Question

In: Computer Science

Please answer these questions in a detailed paragraph. What attracts cyberattacks to universities? What are the...

Please answer these questions in a detailed paragraph.

  1. What attracts cyberattacks to universities?

  2. What are the most common attack methods and approaches for mitigating those attacks?

Please use a reference to answer each question and please add the reference links. Also, make sure these answers are plagiarism free.
Thanks  

Solutions

Expert Solution

Cyber ​​attacks on higher education threaten the security of intellectual property in schools and student information. Because universities must have an open network for their students and staff to have access to it, hijackers have more access to the system. With sensitive information at risk, universities must take appropriate steps to prevent attacks using software to detect threats and other system improvements. These enhancements must also comply with most regulations. Finding balance in preparing your system is key to preventing security breaches.

University Cyberattacks: Why Do They Occur?

Tertiary institutions face different threats to their data security. The hackers drew directly to universities with sensitive information stored in their systems. Unlike merchants, whose details include credit card numbers and other customer statistics, universities often handle patent research data in their operations.

Chinese hijackers have identified 27 universities to try to steal their research findings used by U.S. military. The hackers rounded up their efforts in April 2017 to find and break the programs of the institutions that investigated undersea technology. As of March 2019, not a single school has admitted that their systems have been compromised.

In addition to the data stored on university computers, attackers can take advantage of the wide network of applications to access other applications through emails to steal sensitive information or spam. Listing students, faculty and university staff by their email addresses becomes an important source of criminal schemes to steal sensitive information by trying to collect sensitive information by sending fake emails to users.

Cyber ​​attacks on universities also occur frequently not because systems lack protection, but because they are so complex and complex that implementing those protections becomes difficult. As students enter the system from cell phones, the safest access method, and computers using a variety of operating systems, keeping software in all these options updated is not possible. Anonymous phones, or “prison” calls, are much more secure than other smartphones.

Managing software and hardware used to access a university network is a huge undertaking in many IT departments. Even if all users have accessed the same secure computers, the program will still face cyber security threats.

Because schools have so much sensitive information in research and personal data, IT professionals have to worry about both preventing and responding to cyber attacks. As the prevention methods improve, hackers increase their efficiency, adapting to changes in software and security policies.

Protecting the information of your tertiary institution should be a priority for your IT office. Outside of the program, you may find your office trying to recover from a serious data breach.

The following could be possible reason for cyber attacks

1) Lack of research visibility of IT staff
When it comes to research, universities are so close to their findings, that even IT staff has little knowledge of these critical components of the system that they have to protect themselves from. While research departments may not require all IT departments to know about their courses, key IT members still need to understand how to access information.

The IT department can’t take steps to get research data I don’t know about. Communication between researchers and IT security should be part of the planning process for any of the most critical research in the institution.

2) Open Culture
University work disseminates information to students, and the way most students use to access at least some of this information through the school network. Weak passwords and too many users with access to too many locations pose a serious threat to security.


Encourage students and staff to report any emails or false messages to the IT department and investigate the matter to see if there are any security breaches. While the culture of open information contributes to the sharing of information on university campuses, if left unmanaged, it can create problems for the network. Be prepared to teach students, faculty and staff how to be the best users of the network to keep the system safe for everyone.

3)

Compliance with Law Enforcement
Because institutions are subject to regulations governing the various types of data they use, ensuring compliance with all laws should be a priority in establishing system security. Student and staff medical service data must comply with HIPAA policies, and other types of information must comply with regulations from FERPA, PCI and Sarbanes-Oxley.

Building secure systems that adhere to these various needs requires planning and balance to increase security without sacrificing usability.

Higher Education Security Violations

Security breaches occur more frequently in higher education. These developments highlight the need for IT departments to embrace anti-cyber attacks. Some recent events have shown the various ways in which hackers infiltrate programs and exploit violations in various ways.

The Chinese attack on research schools in 2017 shows how even foreign hijackers will go to get information from university archives. By seeing how attractive the data of patent research is, IT staff can begin to build a more secure system to protect it.

Other common reasons for security breaches include identifying system vulnerabilities, information exploitation and data modification. While most think about how hackers use information obtained, the various methods they use to do so require further consideration. The openness of tertiary education networks puts them at risk of bullying, including:

Spoofing:

The attacker will send emails pretending to be an honest person or business.


Sniffing:

Fraud is more than deception, sniffing is a method used by hackers to take over and check network overload.


Hijacking:

Hijacking occurs when an attacker captures a single limit of digital communication between people.


Man-in-the-middle:

Similar to hijacking, the middle person occurs when attackers block digital communication between groups to learn or change. No party knows the limits, an attacker can use false credentials.


False authorization:

Hackers may use information collected from digital communications to ensure access to protected areas.
Password cracking: Weak passwords leave programs open to potential hackers to gain access to secure network environments.


These methods of invading systems remain constant, but once they are internal, attackers can do more today with information on the network than they did years ago. The new technology also introduces new hackers that can disrupt universities and other situations.


Related Solutions

Please write a detailed paragraph on each questions based on the knowledge in Supply Chain Management!...
Please write a detailed paragraph on each questions based on the knowledge in Supply Chain Management! 1. Discuss three key design/operating considerations when implementing lean in a retail environment. 2. Describe three benefits from implementing a decentralized, low-coordination procurement model.
CONTRACT LAW: Please Answer these questions as detailed as possible 6.   What is a court trying to...
CONTRACT LAW: Please Answer these questions as detailed as possible 6.   What is a court trying to achieve when it makes an award of damages in contract law? 7.   Describe the different types of damages that can be awarded.    8.   Describe what the following clauses which appear in a commercial contract: force majeure clause; exemption clause. 9.   Describe the different forms of dispute resolution that could be provided for in a contract.
Please answer all the following questions in a paragraph or two. Thank you! What is Netflix...
Please answer all the following questions in a paragraph or two. Thank you! What is Netflix and how has it changed? What are the sources of Netflix’s competitive advantage? Why or why not Netflix? (choose why you choose or choose why you do not choose netflix) If you do not use Netflix do you use a streaming service?
please answer the following detailed in a paragraph. I am really struggling with this concept. thanks!...
please answer the following detailed in a paragraph. I am really struggling with this concept. thanks! Microorganisms can thrive under many different conditions, including high-temperature environments such as hot springs. To function properly, cell membranes have to be in a fluid state. How do you expect the fatty acid content (saturated versus unsaturated) of bacteria living in high-temperature environments might compare with that of bacteria living in more moderate temperatures? 2. Heating a protein sufficiently may cause it to denature....
explain in a detailed paragraph please  - What is meant by the genetic code being universal and...
explain in a detailed paragraph please  - What is meant by the genetic code being universal and redundant?
please answer the following detailed in a paragraph. thanks! 1. People who use proton pumps inhibitors...
please answer the following detailed in a paragraph. thanks! 1. People who use proton pumps inhibitors or antacids are more prone to infections of the gastrointestinal tract. Can you explain why? 2. The bacterium that causes Hansen’s disease (leprosy), Mycobacterium leprae, infects mostly the extremities of the body: hands, feet, and nose. what is most likely its optimum temperature of growth? 3. Some hyperthermophiles can survive autoclaving temperatures. Are they a concern in health care?
I am teaching other students so please be detailed--explain what is important, answer the questions completely,...
I am teaching other students so please be detailed--explain what is important, answer the questions completely, as if I were reviewing the material for myself alone! APA formatting of posts is not necessary. APA formatting of citations/references is necessary. :0) Beta agonists are commonly prescribed to patients with breathing problems. How would they work in the lungs?                               How would they impact the eyes, heart, liver, GI tract?                              What would those effects be and would they be considered side effects or...
Answer the following questions as detailed as possible: Question #1 – Time Value of Money Please...
Answer the following questions as detailed as possible: Question #1 – Time Value of Money Please give an example from your own personal or professional experiences (life/career) that involves the Time Value of Money. The Time Value of Money defined as in Chapter 4 as: Present Value, Future Value, Present Value of an Annuity, Future Value of an Annuity, Amortization. It can be one of these above or multiple. Explain the example and how this/these money valuation tools fit into...
Please complete a SWOT Analysis for Mexico in paragraph form. Please be as detailed as possible
Please complete a SWOT Analysis for Mexico in paragraph form. Please be as detailed as possible
*** PLEASE ANSWER ALL QUESTIONS IN PARAGRAPH FORMAT. The following case study provides information for a...
*** PLEASE ANSWER ALL QUESTIONS IN PARAGRAPH FORMAT. The following case study provides information for a hotel chain. They have recently conducted a customer satisfaction survey. Given these research results and the other information in the case, what advice would you give them? This is a good exercise in utilizing the results of market research. ACTIVITY/TASK The Quick-Stop Hotel Chain Quick-Stop Hotels is a small hotel chain located along on the north coast of New South Wales. This chain consists...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT