Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Universities Get Schooled by Hackers

Colleges and universities are prime targets for criminals due to huge sets of personal information and security that is weaker than in many businesses.

As university students leave campus for holiday breaks, they may carry more than new knowledge home to family and friends. Recent research points out that colleges and universities are coming under more aggressive security attacks while their defenses struggle to keep up with growing demand.

In "Defending Networks at Higher Learning Institutions — Heroes Needed," a report issued earlier this fall, researchers at InfoBlox pointed out that the complexity of the university network environment makes effective defense difficult. "Years ago we planned 'one jack per pillow,' and that's changed in such a short period of time," says Victor Danevich, Infoblox CTO. He believes that each student on campus represents approximately seven IP addresses, making most state and many private universities the home of hundreds of thousands of connected devices.

And while the complexity and levels of attacks are growing, the issues in higher education cybersecurity aren't new. A report released by EdGuards, "A Brief History of Higher Education Insecurity," walks readers through attacks from 2002 through 2018 to show how hackers have evolved. One of the growing issues is the size of the databases sought and compromised by criminals, with tens to hundreds of thousands of records exfiltrated in attacks on scores of schools.

That evolution is aided by legitimate university network users. More than half of the administrators surveyed by InfoBlox say that 25% of students arrive on campus with their devices carrying malware. "The 25% infected rate shows the devices that students are bringing from home," Danevich says. "It's not laptops. It's IoT devices [and] mobile devices." For university security teams, the implication is simple. "You can't take a look at the security once a year. You have to be much more current because it changes so fast," he explains.

While students are a common infection vector, they are not the ultimate target. "Business applications, such as HR, Financial and Campus Solutions by PeopleSoft or other vendors, are the main target, as they store the most critical data and are vulnerable to both hackers and malicious insiders," the EdGuards paper states. 

University security teams hamstring themselves when they see security as a traditional perimeter game because new devices and techniques simply bypass classic perimeter defenses, Danevich says. He recommends defense at the network perimeter, in-network control, and thorough, constant monitoring with automated assistance.

"You can put up a blacklist, but now it has to be taken a step farther with a collection of information that's come from a variety of devices hooked to a SEIM and passed to a Splunk or ArcSight," he says. Ultimately, he explains, "We need to use more machine learning and be smarter with what we do."

Related Content:

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
ChristopherJames
50%
50%
ChristopherJames,
User Rank: Strategist
1/6/2019 | 8:51:08 PM
Expensive Upgrades
I think the problem here is that universities don't have the money to keep upgrading their systems. I don't think it's because they don't want to keep their facilities protected, but the price that's involved in maintaining the network is very high! Unless they can source the protection to some computing studies students....
Joseph Castro
50%
50%
Joseph Castro,
User Rank: Apprentice
1/6/2019 | 11:19:48 PM
Overall Changes
By now, every school system should not be running on old technology. As stated, level of attacks is growing. They're becoming more sophisticated, and schools need to be on top of it. This also requires a good security team with skills to support them. Too many don't pay attention, get comfortable or aren't following basic procedures. Of course, you can't be 100% secured, but if higher education security is still a problem, something is wrong here. Budget shouldn't be the reason either. Colleges and Universities make so much money! If so, this leads to even more than just a security problem. As for students, they should have security awareness training while their attending college. It should be part of their curriculum and required to pass it. In my experience, I deal with users without any decent knowledge. For example, passwords are still weak, mind sets are still on "I will never get hacked" mode, and so many more! The lack of awareness and training carries over. Again, there needs to be change and those with higher voices can make this happen.
ThomasMaloney
50%
50%
ThomasMaloney,
User Rank: Apprentice
1/14/2019 | 2:11:45 AM
Lax in security
It is not really that shocking to know that educational institutions have a higher tendency to be lax in their security measures as compared to organisations from various other fields. This is because of the nature of their operations which is considered to be less risky in comparison against other sectors like finance. This makes them even more vulnerable to attacks which usually come unexpectedly.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/27/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11059
PUBLISHED: 2020-05-27
In AEgir greater than or equal to 21.7.0 and less than 21.10.1, aegir publish and aegir build may leak secrets from environment variables in the browser bundle published to npm. This has been fixed in 21.10.1.
CVE-2020-10936
PUBLISHED: 2020-05-27
Sympa before 6.2.56 allows privilege escalation.
CVE-2020-6774
PUBLISHED: 2020-05-27
Improper Access Control in the Kiosk Mode functionality of Bosch Recording Station allows a local unauthenticated attacker to escape from the Kiosk Mode and access the underlying operating system.
CVE-2020-13633
PUBLISHED: 2020-05-27
Fork before 5.8.3 allows XSS via navigation_title or title.
CVE-2020-10945
PUBLISHED: 2020-05-27
Centreon before 19.10.7 exposes Session IDs in server responses.