Lessons In Campus Cybersecurity

  /     /     /  
Publicated : 22/11/2024   Category : security


Lessons In Campus Cybersecurity


What universities are doing -- and should be doing -- in response to increased cyberthreats, and how students can protect their suddenly very valuable IDs



The University of Nebraska had just deployed a new security information event management (SIEM) system when an undergraduate student there apparently broke into the schools student information system, exposing sensitive information of 654,000 students, alumni, and employees.
While the breach was a serious one that is still under investigation, Nebraska was actually better off in the end than most universities that get hacked. An IT staffer detected an error message in one of the universitys systems at 10 p.m. on a Wednesday evening in May, and began to escalate the issue, bringing in the security team, which investigated the activity and monitored some suspicious behavior throughout the night.
By that next afternoon, we had figured out what had happened, says Joshua Mauk, information security officer for the University of Nebraska. An insider
had accessed the universitys PeopleSoft-based database
.
Mauk says the university used logs from all of its database, applications, network, and security tools -- including the SIEM -- to piece together a picture of the breach within 48 hours of its occurrence. That [let us] provide enough information to the police for them to execute warrants to confiscate the person of interests computing equipment that may have been used in the breach, he says. We used this data and more to conduct a more detailed analysis, with the assistance of an external security firm, to produce a summary and timeline of what we believe the attacker did.
Having the summary and timeline was crucial. It allowed us to understand how the breach occurred, what data was at risk and for how long, what data may have been accessed, if any, and where to focus our remediation plans, Mauk says. Just what the alleged undergrad hacker intended to do with those Social Security numbers and other data has not been revealed, but identity information is a hot commodity among cybercriminals outside the campus, as well.
Other universities could learn from Nebraskas breach experience. College students have become juicy targets for cybercriminals -- theyre newly independent, setting up bank and credit-card accounts, and living in a relaxed, open society -- not to mention that their new home-away-from-home universities are prime targets in data breaches, exposing personal information on students, alumni, staff, and faculty.
The cycle of university information exposure continues, but sometimes its human error: The University of Rhode Island
revealed this week
that a server with SSNs and other personal data on students, faculty, and staff was inadvertently place on a publicly shared server that exposed that information online, according to an Associated Press report.
With the fall semester under way on most campuses, college students face more than just the logistics of move-in day and signing up for classes, but also some disturbing data: According to the Better Business Bureau, college students account for one-fourth of all identity theft victims in the U.S. And it can take months for them to learn that their identities have been stolen -- around 132 days, according to Javelin Strategy & Research.
Its easier to think of a university as a small city thats an employer, has its own police force, and has as many people as many small towns in America, says Aaron Massey, a postdoctoral fellow in the School Of Interactive Computing at Georgia Tech. A university has whole bunch of other concerns that are going to be important, period. Its not just ID theft, its [also things like] illegally downloaded [content] to university servers, for example, he says.
Despite all the gloom-and-doom about universities being in the bulls eye for cybercrime or even insider attacks like Nebraskas, most are being more proactive now in getting students better schooled on how to better protect their information and identities. Most have some level of training there. The problem is, from an electronic credit view, its just one more thing [for students] to be trained on. Its overwhelming, all of the things they have to orient to: wheres the library, where they eat, how they get their laundry done ... Electronic credit protection is just one more thing on the list, Massey says.
At Masseys alma mater Purdue University, for instance, students are retrained in data and information protection every semester. Universities are doing the best they can here, he says.
Students are prime targets because they are now out on their own in a seemingly sheltered environment, says Steve Coggeshall, chief technology officer at ID Analytics. Theyre opening up new financial accounts for the first time, and they really dont have the habits or knowledge of how they should protect their personal information, Coggeshall says. And they tend to live in high-density areas, with roommates and lots of traffic coming through their personal areas.
Todays students also have grown up on Facebook and other social media, and are used to sharing personal information publicly, he says.
[ Basketball has March Madness, but higher ed IT should be competing to stay out of the brackets for last years worst breaches. See
Slide Show: The (Not-So) Elite Eight In Higher Ed Breach Madness
. ]
While there are some measures students can take to lock down their information (
see 5 Tips For College Kids To Avoid ID Theft, next page
), its up to universities to better protect their databases from insider and outsider threats. Here are some tips from the experts on just what universities can do:
1. Have an incident response (IR) plan in hand.
Nebraskas Mauk says one lifesaver for him during the breach investigation there was having an established IR plan. I carried that with me pretty much the whole time, he says. [I had] a well-documented and thought-out plan on how to make decisions [in the aftermath of a breach], who is making the decisions, when and who to notify and how.
And be sure to loop in legal and public relations in the IR plan. Those individuals are key to being able to make decisions, he says.
2. Limit user access to only what they need to do their jobs.
What users feel they need to do their jobs and what they actually need can be quite different, says Paul Kenyon, co-founder and COO of Avecto, a Windows privilege management provider. That can be quite a wide gap, Kenyon says.
Because they are basically open environments, universities tend to buck at limiting user privileges, he says. We often see resistance to limiting privileges in that world ... even though it makes a dramatic impact on security to do so, he says. We always recommend minimizing exposure by minimizing the privileges in terms of systems they are accessing.
In Windows, that means setting user access control to high and employing application whitelisting. And ensure end users are logging onto their machines as a standard user, he says.
Nebraskas Mauk cant provide details of just what adjustments or changes the university made in the wake of the attack, but he says hes looking at how to handle trusted users on the network since the attacker was an insider who abused his access. So we are really looking at how we treat individuals we trust on our network. We have controls to protect us from outside [attackers], but its a little harder to apply the same level of controls to a trusted user, he says.
3. Understand your network and systems monitoring capabilities.
Having a SIEM and proper logging helped Nebraska spot its breach relatively quickly. We realized what was happening and shut the attacker out, Mauk says.
Mauk recommends collecting as much data as possible at the start of the investigation and to get that information to the authorities as soon as possible. Understand what information you can pull out of the logs, he says.
Next: Segmentation and student tips

4. Segment campus systems.
Universities are divided into the business side, the academic side, and, in some cases, the research side, so those networks and systems should be compartmentalized as such.
One thing were going to look at is more, proper segmentation across all of our campuses, Nebraskas Mauk says. That would mean keeping the business systems separate from the academic systems and student life, for example, he says.
Proper security between those segments [poses] larger challenges, he says. Universities were not built that way 10 to 15 years ago.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Lessons In Campus Cybersecurity