Application Security //

Database Security

4/24/2013
01:10 PM
Connect Directly
LinkedIn
Google+
Twitter
RSS
E-Mail
50%
50%

Hacking Higher Education

The cybersecurity challenge on college campuses lies as much with the students as with malicious outsiders.

InformationWeek Green -  Mar. 4, 2013 InformationWeek Green
Download the entire May 2013 issue of InformationWeek Education, distributed in an all-digital format (registration required).


Hacking Higher Education When a faculty member at Miami University in Oxford, Ohio, logged in to the university's grade book last fall, she realized something was wrong: The grades in the online system didn't match her paper records. She was alert enough to see this was no mere glitch.

In March, after months of investigation, police charged two students with hacking the system to inflate grades. Police maintain that Beckley Parker, 21, of Weston, Conn., had changed his own grades for 17 classes since the spring of 2011, and also changed grades for 50 other students, according to the Dayton Daily News. David Callahan, 22, of Cambridge, Mass., reportedly changed his own grade once and two other students' grades. Although the facts are subject to interpretation, it seems the two were either trying to help fraternity brothers or other friends at the same time they were improving their own grades, or they may have been trying to cover their tracks by changing more than one grade in each case.

All it took for them to make the changes was an inexpensive keylogger device, inserted between the keyboard and the computer it was attached to, which allowed them to record the actions of teachers entering their passwords for the grading system. They were then able to access the system at will.

After cooperating with investigators, the students avoided being charged with a felony, instead accepting dismissal from the university and pleading guilty to multiple counts of "attempted unauthorized use of property," a misdemeanor.

Miami University's information security officer, Joe Bazeley, says an attack on the university's learning and grading systems is actually worse than the sort of attacks, namely information theft and exposure, that used to keep him up at night before the keylogger incident. "We produce knowledge and identify that via grades and a diploma," Bazeley says. The grade book hack "challenges the integrity of those grades and diplomas," he says.

Learn From The Hacks

Report Cover
Schools Do More With Less

Technology advances are providing new tools for learning. The challenge is how to take advantage of the opportunities when resources are stretched thin. Our report is free with registration.
Get This And All Our Reports

Unfortunately, examples abound in higher education of the other kind of security breach.

An undergraduate at the University of Nebraska last year was able to break into a database associated with the university's PeopleSoft system, exposing Social Security numbers and other sensitive information on about 654,000 students, alumni and employees. According to our sister website Dark Reading, the university was lucky enough to detect the breach and shut it down quickly. An IT staffer picked up on an error message that seemed like evidence of something amiss, and a recently installed security information and event management system helped network managers sort through system logs and collect enough evidence to allow police to get a warrant to confiscate the computer of the student believed to have been behind the attack.

In March, Salem State University in Massachusetts alerted 25,000 current and former students and staff that their Social Security numbers may have been compromised in a database breach. If the pattern of the last few years repeats itself, expect higher education institutions to experience another half dozen major security breaches by the end of 2013.

To read the rest of the article,
download the May 2013 issue of InformationWeek Education.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 6   >   >>
jessicaglover012
0%
100%
jessicaglover012,
User Rank: Apprentice
11/12/2018 | 5:08:12 AM
Coding Assignment
Solving coding assignments can be really difficult at times because this subject covers many complex areas including MATLAB, visual basic, coldfusion, oracle, MYSQL, prolog, etc. We have seen that the number of students who often type "can someone do my coding assignment in U.S." is quite high. This is why we provide top-notch help with coding assignment in U.S. We aim at resolving all the coding assignment related issues of the pupils. With more than a decade's experience, we have become the most accomplished coding assignment help service provider in U.S. We are backed by highly qualified and experienced coding assignment writers from U.S. So, do not waste time further and connect with us. We will be glad to help you.
assignmenthelpusa
0%
100%
assignmenthelpusa,
User Rank: Guru
10/26/2018 | 2:53:36 AM
Assignment writing service in U.S
If you are in need for online writing assistance for an intricate thesis topic, then avail our assignment writing service in U.S. and save your time to relax and do your studies properly. Our assignment help online service in USA has earned huge popularity among both domestic and international students. There's no better place in the USA than MyAssignmenthelp. Contact us now to buy assignments online in the USA Leave your tensions to us and enjoy your free time.
Russo11
0%
100%
Russo11,
User Rank: Apprentice
10/26/2018 | 1:53:50 AM
hotmail email login
I am crazy about this blog. I have visit so many time to this blog. I was found this blog from Google. 
dannycrane
50%
50%
dannycrane,
User Rank: Apprentice
10/14/2018 | 9:03:03 AM
Great Post!
It is no doubt that cyber crimes have increased as more and more areas of our lifestyles adopt technology. I'm glad that I have the chance to read this article dealing with how hacking has eeffted higher learning. Our hope is that this deal will be dealt with sooner rather than later. You may want to click on Nursing Capstone Project | DNP Capstone Projects for professional assistance with writing capstone projects.
PuspackT110
0%
100%
PuspackT110,
User Rank: Apprentice
8/27/2018 | 5:33:09 AM
Re: How to alleviate these incidents?
very nice informtaion you share with us

https://www.puspack.com/
EvelynMinnick
0%
100%
EvelynMinnick,
User Rank: Apprentice
8/22/2018 | 9:52:11 AM
Re: good Plumber Costa Mesa
I would like to say the same thing. thanks
linkbuild
0%
100%
linkbuild,
User Rank: Apprentice
7/10/2018 | 2:31:31 PM
do my assignment
thanks for sharing valuable information. epass online
aashimahotkhan
0%
100%
aashimahotkhan,
User Rank: Apprentice
7/4/2018 | 2:27:31 AM
Re: Hacking Higher Education
Great article and learning for me! I found a considerable measure of data here!  This article is great for all novice here. Much thanks to you for sharing
williamlucas
50%
50%
williamlucas,
User Rank: Apprentice
6/13/2018 | 7:51:53 AM
re: Hacking Higher Education
Thanks for sharing an informative post and detailed explanation for the same.

 
petersmith43
100%
0%
petersmith43,
User Rank: Apprentice
5/19/2018 | 3:54:19 PM
Re:
I am totally agree with you that hacking in Higher education is affecting the study standard and universities required to take strict action against these type Hacking activities of students. 
Page 1 / 6   >   >>
New Bluetooth Hack Affects Millions of Vehicles
Dark Reading Staff 11/16/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19406
PUBLISHED: 2018-11-21
kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.
CVE-2018-19407
PUBLISHED: 2018-11-21
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
CVE-2018-19404
PUBLISHED: 2018-11-21
In YXcms 1.4.7, protected/apps/appmanage/controller/indexController.php allow remote authenticated Administrators to execute any PHP code by creating a ZIP archive containing a config.php file, hosting the .zip file at an external URL, and visiting index.php?r=appmanage/index/onlineinstall&url= ...
CVE-2018-19387
PUBLISHED: 2018-11-20
format_cb_pane_tabs in format.c in tmux 2.7 through 2.8 might allow attackers to cause a denial of service (NULL Pointer Dereference and application crash) by arranging for a malloc failure.
CVE-2018-19388
PUBLISHED: 2018-11-20
FoxitReader.exe in Foxit Reader 9.3.0.10826 allows remote attackers to cause a denial of service (out-of-bounds read, access violation, and application crash) via TIFF data because of a ConvertToPDF_x86!ReleaseFXURLToHtml issue.