Tuesday, June 11, 2019

Chief Information Security Officer Term Paper Example | Topics and Well Written Essays - 2000 words

Chief Information Security Officer - Term Paper ExampleThe repercussions of these break downes are felt by multiple parties including the administrative staff, the university itself, the IT department and the student body. It is therefore, imperative for higher education institutions to familiarize themselves with the constantly changing threats besides the high cost associated with leaving data and systems unprotected. Introduction computing machine system hacks and data breaches with higher education institutions as the main target are constantly dominating the headlines. The higher education institutions are increasingly at high risk having their culture and data compromised by malicious activities and hackers beside insider mistakes. The considerable number of system hacks and data breaches experienced by higher educational institutions behind be attributed to such factors as resource plague issues experienced by IT department within the institutions, budgetary constraints an d desperate database systems among other factors (Gahm, 2010). Higher educational institutions posses a considerable amount of data and distinct data type which make them a potential target by malicious attackers and hackers. A wealth of in person identifiable information is mostly stored by these institutions thus the high risk of data breaches and system hacks. A health record of students, employees and parents together with their names, social auspices numbers and credit card numbers are among the sensitive information that subject these institutions to potential threats and makes them a valuable target to the hackers. (Gahm, 2010) According to Gahm, Higher educational institutions should learn to take actions besides implementing proactive security to their database infrastructure in order to protect the critical information contained in their database systems. These database systems house a soma of information that can be exploited for financial gain. Given that the instituti ons databases are the most critical repository of confidential and sensitive information at these institutions, safeguarding the database is of the essence (2010). Recent hack attacks against higher educational institutions Some of the top and best universities around the world had recently been reported to have fall victim of computer system hack and data breaches. Team GhostShell, a hacking group claimed to have hacked into the servers of close to a hundred universities across the globe including Harvard, University of Pennsylvania, Stanford and University of Michigan. tight-fitting to 120,000 records were introductioned from the breached universities servers and publicly posted. Critical and confidential information such as the names, phone numbers, log in details and email addresses were among the records exposed in the event of the breaches. The reports tho showed that the hackers used malware injection into the servers in order to compromise their security and gain access t o the records. The log-in credentials exposed were further used to improperly access some of the universities websites including Stanford University. Another data breach incident involving Western Connecticut State University was reported and blamed on the vulnerabilities existing on their computer systems. The breach utilized the existing vulnerabilities in the system and inappropriately accessed and exposed confidential inf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.