Application Security //

Database Security

4/24/2013
01:10 PM
Connect Directly
LinkedIn
Google+
Twitter
RSS
E-Mail
50%
50%

Hacking Higher Education

The cybersecurity challenge on college campuses lies as much with the students as with malicious outsiders.

InformationWeek Green -  Mar. 4, 2013 InformationWeek Green
Download the entire May 2013 issue of InformationWeek Education, distributed in an all-digital format (registration required).


Hacking Higher Education When a faculty member at Miami University in Oxford, Ohio, logged in to the university's grade book last fall, she realized something was wrong: The grades in the online system didn't match her paper records. She was alert enough to see this was no mere glitch.

In March, after months of investigation, police charged two students with hacking the system to inflate grades. Police maintain that Beckley Parker, 21, of Weston, Conn., had changed his own grades for 17 classes since the spring of 2011, and also changed grades for 50 other students, according to the Dayton Daily News. David Callahan, 22, of Cambridge, Mass., reportedly changed his own grade once and two other students' grades. Although the facts are subject to interpretation, it seems the two were either trying to help fraternity brothers or other friends at the same time they were improving their own grades, or they may have been trying to cover their tracks by changing more than one grade in each case.

All it took for them to make the changes was an inexpensive keylogger device, inserted between the keyboard and the computer it was attached to, which allowed them to record the actions of teachers entering their passwords for the grading system. They were then able to access the system at will.

After cooperating with investigators, the students avoided being charged with a felony, instead accepting dismissal from the university and pleading guilty to multiple counts of "attempted unauthorized use of property," a misdemeanor.

Miami University's information security officer, Joe Bazeley, says an attack on the university's learning and grading systems is actually worse than the sort of attacks, namely information theft and exposure, that used to keep him up at night before the keylogger incident. "We produce knowledge and identify that via grades and a diploma," Bazeley says. The grade book hack "challenges the integrity of those grades and diplomas," he says.

Learn From The Hacks

Report Cover
Schools Do More With Less

Technology advances are providing new tools for learning. The challenge is how to take advantage of the opportunities when resources are stretched thin. Our report is free with registration.
Get This And All Our Reports

Unfortunately, examples abound in higher education of the other kind of security breach.

An undergraduate at the University of Nebraska last year was able to break into a database associated with the university's PeopleSoft system, exposing Social Security numbers and other sensitive information on about 654,000 students, alumni and employees. According to our sister website Dark Reading, the university was lucky enough to detect the breach and shut it down quickly. An IT staffer picked up on an error message that seemed like evidence of something amiss, and a recently installed security information and event management system helped network managers sort through system logs and collect enough evidence to allow police to get a warrant to confiscate the computer of the student believed to have been behind the attack.

In March, Salem State University in Massachusetts alerted 25,000 current and former students and staff that their Social Security numbers may have been compromised in a database breach. If the pattern of the last few years repeats itself, expect higher education institutions to experience another half dozen major security breaches by the end of 2013.

To read the rest of the article,
download the May 2013 issue of InformationWeek Education.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 7   >   >>
PuspackT110
0%
100%
PuspackT110,
User Rank: Apprentice
8/27/2018 | 5:33:09 AM
Re: How to alleviate these incidents?
very nice informtaion you share with us

https://www.puspack.com/
EvelynMinnick
0%
100%
EvelynMinnick,
User Rank: Apprentice
8/22/2018 | 9:52:11 AM
Re: good Plumber Costa Mesa
I would like to say the same thing. thanks
linkbuild
0%
100%
linkbuild,
User Rank: Apprentice
7/10/2018 | 2:31:31 PM
do my assignment
thanks for sharing valuable information. epass online
aashimahotkhan
0%
100%
aashimahotkhan,
User Rank: Apprentice
7/4/2018 | 2:27:31 AM
Re: Hacking Higher Education
Great article and learning for me! I found a considerable measure of data here!  This article is great for all novice here. Much thanks to you for sharing
williamlucas
50%
50%
williamlucas,
User Rank: Apprentice
6/13/2018 | 7:51:53 AM
re: Hacking Higher Education
Thanks for sharing an informative post and detailed explanation for the same.

 
petersmith43
100%
0%
petersmith43,
User Rank: Apprentice
5/19/2018 | 3:54:19 PM
Re:
I am totally agree with you that hacking in Higher education is affecting the study standard and universities required to take strict action against these type Hacking activities of students. 
Dissertationinci243
50%
50%
Dissertationinci243,
User Rank: Apprentice
4/6/2018 | 2:48:45 AM
joeym.silva
This is really great work. Jebel Ali Freezone UAE Company Registration Thank you for sharing such a good and useful information here in the blog for students.
JeroldWinslow
50%
50%
JeroldWinslow,
User Rank: Apprentice
3/26/2018 | 8:02:30 AM
Assignment helper Malaysia
We believe in best quality service for student which they will good thesis on any subject. We have top assignment helper Malaysia professional and expert to give the best guidance  to the student around the world.
JeroldWinslow
50%
50%
JeroldWinslow,
User Rank: Apprentice
3/20/2018 | 8:17:28 AM
Academic assignment
Students Assignment Help welcomes you to the kingdom of highest quality online assignment writing services. Students Assignment Help provides academic assignment service among the students who want to get top grades in their academic career.
JayceJohnson
50%
50%
JayceJohnson,
User Rank: Apprentice
3/19/2018 | 6:18:22 AM
Re: good Plumber Costa Mesa
Thanks for sharing knowlgable post.. I have bookmarked this website.. So keep more post for sharing.. https://www.singaporeassignmenthelp.com/reviews/
<<   <   Page 2 / 7   >   >>
Devastating Cyberattack on Email Provider Destroys 18 Years of Data
Jai Vijayan, Freelance writer,  2/12/2019
Up to 100,000 Reported Affected in Landmark White Data Breach
Kelly Sheridan, Staff Editor, Dark Reading,  2/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-8354
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.
CVE-2019-8355
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.
CVE-2019-8356
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.
CVE-2019-8357
PUBLISHED: 2019-02-15
An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.
CVE-2013-2516
PUBLISHED: 2019-02-15
Vulnerability in FileUtils v0.7, Ruby Gem Fileutils &lt;= v0.7 Command Injection vulnerability in user supplied url variable that is passed to the shell.