Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Term Paper:
An institution of higher learning is one of the most vulnerable places to cyber-attacks available to hackers due to the number of units operating, lackadaisical security measures and the ability of hackers to hide in plain sight. The fact that these are vulnerable systems and individuals has made it a top priority of most institutions to ensure that the people who attend the school at least have a policy in place. Because ensuring security for all residents of a school would be very costly, most schools have a policy regarding their own equipment, but assume that students will guard their own equipment while they are at school. The problem with this is that there is a lot of file sharing between students and between individual students and others using flash drives and the school's computer systems. Therefore, it is very simple to inadvertently introduce a deadly pest into the system.
To combat internet security issues in a larger sense, many companies offer individual and systems-wide software that will help combat breaches, and federal and state governments have tried to curtail the problem by enacting laws which will protect individuals and their private information. As can be seen from the almost daily report of breach information, these efforts are only partially successful. Regardless, agencies always try to stay either even or only slightly behind new attack capabilities. This paper examines recent attacks at institutions of higher learning, processes designed to stop the attacks, laws which are supposed to protect individual information and hardware designs that are helping the cause.
Recent Attacks at Universities
Attacks against institutions of higher education have increased over the past few years, but they are nothing new. It would probably amaze people to realize that the first documented bug placed in an electronic system was an actual bug (hence the name). In 1945, "Rear Admiral Grace Murray Hopper discovers a moth trapped between relays
in a Navy computer. She calls it a "bug,"…Murray Hopper also coined the term "debugging" to describe efforts to fix computer problems" (Krebs, 2003). Of course, now they are much more serious, cause more widespread damage, and can cost billions of dollars to search out and repair. It is a constant warfare between the people who wish to damage systems, or simply by accessing them illegally damage them, and the people whose constant job it is to thwart them.
Specific attacks have either been used against institutions of higher learning or they have, more often, originated there. Universities are often a hotbed of this type of criminal activity because a large group of individuals with the understanding of the mechanisms necessary to create havoc are gathered at one place. In 2003, a virus called the "Slammer Worm" infected "hundreds of thousands of computers in less than three hours. The fastest-spreading worm ever wrought havoc on businesses worldwide, knocking cash machines offline and delaying airline flights" (Krebs, 2003). Although this worm did not originate at a college necessarily, the speculation is that the original code, which was so small it just caused interruptions as it was not designed to write itself onto other computers, did come from a campus and that it spread through the internet for weeks before causing the damage it did (Krebs, 2003). A team of researchers at Princeton University in 2007, completed a project in which they developed cutting edge attacks and released them locally to determine their effect. The controlled results proved that it was possible to break into previously unassailable networks. The lead researcher stated "We've broken disk encryption products in exactly the case when they seem to be most important these days: laptops that contain sensitive corporate data or personal information about business customers" (Parker, 2008). This technology has been used in subsequent attacks and is the basis for technology that allows criminals to steal data from laptops on a router or hotspot. Another writer, talking about the dangers of cyber-attacks on college campuses says the dangers "malicious software (malware), phishing, infrastructure attacks, social network targeting, and peer-to-peer (P2P) information leakage are not potential threats; they're actual, daily issues" (Rasmussen, 2008). Recently, 2010, a computer system type that is the backbone of many university systems was attacked using a bizarre set of coincidences. Rasmussen writes;
"In a high-profile BGP incident, every organizations' vulnerabilities were demonstrated when a Chinese state-controlled telecommunications company, perhaps inadvertently, positioned itself to intercept 15% of the world's Internet traffic routes. In that case, China Telecom advertised erroneous BGP routes that funneled traffic for websites, e-mail and other transactions of the U.S. Senate, Department of Defense, NASA and Department of Commerce through Chinese networks before this traffic reached its intended destination."
This attack did not affect any college campuses, but a similar issue could easily happen to sensitive research data because it is so commonly used. The fact that the U.S. government was so highly infected by its use is proof that any network is at risk.
Security Systems Devised Because of Attacks
Cyber crime has yielded a large number of products and processes that are commonly used to combat the recurrence of the issue. There are a few issues with this approach. First of all it is reactionary. Instead of taking the time to build a system that will assess and address a variety of security issues as a unit, the goal is usually to stop the attack that is happening or has just happened. The problem with this is that by the time the reaction has produced a new set of processes or products, the criminals are already two or three steps ahead (Rasmussen, 2011). Another issue is that most systems designed to stp this type of crime are piecemeal. This means that they are different products from different manufacturers that have been patched together to form a complete barrier. Unfortunately, the systems often do not work well together so, as a whole, it is vulnerable to further attacks. This approach also slows the business that the organization is trying to do, so, in essence, the criminals have won a small victory by both hacking the system and by curtailing future operations (Cisco Systems, 2007).
Fortunately there are organizations, such as Cisco, that are trying to address the problem as a whole. The Cisco system
"Cisco Campus Secure for Higher Education Networks is based on the Cisco Systems vision of the Self-Defending Network -- a network that is integrated, collaborative, and adaptive. A Self-Defending Network:
Integrates security throughout all aspects of the network
Collaborates among all network and security elements to create a unified defense system
Adapts to new threats as they arise" (Cisco Systems, 2007).
This and other systems that have to be geared toward the problems that a university has because they are unique issues that other businesses do not face. The Cisco system was designed with a university customer in mind and has taken all of the vagaries of the project into consideration.
Technology or Processes used to Lower Computer crime Threats
Comprehensive programs like Cisco's can be expensive because they are expensive. Of course they offer a pupil network secure solution that keeps an individual secure for a $4.99 fee. This is basically the same as purchasing any other antivirus software, but it is supposed to be specified for the problems and usage that a college student might face.
Other vendors do offer similar products though. Norton sells a version of similar software that can be purchased on a yearly subscription basis at just $140.00 for a two-year download license. McAfee has a similar product that it sells for a one-time price of $100.00, but the purchaser can purchase updates also for a separate fee. Kaspersky also has similar software that it sells for approximately $60.00 for a yearly download and updates. Others have the same products, such as ATT and Personna, that retail for about the same price.
Possibly the best rating system for an good that can be purchased is Consumer Reports. The site does not take any donations or advertisement, but exists using subscriptions to its service. The reason for this is that the reviewers on the site want to remain as unbiased as possible. During a review of security system platforms for the internet, Consumer Reports rated the Kaspersky system the best, Norton second, and McAfee last of the products mentioned above. Avira and G. Data had the best systems, but G. Data cost half as much. So, it seems the suggestion is to go with the G. Data Internet Security 2012 product (Consumer Reports, 2012).
Computer Attack Laws
Because this is such a widespread problem, the government has also gotten involved to try and tighten the law which governs internet and system security. Many organizations, including the U.S. government, have data that they need to ensure is secure because it is of a very sensitive nature. The problem is that it is difficult to write a body of law that is at once broad enough to capture all that can…[continue]
"Information Security" (2012, December 21) Retrieved October 25, 2016, from http://www.paperdue.com/essay/information-security-105590
"Information Security" 21 December 2012. Web.25 October. 2016. <http://www.paperdue.com/essay/information-security-105590>
"Information Security", 21 December 2012, Accessed.25 October. 2016, http://www.paperdue.com/essay/information-security-105590
Security Information security is a primary concern for consumers and businesses. In "IT security fails to keep pace with the rise of cloud computing," the author claims that in spite of the advancements in cloud technology, information security has not kept pace. This assessment is rooted firmly in fact and best practices in the information security industry. Although their analysis is thorough, the authors would do well to point out the
Security at Work Information Security within the nursing fraternity With the advent of consolidated information storage within the nursing fraternity, there has grown the need to have better security and controlled access to such information that may be considered confidential and for the use by the nurse and the patient alone. When anyone wants therefore to have access to the documents I will always need to verify several details just to be
SECURITY Information Security and Risk Management in IT This essay is designed to present and discuss both an assessment of information security and risk management in IT systems and a comparative discussion of important academic theories related to security and risk. In the first section, An assessment, a conceptual framework will emerge including reference to important terminology and concepts as well as an outline of legislation and authorized usage examples. In the
Security Management Information Security Management Managing the information security at a major university is never an easy task, and especially with a team of only ten the complexities and the resource demands can sometimes make the situation seem all but impossible even on the best of days. When the former head of information security management suddenly departs as the result of an FBI arrest -- and when that arrest stems from the
Security A broad definition of information security is given in ISO/IEC 17799 (2000) standard as: "The preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the accuracy and completeness of information and processing methods), and availability (ensuring that authorized users have access to information and associated assets when required" (ISO/IEC 17799, 2000, p. viii). Prior to the computer and internet security emerged as we
DMCA The Digital Millennium Copyright Act (DMCA) is a controversial United States digital rights management law enacted October 28, 1998. The intent behind the DMCA was to create an updated version of copyright laws to deal with the special challenges of regulating digital material. Broadly, the goal of the DMCA is to protect the rights of both copyright owners and consumers. The law complies with the World Intellectual Property Organization (WIPO)
Security Policy: The information security environment is evolving because organizations of different sizes usually experience a steady stream of data security threats. Small and large business owners as well as IT managers are kept awake with various things like malware, hacking, botnets, and worms. These managers and business owners are usually concerned whether the network is safe and strong enough to repel attacks. Many organizations are plagued and tend to