Pwned in high ed

713
-1

Published on

The web life is a great life, until you get hacked! Do yourself a favor and sit in on this presentation for a web security health check, just for higher education web professionals. See for yourself, the risks associated with the hottest web tools that we all love to use.

Published in: Education, Technology, Design
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
713
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Pwned in high ed

  1. 1. PWNEDInHigher Ed Bryan Fendley University of Arkansas at Monticello Blog: http://bryanfendley.com
  2. 2. We are the most compromised industry
  3. 3. Frequently Stolen Information Alumni Data Student / Faculty Identification Credit Card Information Educational Content
  4. 4. Enablers Cloud Services Insecure Systems Social Media
  5. 5. Stats Malicious attacks in the U.S. are on the rise. They climbed 7% in 2010 85% of all U.S. companies have experienced one or more attacks http://www.bloomberg.com/news/2011-05-13/sony-network-said-to-have-been-invaded-by-hackers-using-amazon-com-server.html
  6. 6. Simple Example Trinity College Dublin discovered a file containing student and information was available to anyone on the college network.http://www.adamdodge.com/esi/archive/2011/04
  7. 7. Whose Been Hacked Lately in Higher Ed? http://www.adamdodge.com/esi/
  8. 8. When Evil Visits Your Website!http://www.smh.com.au/technology/security/evil-hits-university-security-20110118-19vcw.html
  9. 9. Why Would Anyone Even Want to Hack Our Website?http://www.pcworld.com/businesscenter/article/227482/nasa_stanford_websites_hit_by_search_engine_scammers.html
  10. 10. It’s the Clouds Faulthttp://techcrunch.com/2011/06/20/dropbox-security-bug-made-passwords-optional-for-four-hours/
  11. 11. Dependence on Pluginshttp://codex.wordpress.org/Hardening_WordPress
  12. 12. URL Shortnershttp://www.msnbc.msn.com/id/41120117/ns/technology_and_science-security/t/evil-url-shortener-shows-danger-misleading-links/
  13. 13. Social Networkshttp://mashable.com/2011/03/09/chrysler-drops-the-f-bomb-on-twitter/ http://socialmediasecurity.com/
  14. 14. Multiple AuthorsWarning there are images on this website that you may find offensive: http://www.zdnet.com/blog/seo/harvardedu-an-ivy-league-pornographic-playground/2446
  15. 15. But I was Only Exposed for a Short Time http://wayback.archive.org/web/
  16. 16. Arkansas Standards forCyber Security as it Relates to Web http://www.dis.arkansas.gov/policiesStandards/Pages/Standards.aspx http://www.dis.arkansas.gov/security/Pages/CyberSecurityToolkit.aspx http://www.dis.arkansas.gov/security/Pages/ContinuityofOperationsProgram.aspx
  17. 17. Where to Find the Slides or Ask Questions Blog: http://BryanFendley.com Twitter: @bfend Don’t Pretend It Can’t Happen to You!

×