Application Security //

Database Security

4/24/2013
01:10 PM
Connect Directly
LinkedIn
Google+
Twitter
RSS
E-Mail
50%
50%

Hacking Higher Education

The cybersecurity challenge on college campuses lies as much with the students as with malicious outsiders.

InformationWeek Green -  Mar. 4, 2013 InformationWeek Green
Download the entire May 2013 issue of InformationWeek Education, distributed in an all-digital format (registration required).


Hacking Higher Education When a faculty member at Miami University in Oxford, Ohio, logged in to the university's grade book last fall, she realized something was wrong: The grades in the online system didn't match her paper records. She was alert enough to see this was no mere glitch.

In March, after months of investigation, police charged two students with hacking the system to inflate grades. Police maintain that Beckley Parker, 21, of Weston, Conn., had changed his own grades for 17 classes since the spring of 2011, and also changed grades for 50 other students, according to the Dayton Daily News. David Callahan, 22, of Cambridge, Mass., reportedly changed his own grade once and two other students' grades. Although the facts are subject to interpretation, it seems the two were either trying to help fraternity brothers or other friends at the same time they were improving their own grades, or they may have been trying to cover their tracks by changing more than one grade in each case.

All it took for them to make the changes was an inexpensive keylogger device, inserted between the keyboard and the computer it was attached to, which allowed them to record the actions of teachers entering their passwords for the grading system. They were then able to access the system at will.

After cooperating with investigators, the students avoided being charged with a felony, instead accepting dismissal from the university and pleading guilty to multiple counts of "attempted unauthorized use of property," a misdemeanor.

Miami University's information security officer, Joe Bazeley, says an attack on the university's learning and grading systems is actually worse than the sort of attacks, namely information theft and exposure, that used to keep him up at night before the keylogger incident. "We produce knowledge and identify that via grades and a diploma," Bazeley says. The grade book hack "challenges the integrity of those grades and diplomas," he says.

Learn From The Hacks

Report Cover
Schools Do More With Less

Technology advances are providing new tools for learning. The challenge is how to take advantage of the opportunities when resources are stretched thin. Our report is free with registration.
Get This And All Our Reports

Unfortunately, examples abound in higher education of the other kind of security breach.

An undergraduate at the University of Nebraska last year was able to break into a database associated with the university's PeopleSoft system, exposing Social Security numbers and other sensitive information on about 654,000 students, alumni and employees. According to our sister website Dark Reading, the university was lucky enough to detect the breach and shut it down quickly. An IT staffer picked up on an error message that seemed like evidence of something amiss, and a recently installed security information and event management system helped network managers sort through system logs and collect enough evidence to allow police to get a warrant to confiscate the computer of the student believed to have been behind the attack.

In March, Salem State University in Massachusetts alerted 25,000 current and former students and staff that their Social Security numbers may have been compromised in a database breach. If the pattern of the last few years repeats itself, expect higher education institutions to experience another half dozen major security breaches by the end of 2013.

To read the rest of the article,
download the May 2013 issue of InformationWeek Education.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 6   >   >>
kate25
50%
50%
kate25,
User Rank: Apprentice
3/12/2018 | 11:27:10 PM
Re: good Plumber Costa Mesa
thanks for sharing all of this...
JeroldWinslow
50%
50%
JeroldWinslow,
User Rank: Apprentice
3/12/2018 | 6:00:43 AM
Annotated Bibliography Assignment
Bibliography is a tough subject it has many branches when it comes to writing assignments on bibliography every student require proper guidance and help to finish bibliography assignments if you need proper annotated bibliography assignment move to StudentsAssignmentHelp.
JayceJohnson
50%
50%
JayceJohnson,
User Rank: Apprentice
3/6/2018 | 6:23:35 AM
do my assignment
Thanks a lot for sharing it, that's truly has added a lot to our knowledge about this topic. Have a more successful day. do my assignment
LynnL703
50%
50%
LynnL703,
User Rank: Apprentice
2/26/2018 | 1:47:20 AM
Re: Interesting Post
 Thank you so much for sharing this article.  
kakbrus
50%
50%
kakbrus,
User Rank: Apprentice
2/22/2018 | 10:17:38 PM
Re:assignment help
Thank you for posting such a great article! I found your website perfect for my needs. It contains wonderful and helpful posts. Keep up the good work!. Thank you for this wonderful Article! five nights at freddy's
Michellejohnson1
50%
50%
Michellejohnson1,
User Rank: Apprentice
2/19/2018 | 8:42:16 AM
Re: Hacking Higher Education
Hacking Higher Education is not eassy for everyone, but I'm sure experts can do this. This is very interesting and useful inforamtion I love to dissucss with my firnds. I agree with you about the thoughts you have shared too. Darkreadings always have something to offer. 
BrianN060
50%
50%
BrianN060,
User Rank: Ninja
2/17/2018 | 6:27:01 PM
Flag comments?
Does DR have a way to flag inappropriate comment posts?  If not, suggest you add one.  
assignmenthelpusa
50%
50%
assignmenthelpusa,
User Rank: Apprentice
2/17/2018 | 5:09:40 AM
academic writing services
Do you need academic writing services in USA? Stop searching now, we are providing cheap writing services for students. You can hire professional academic writers from us for writing your assignment. Our writers are available 24*7; you can contact us at any time as you want.
JeremyCaldwell
50%
50%
JeremyCaldwell,
User Rank: Apprentice
2/16/2018 | 6:02:51 AM
Education
I want to use this information as example of persuasive essay. I hope you don't mind. Yes or no?
assignmenthelpusa
50%
50%
assignmenthelpusa,
User Rank: Apprentice
1/30/2018 | 5:00:29 AM
study help
We are constructive, focused and absolutely devoted towards the students when it comes to framing flawless assignments. Here's what we follow in order to come up with satisfactory solutions for the students in USA who would need online study help.
<<   <   Page 2 / 6   >   >>
New Cold Boot Attack Gives Hackers the Keys to PCs, Macs
Kelly Sheridan, Staff Editor, Dark Reading,  9/13/2018
Yahoo Class-Action Suits Set for Settlement
Dark Reading Staff 9/17/2018
RDP Ports Prove Hot Commodities on the Dark Web
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
How Data Breaches Affect the Enterprise
How Data Breaches Affect the Enterprise
This report, offers new data on the frequency of data breaches, the losses they cause, and the steps that organizations are taking to prevent them in the future. Read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-3912
PUBLISHED: 2018-09-18
Bypassing password security vulnerability in McAfee Application and Change Control (MACC) 7.0.1 and 6.2.0 allows authenticated users to perform arbitrary command execution via a command-line utility.
CVE-2018-6690
PUBLISHED: 2018-09-18
Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from external system.
CVE-2018-6693
PUBLISHED: 2018-09-18
An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escal...
CVE-2018-16515
PUBLISHED: 2018-09-18
Matrix Synapse before 0.33.3.1 allows remote attackers to spoof events and possibly have unspecified other impacts by leveraging improper transaction and event signature validation.
CVE-2018-16794
PUBLISHED: 2018-09-18
Microsoft ADFS 4.0 Windows Server 2016 and previous (Active Directory Federation Services) has an SSRF vulnerability via the txtBoxEmail parameter in /adfs/ls.