default avatar
Welcome to the site! Login or Signup below.
|
||
Logout|My Dashboard

Hackers can target University, student systems

Print
Font Size:
Default font size
Larger font size

Posted: Wednesday, November 20, 2013 10:17 pm | Updated: 12:39 am, Fri Nov 22, 2013.

Today’s world is driven by computers, but when systems are attacked or damaged, nothing works right.

While many different types of hackers exist, one of the most common types of hackers creates viruses. Using a virus is the more traditional way of hacking a computer. Once the virus is introduced to a system, it can compromise data and harm a system.

But other ways of hacking include more detail and planning.

“There are different stages of a hacking attempt,” Matt Haschack, the director of IT Security and Infrastructure said. “There’s the reconnaissance phase . . . I wanted you to break into a house somewhere on Wooster Street and you’re not familiar with Wooster Street. So, the first thing you do is walk by. You’re going to look at the house and see what’s available . . . Hackers do the same thing.”

While hacking threatens secure information for people, businesses and the government, hacking is thought about differently by students.

“I sure do wish I was smart enough to be a computer hacker,” said James Jacobs.

While the thought of hacking may be different in the eyes of those not protecting systems, a lot of effort is put into attacking a system.

In order to hack a system, hackers have various stages they use in order to attack. Their first stage is to do reconnaissance. During this stage, hackers check for weak points and entrance points in a system.

Once hackers can get into the system, hackers go for the Zero Day Attack, where they hack the systems and exploit what weaknesses are there.

While the city does get hacking attempts from all around the globe from countries such as Russia, China or Ukraine, there has never been a successful hacking attempt on the city, said Dave McDonald, the city IT Manager.

The hacking attempts that do go through the city are normally through email ‑ 90 percent of the emails coming in carry viruses. Ten percent of emails coming into the city are harmless.

“Direct hacking attempts to get into the city are blocked by software in the firewall,” McDonald said.

We can’t put a number to how many attacks the University gets a day, Haschack said.

While the University cannot put a number of attacks it encounters daily, the University does have ways to handle hacking attempts.

Through the University’s firewall, the system takes note of who it is, along with the IP address to prevent future attacks.

Computers that are owned and managed by the University that have restricted use are treated as “hacked computers” if the systems have been attacked. But general use computers are investigated very little, since there aren’t enough resources to do a full investigation, Haschack said.

Students can also protect their own systems from being hacked.

This semester, 200 student systems have been attacked, but that number has gone down from the past couple of years, Haschack said.

While students are more aware of threats to their system, the culture of computer security has improved too.

“Along with antiviruses that will tell you if something is wrong with your system, companies like Microsoft and Apple have improved their security and have updating security patches that fix problems,” Haschack said. “But while there are ways to prevent viruses and hackers, hackers know traditional ways of compromising a system.”

A way a student can protect their system is to not run a computer as the administrator, but as a normal user, Haschack said. Web browsing through programs such as Internet Explorer, Google Chrome, Firefox and Safari can threaten the security of an operating system.

Haschack offers helpful suggestions to students that can help them protect their systems.

Links bring in codes that run to load a webpage, offering a place for a virus to be hidden. Most people run their computers as the administrator, meaning the virus can run without the system asking for permission to do so, but by using the computer as a normal user, the virus has to prompt the user in order to be run.

More about

More about

  • Discuss

Rules of Conduct

  • 1 Keep it Clean. Please avoid obscene, vulgar, lewd, racist or sexually-oriented language.
  • 2 Don't Threaten or Abuse. Threats of harming another person will not be tolerated. AND PLEASE TURN OFF CAPS LOCK.
  • 3 Be Truthful. Don't knowingly lie about anyone or anything.
  • 4 Be Nice. No racism, sexism or any sort of -ism that is degrading to another person.
  • 5 Be Proactive. Use the 'Report' link on each comment to let us know of abusive posts.
  • 6 Share with Us. We'd love to hear eyewitness accounts, the history behind an article.

Welcome to the discussion.

1 comment:

  • lishevita posted at 10:43 pm on Fri, Nov 22, 2013.

    lishevita Posts: 0

    "While many different types of hackers exist, one of the most common types of hackers creates viruses. "

    Oh, geez, NO! First off, the most common types of hackers on non-malicious people who make cool things. Hacking is about overcoming obstacles in clever ways, and most of us like to do that with code, but we also hardware hack, hack our communities and hack our bodies. Ever altered a piece of furniture from Ikea to fit your needs? You are a furniture hacker.

    If you start from randomized and misplaced fear, you've already given away your power.

    As for students who want to be "hackers" in the sense of people who can break into boxes, you should encourage them, not discourage them. Take the excitement and redirect it, because there are tons of high paying jobs in the security sector. Security professionals need to know how to break things before they can protect them, which is why governments, including the US, run hacking competitions.

     

Follow us on Facebook