Premium Essay

Common Information Security Threats for Colleges

In:

Submitted By Shirle
Words 1428
Pages 6
Common Information Security Threats for Colleges
CMGT/400
August 11, 2014

Common Information Security Threats

Technologic advances occur at a rapid pace, with new devices coming out at frequent intervals. These new devices are appealing to college students who want to do everything as quickly and easily as possible. Because of the numerous smartphones, tablets, and laptops used by students and employees, college campuses face various security issues from mobile devices that connect to the network, often unintentionally.

Identification of Threats

There are many threats a network faces when the IT department allows students to connect to the network or Internet using mobile devices. Some threats affect the campus network only, while other threats directly affect students or employees. For the campus network, threats include Social media vulnerabilities, Unauthorized access to employee or student information, and Email attacks (phishing)

For students, the main threat comes from identity theft, often a result of inappropriate practices connected to social media and email attacks. Often, attacks to a college network occur because of unintentional and misguided errors from students.

Information Vulnerabilities

Students use mobile devices, ranging from smartphones to tablets to laptops, to access class schedules, grades, email, and social network sites. Many devices have the capability to store user ID’s and passwords but personal security measures on these devices are not stringent, making it easy for an unauthorized person to intercept this information. Even though a college computer network may have numerous levels of protection, the system cannot easily track student authentication when mobile devices are used. This lack of authentication provides easy access for even a semi-skilled hacker to the user ID/password combination.

Similar Documents

Premium Essay

Security Threats

...Project Part 1: Current Security Threats The top three security threats that Aim Higher College faces are the following: * Mobile devices connecting to the network * Social Media * Compromised routers intercepting sensitive information These threats are the most common that any college faces. The threats have remained at the top of the list every year for a variety of reasons. This list of threats is also unique to college campuses. I will discuss each of the threats in this report. College students love new technology and each year smaller and more powerful devices are hitting the market. Students on the campus have a variety of devices ranging from cell phones, tablets, and laptops. These devices connect to the campus network and are used by students to check email, class schedules, get grades, and many other uses. The challenge is to allow these devices the necessary access and still have a secure network. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. The use of social media has increased in recent years. Students and teachers both use things like Facebook, Myspace, and others. These applications have the potential to transmit malware...

Words: 589 - Pages: 3

Premium Essay

Project Part 1: Current Security Threats

...IS4560 Week 4 Project Part 1: Current Security Threats The three top security threats I have chosen for Aim Higher College are malware, exploit vulnerabilities, and social networking. Malware in another term that means malicious software. It is used to infiltrate and damage computers without the user’s permission. Some examples of malware are viruses, spyware, worms, Trojans, and rootkits. This is a top security threat because a computer can easily get infected. While students or staff members use the schools computers, they can download music or pictures, and a virus can be attached to those and the computer will get infected right away. Another security threat is exploit vulnerabilities. An exploit is an attack on a computer system, and this exploit will take advantage of vulnerabilities that exist on a system. This is why vulnerabilities need to be mitigated and taken care of right away. If not, attackers will always find a way to get on a system and steal data and personal information. This will affect students because there personal information but be out there to the public without their knowledge. The third threat that I believe is a main concern for this college is social networking. Nowadays everyone uses social networking such as Facebook, Twitter, and etc. The scams on Facebook include cross-site scripting, clickjacking, survey scams, and identity theft. Cross-site scripting is when the site tricks you to go to another webpage and this has hidden malware that...

Words: 326 - Pages: 2

Premium Essay

Hackers and Countermeasures Project Part 1

...The biggest threats, according to the Information Security Forum report for 2016 are concerns with big data, the Internet of Things, cybercrime, and the decreasing number of skilled IT security operators. Another issue that is becoming more prevalent is State Intervention. The threats that we need to prepare for at Aim High College are the protection against cyber threats from hackers, need for stronger protection from inside the organization through a top-notch IT department, and the dangers that come from data sharing. These threats are more common because opening our networks to the vast information on the web, we are opening our networks to numerous threats. Incoming and outgoing data can make our system available for hacking and cyber theft. Without complete transperancy, there isn’t a way to ensure that the data being shared is safe. Without having an IT Department that is on top of the latest threats, there is no way to protect the network from the threats. They need to be aware of all the possibilities of outside threats that can come from under protected or faulty applications. And of course there is the ever increasing number of cyber criminals looking to exploit companies and individuals for monetary gain. Whether they are using viruses and hacking. Or spam and scams, cybercrime is still on the rise. Only by having up to date security and educated employees can you protect the network. Many of these threats will remain constant as the world continues to...

Words: 385 - Pages: 2

Premium Essay

Project Part 1

...Security Threats Project Part 1: Current Security Threats The top three security threats that Aim Higher College faces are the following: * Mobile devices connecting to the network * Social Media * Compromised routers intercepting sensitive information These threats are the most common that any college faces. The threats have remained at the top of the list every year for a variety of reasons. This list of threats is also unique to college campuses. I will discuss each of the threats in this report. College students love new technology and each year smaller and more powerful devices are hitting the market. Students on the campus have a variety of devices ranging from cell phones, tablets, and laptops. These devices connect to the campus network and are used by students to check email, class schedules, get grades, and many other uses. The challenge is to allow these devices the necessary access and still have a secure network. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. The use of social media has increased in recent years. Students and teachers both use things like Facebook, Myspace, and others. These applications have the potential...

Words: 326 - Pages: 2

Premium Essay

Project Part 1

...Project Part 1 The top three security threats that Aim Higher College faces are the following: Mobile devices connecting to the network, Social Media, and Compromised routers intercepting sensitive information. These threats are the most common that any college faces. The threats have remained at the top of the list every year for a variety of reasons. This list of threats is also unique to college campuses. I will discuss each of the threats in this report. College students love new technology and each year smaller and more powerful devices are hitting the market. Students on the campus have a variety of devices ranging from cell phones, tablets, and laptops. These devices connect to the campus network and are used by students to check email, class schedules, get grades, and many other uses. The challenge is to allow these devices the necessary access and still have a secure network. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. The use of social media has increased in recent years. Students and teachers both use things like Facebook, Myspace, and others. These applications have the potential to transmit malware every time they are used on the campus...

Words: 543 - Pages: 3

Free Essay

Your Mom

...Program Guidebook Master of Science, Information Security and Assurance The Master of Science in Information Security and Assurance is a competency-based degree program that encompasses the main security domains of knowledge developed following strict guidelines for information security and assurance education prescribed by the National Security Agency. Understanding the Competency-Based Approach Practically speaking, what does it mean when we say that WGU’s programs are competency-based? Unlike traditional universities, WGU does not award degrees based on credit hours or on a certain set of required courses. Instead, you will earn your degree by demonstrating your skills, knowledge, and understanding of important concepts through a series of carefully designed courses. Progress through your degree program is governed not by classes but by satisfactory completion of the required courses that demonstrate your mastery of the competencies. Of course, you will need to engage in learning experiences as you brush up on competencies or develop knowledge and skills in areas in which you may be weak. For this learning and development, WGU has a rich array of learning resources in which you may engage under the direction of your student mentor. You will work closely with your mentor to schedule your program for completing the courses. You will also work closely with additional faculty members as you proceed through courses of study that are designed to lead you through...

Words: 4226 - Pages: 17

Free Essay

Hhomeland Security Exercise and Evaluation Project

...| | | | | | | | |Daytona State College Cell phone Bomb Threat Seminar | | | Table of Contents Introduction & Background 3 Mission 3 Exercise Design & Evaluation Plan 4 Capabilities 4 Embry-Riddle Aeronautical University 4 Demographics 5 Residential Campus Student Demographics (Fall 2013) 5 Exercise Overview 6 Exercise Design & Development Plan 6 Exercise Needs 6 Exercise Purpose 6 Exercise Scope 7 Exercise Objectives 7 Participants 7 Players 7 Moderator 7 Facilitator 8 Mediators 8 Scenario 8 Initial Scenario 8 Secondary Scenario 12 Exercise Development 13 Exercise Timeline 13 Milestones and Tasks 14 Evaluation Guides (EEGs) 14 Capability 14 Capability...

Words: 4022 - Pages: 17

Premium Essay

Private and Public Sector Cyber Security Needs

...towards a technology-centered society, both public and private sectors have to keep up with and evolve just as quickly, while trying to be proactive when it comes to security. The world today is not as safe as it once was, and as it changes to a more paperless, technological-based society, access to information is becoming increasingly accessible. With this, cyber-attacks and security breaches have become a significant risk of doing business. As hackers, botnets, and various other cyber-based threats have become progressively more malicious and continue to attack organizations and governments alike, a prevailing question is how to unite the public and private sectors so that they can evolve to defend against that which they cannot see. Introduction Today's reality is rapidly advancing into a world that depends exclusively on technology as an approach to work together and connect. With this move towards a technology-focused culture, both government and private sectors are needing to stay aware of and develop almost as fast, while attempting to be proactive in the matter of security. The world today is not as protected as it once seemed to be, and as it changes to a more paperless, computer-oriented culture, access to more and more data is getting to be progressively available. With this, cyber threats and security breaches have turned into a critical danger of working together. As hackers and different other digital based dangers have...

Words: 2198 - Pages: 9

Premium Essay

Database Management Systems

...database management system solution to Grandfield College for tracking software installed. I have analyzed the organizational issues and needs and developed conceptual, logical, and physical designs of DBMS solution. In order to implement the solution, substantial research had been done on best practices in design, available products, and the legal and ethical standards to which we must adhere during design. This paper includes Business rules, Conceptual, Logical, and Physical database designs, Recommendations on best DBMS required for Grandfield College, Data model, Legal Compliance, Ethical Practices, Security Needs and Security Plan Keywords: Grandfield College, Database Design, Recommendations, Business Rules, Data model, Security Plan Database Management System Grandfield College is in need of Database Management System as law requires that any business, including a school, track its software. It is important to know what software the school owns, in what versions, and what the license agreement for that software is. For this purpose I have developed a Software Tracking database for Grandfield College. Problem Grandfield College is in need of a database for effectively tracking faculty and staff computers, the software installed on those systems, User access to each computer, and requests for new software installation. This data will benefit the IT team in troubleshooting, College Management to track the information and helps make some peoples jobs easier by having this...

Words: 4672 - Pages: 19

Premium Essay

Ethical Hacking

...areas in network security, and certainly an area that generates much discussion, is that of ethical hacking. The purpose of this study is to examine the literature regarding how private sectors and educational institutions are addressing the growing demand for ethical hacking instruction. The study will also examine the opportunity for community colleges in providing this type of instruction. The discussion will conclude with a proposed model of ethical hacking instruction that will be used to teach a course in the summer semester of 2006 through the continuing education department at Caldwell Community College and Technical Institute within the North Carolina Community College System. Ethical Hacking 3 Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find more effective solutions relating to security concerns. Individuals with unethical behaviors are finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages. As information security continues to be foremost on the minds of information technology professionals, improvements in this area are critically important. One area that is very promising is penetration testing or Ethical Hacking. The purpose of this paper is to examine effective offerings within public and private sectors to prepare security professionals. These...

Words: 6103 - Pages: 25

Premium Essay

Data Classification

...PimaCommunityCollege District Office, Information Security Public Page 1 of 3 Data Classification Standards Purpose: To protect the confidentiality, integrity, and availability of Pima Community College data – pursuant to Data Trusteeship (SPG-5702/AB) and Security of the Information Technology Infrastructure (SPG-5702/AC) – through the identification of information that requires protection. Audience: All members of the Pima Community College community, including faculty, staff, and students. Sponsoring Unit: Vice Chancellor of IT, 2008. I. Definitions A. Responsible parties Data Trustees: Per SPG-5702/AB: “The accuracy and completeness of the data within the Enterprise Resource Planning systems are the responsibility of functional units of the College. All student information and grants systems data are assigned to the Office of the Provost. All finance data and payroll modules are assigned to the Office of the Executive Vice Chancellor of Administration. All human resources data, except payroll, are assigned to the Vice Chancellor of Human Resources. Data Stewards: Deans, vice chancellors, assistant vice chancellors, directors, managers or others as identified by the data trustees to manage a subset of data. Data Processor: Any individuals who have been authorized by a data steward to create, remove, or modify data. B. College data types The assessment criteria for the following classifications were derived from the National ...

Words: 1075 - Pages: 5

Premium Essay

Dfhdfh

...| |  | | |[pic]www.csudh.edu | | |[pic] | |[pic] |College of Natural and Behavioral Sciences | | |Department of Computer Science | | |http://csc.csudh.edu | |Course Title: |Communication Systems Security | |Course Number: |CTC 362 | |Instructor Name: | Mehrdad S. sharbaf, ph.d. msharbaf@csudh.edu, Office: tba, phone: tba, office Hours: tba | |Date: |Spring Semester, 2016 | |Course Length: ...

Words: 1433 - Pages: 6

Premium Essay

Identify What You See as the Main Purpose of Security Management and Discuss What Is Meant by the Statement That ‘Security Measures Must Be Commensurate with the Threat’.

...Assignment Identify what you see as the main purpose of security management and discuss what is meant by the statement that ‘security measures must be commensurate with the threat’. "Security is everyone’s business" Which is the point I would like to conclude with at the end of my essay? Yet the assignment poses two questions, the first highlights the term 'Security Management' which is fundamental towards the second question that focuses on the importance in identifying the proportionate and appropriate balance between the right security measures to the right threat. I would like to at first give my interpretation of 'Security Management' by discussing each word on their own merits before moving onto the latter. What is Security? The Oxford dictionary defines Security as the state of being free from danger or threat. You don’t have to work within the Industry to realize that danger or threat can come in many forms, for all of us, I am confident to say that this is a life skill which we learn from and early age either by our own mistakes or from others. So it goes without saying that as we progress through life we develop our own methods of being free from danger or threat. However, there is only so far we can go before we look towards further support or additional security measures to be put in place to protect our accomplishments whether this is life, money, property or assets whether tangible or not. Nevertheless, whatever measures you put in place, through any of...

Words: 1349 - Pages: 6

Premium Essay

Annonated Bibliograpyh

...Victoria Cummins Dr. Fayeza Hasanat ENC 1101 November 23, 2015 Topic: School Security Thesis Statement: With the increase in school violence and terrorism certain precautions dealing with security need to be taken before more deaths occur. Annotated Bibliography Hasselstrom, Linda. “A Peaceful Women Explains Why She Carries a Gun.” Pattern for College Writing: 272-277. Print. This story helps support the idea that anybody, not just a specific woman, owns a gun people take what they are saying more seriously. Author Linda Hasselstrom has strong feministic views when put in comparison to other women writers. Orwell, George. “Shooting an Elephant.” Pattern for College Writing: 123-133. Print. Guns are a sensitive subject around the world. George, through this descriptive story tells how he does not want to shoot the elephant even though he knows that it has been and will continue being a threat. This story can compare to Hasselstrom’s because it shows the flip side of guilt instead of the confidence that Hasselstrom had. Smith-Yackel, Bonnie. “My Mother Never Worked.” Pattern for College Writing: 118-122. Print. The United States government can cause a lot of stress and frustration on the public. The story shows how the government categorizes people in groups almost like the feeling of discrimination from the short essay “Just Walk On By: A Black Ponders His Power to Alter Public Space” by Brent Staples. Sterling, Brent. “Do Good Fences...

Words: 713 - Pages: 3

Premium Essay

It/244 Final

...Information Security Policy Gennie Diamond Axia College of University of Phoenix IT/244 – Intro to IT Security October 10, 2010 Executive Summary The goals of this information security policy will be to state the principles and guidelines for protecting the confidentiality, integrity, and availability of sensitive information and resources for XYZ Energy. This policy will set forth requirements for securing the network’s confidential information and data communications infrastructure, in addition to defining detailed policies in the areas of physical security, access control, and network security. Assumptions of the security plan defines physical security at each site for the environment around the network including entry control at each facility, the need and responsibilities of security staff, and issues around security in common areas. Information system security defines workplace protection and guidelines for storage, protection, and maintenance of hardware and network equipment. Access control policies address user enrollment and all network access privileges, along with identification and authentication process policies. Finally, network policies are defined for granting and managing network access while still protecting sensitive company data. Project constraints can include, but are not limited to, availability of resources needed to provide appropriate security for each defined security goal; time restraints for meeting these goals;...

Words: 1790 - Pages: 8