Re: great post
such a great and helpful post keep this type of post sharing because sharing is caring god will help those who help others
blingbling88
50%
50%
blingbling88,
User Rank: Apprentice
7/16/2019 | 12:07:48 AM
Re: Apple support number
Excellent blog right here! I really enjoyed your article! thank you very much! io games
rapide
50%
50%
rapide,
User Rank: Apprentice
6/22/2019 | 4:24:18 PM
Good Article
Very good article. In France, I'm not sure that universities are really protected against cyber attacks
donaldh890
50%
50%
donaldh890,
User Rank: Apprentice
6/20/2019 | 2:53:41 AM
Re: Hacking Higher Education
I'm extremely pleased to uncover this website. I need to thank you one time, just for this wonderful read

lucywillor
50%
50%
lucywillor,
User Rank: Apprentice
6/17/2019 | 6:24:24 AM
Assignmnet help
Hi!

Thanks for sharing this! Its really very nice and thoughtful information.
spycamera
50%
50%
spycamera,
User Rank: Apprentice
6/15/2019 | 6:37:28 AM
bestspycamera.net
Found your post interesting to read. I can't wait to see your post soon. Good Luck for the upcoming update. This article is really very interesting and effective. 
JayceJohnson
50%
50%
JayceJohnson,
User Rank: Guru
6/6/2019 | 6:09:12 AM
Re: Hacking Higher Education
Law assignment help is a well-liked assignment in Singapore. Top universities of Singapore's first priority is to give assignment on college assignment help. Acquire immediate law assignment help before completion of time at a fair cost. Increase your grades in college and get A+ rank in academics with high-quality assignment help from our expert's writers.
needassignmentshelp
0%
100%
needassignmentshelp,
User Rank: Guru
5/20/2019 | 5:55:26 AM
Re: Assignment Help Sydney
Thank you for posting such a great article! Are you struggling with your management assignments? Annex our professional assistance and yield better grades in your assignments. You can easily access our online management assignment help anytime.

Human Resource Management Assignment Help, Operations Management Assignment Help, Project Management Assignment Help
maryrobinsonusa
50%
50%
maryrobinsonusa,
User Rank: Apprentice
5/14/2019 | 6:38:51 AM
Re: Coding Assignment
thank you so much for the info
<<   <   Page 4 / 11   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Malware Attacks Declined But Became More Evasive in Q2
Jai Vijayan, Contributing Writer,  9/24/2020
Safeguarding Schools Against RDP-Based Ransomware
James Lui, Ericom Group CTO, Americas,  9/28/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24565
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25770
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25771
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25772
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25773
PUBLISHED: 2020-09-29
A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to execute arbitrary code on affected products. User interaction is required to exploit this vulnerability in that the target must import a corrupted configuration file.