Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Pwned in high ed

929 views

Published on

The web life is a great life, until you get hacked! Do yourself a favor and sit in on this presentation for a web security health check, just for higher education web professionals. See for yourself, the risks associated with the hottest web tools that we all love to use.

Published in: Education, Technology, Design
  • Be the first to comment

  • Be the first to like this

Pwned in high ed

  1. 1. PWNEDInHigher Ed Bryan Fendley University of Arkansas at Monticello Blog: http://bryanfendley.com
  2. 2. We are the most compromised industry
  3. 3. Frequently Stolen Information Alumni Data Student / Faculty Identification Credit Card Information Educational Content
  4. 4. Enablers Cloud Services Insecure Systems Social Media
  5. 5. Stats Malicious attacks in the U.S. are on the rise. They climbed 7% in 2010 85% of all U.S. companies have experienced one or more attacks http://www.bloomberg.com/news/2011-05-13/sony-network-said-to-have-been-invaded-by-hackers-using-amazon-com-server.html
  6. 6. Simple Example Trinity College Dublin discovered a file containing student and information was available to anyone on the college network.http://www.adamdodge.com/esi/archive/2011/04
  7. 7. Whose Been Hacked Lately in Higher Ed? http://www.adamdodge.com/esi/
  8. 8. When Evil Visits Your Website!http://www.smh.com.au/technology/security/evil-hits-university-security-20110118-19vcw.html
  9. 9. Why Would Anyone Even Want to Hack Our Website?http://www.pcworld.com/businesscenter/article/227482/nasa_stanford_websites_hit_by_search_engine_scammers.html
  10. 10. It’s the Clouds Faulthttp://techcrunch.com/2011/06/20/dropbox-security-bug-made-passwords-optional-for-four-hours/
  11. 11. Dependence on Pluginshttp://codex.wordpress.org/Hardening_WordPress
  12. 12. URL Shortnershttp://www.msnbc.msn.com/id/41120117/ns/technology_and_science-security/t/evil-url-shortener-shows-danger-misleading-links/
  13. 13. Social Networkshttp://mashable.com/2011/03/09/chrysler-drops-the-f-bomb-on-twitter/ http://socialmediasecurity.com/
  14. 14. Multiple AuthorsWarning there are images on this website that you may find offensive: http://www.zdnet.com/blog/seo/harvardedu-an-ivy-league-pornographic-playground/2446
  15. 15. But I was Only Exposed for a Short Time http://wayback.archive.org/web/
  16. 16. Arkansas Standards forCyber Security as it Relates to Web http://www.dis.arkansas.gov/policiesStandards/Pages/Standards.aspx http://www.dis.arkansas.gov/security/Pages/CyberSecurityToolkit.aspx http://www.dis.arkansas.gov/security/Pages/ContinuityofOperationsProgram.aspx
  17. 17. Where to Find the Slides or Ask Questions Blog: http://BryanFendley.com Twitter: @bfend Don’t Pretend It Can’t Happen to You!

×