SlideShare a Scribd company logo
Cyberwarfare:
Focusing on
Higher Education
as a Prime Target
Nicholas A. Davis, CISSP, CISA
Chief Information Security Officer
University of Wisconsin System
March 9, 2016
Higher Education
in the United States
Research, both private and
government focused
Openness, the commitment to
learning and freely sharing ideas
Access to third party research
and intellectual property
An easy backdoor into other
organizations
Higher Education
In the United States
Dynamic student demographics,
international students, government
employees, members of the
military
Decentralized governance
structures
High speed networks with massive
capacity to serve as a base to
launch attacks
Strained funding models, in some
Higher Education is a
Lucrative Target
Theft of research for financial gain,
national security benefit, or both
Openness implies an assumption of
good intentions among all who
access the data, not arousing
suspicion
Identity theft at a university can be a
treasure trove, not just for financial
gain
Higher Education is a
Lucrative Target
• Decentralized governance may
lead to decentralized IT
infrastructure, with technology
gaps, enabling cyberattacks
• Lack of funding may leave known
vulnerabilities intact
• Concern about individual right to
privacy impacts IT security
Favored Methods of
Cyberattack Against
Universities
Conduct computer intrusions
Collect sensitive research
Utilize students or visiting professors to
collect information
Spot and recruit students or professors
Send unsolicited email or invitations
Send spies for language and cultural
training, and to establish credentials
Fund or establish programs at a
university
Dr. Reece Roth
University of Tennessee
Despite university warnings on the
restrictions on his research, University of
Tennessee professor Reece Roth employed
a Chinese and an Iranian student to assist in
plasma research
Roth also traveled to China with his laptop
computer containing export-restricted
information and had a sensitive research
paper emailed to him there through a
Chinese professor’s email account
In September 2008, Roth was found guilty
on 18 counts of conspiracy, fraud, and
violating the Arms Export Control Act; he
was later sentenced to four years in prison
Difficult to Change Mindset
of Some in Academia
Quote from Dr. Reece Roth
“I see this interpretation of the export
control act and concern about homeland
security as a deadly threat to free
scholarly inquiry,” he says. “The problems
I worked on in the plasma lab were not
easy problems. They were hard
problems. When anyone who does
research refuses to hire Chinese or
Iranian students, they’re cutting off their
nose to spite their face.”
University of Maryland
Attacker accessed social security
numbers and other personal
information up to 20 years old for
310,000 student, staff, and faculty
Who do you think targeted the
University of Maryland, and why did
they do it?
Knowledge of Identities of
Many Federal Employees
Summary
Higher education ranks as the third
biggest cyberattack target, behind
banks and retail
The nature of the business of
higher education makes it an
attractive and easy target, creating
both motives and opportunities for
cyberattack
Summary
To better prepare for continuous
cyberattacks, universities, in
general, could benefit from:
Newer technologies, such as Cloud
More homogeneous environments
A model which funds cybersecurity
in a manner consistent with the
value of the assets being
protected…………HOWEVER,
Evolving Mindset is Most Critical
For Improving Higher
Education’s Readiness
Contact Information:
Nicholas Davis, CISSP, CISA
Chief Information Security Officer
University of Wisconsin System
Email: ndavis@uwsa.edu
Resource: FBI Whitepaper
Higher Education and National Security: The
Targeting of Sensitive, Proprietary, and Classified
Information on Campuses of Higher Education
https://www.fbi.gov/about-
us/investigate/counterintelligence/higher-education-and-
national-security

More Related Content

Viewers also liked

Comparative Analysis of Higher Education Policy in Large System Countries
Comparative Analysis of Higher Education Policy in Large System CountriesComparative Analysis of Higher Education Policy in Large System Countries
Comparative Analysis of Higher Education Policy in Large System Countries
Luciano Sathler
 
Globalisation and transformation of Higher Education - Indian Experience
Globalisation and transformation of Higher Education - Indian ExperienceGlobalisation and transformation of Higher Education - Indian Experience
Globalisation and transformation of Higher Education - Indian Experience
Ajay Mohan Goel
 
Characteristics and Definition of Professional of Higher Education
Characteristics and Definition of Professional of Higher EducationCharacteristics and Definition of Professional of Higher Education
Characteristics and Definition of Professional of Higher Education
Anthony Fisher Camilleri
 
The future of higher education a constantly moving target (11 key questions)
The future of higher education a constantly moving  target (11 key questions)The future of higher education a constantly moving  target (11 key questions)
The future of higher education a constantly moving target (11 key questions)
@cristobalcobo
 
Education Technology 1 and 2
Education Technology 1 and 2Education Technology 1 and 2
Education Technology 1 and 2
Renalyn Dondoy
 
Education system in pakistan
Education system in pakistanEducation system in pakistan
Education system in pakistan
Mubeen Ahmed
 
EDUCATIONAL TECHNOLOGY And EDUCATIONAL MEDIA
EDUCATIONAL TECHNOLOGY And EDUCATIONAL MEDIAEDUCATIONAL TECHNOLOGY And EDUCATIONAL MEDIA
EDUCATIONAL TECHNOLOGY And EDUCATIONAL MEDIA
Carla Gomez
 
Education systems in pakistan
Education systems in  pakistanEducation systems in  pakistan
Education systems in pakistanAnum Malik
 
role and function of an educational media center
role and function of an educational media centerrole and function of an educational media center
role and function of an educational media centerJM Benedicto
 
Education system in pakistan
Education system in pakistan Education system in pakistan
Education system in pakistan
Mohammad Younus
 
Education in-pakistan
Education in-pakistanEducation in-pakistan
Education in-pakistanHumayoun Aziz
 
Impact of technology on education
Impact of technology on educationImpact of technology on education
Impact of technology on education
Max Inder
 

Viewers also liked (12)

Comparative Analysis of Higher Education Policy in Large System Countries
Comparative Analysis of Higher Education Policy in Large System CountriesComparative Analysis of Higher Education Policy in Large System Countries
Comparative Analysis of Higher Education Policy in Large System Countries
 
Globalisation and transformation of Higher Education - Indian Experience
Globalisation and transformation of Higher Education - Indian ExperienceGlobalisation and transformation of Higher Education - Indian Experience
Globalisation and transformation of Higher Education - Indian Experience
 
Characteristics and Definition of Professional of Higher Education
Characteristics and Definition of Professional of Higher EducationCharacteristics and Definition of Professional of Higher Education
Characteristics and Definition of Professional of Higher Education
 
The future of higher education a constantly moving target (11 key questions)
The future of higher education a constantly moving  target (11 key questions)The future of higher education a constantly moving  target (11 key questions)
The future of higher education a constantly moving target (11 key questions)
 
Education Technology 1 and 2
Education Technology 1 and 2Education Technology 1 and 2
Education Technology 1 and 2
 
Education system in pakistan
Education system in pakistanEducation system in pakistan
Education system in pakistan
 
EDUCATIONAL TECHNOLOGY And EDUCATIONAL MEDIA
EDUCATIONAL TECHNOLOGY And EDUCATIONAL MEDIAEDUCATIONAL TECHNOLOGY And EDUCATIONAL MEDIA
EDUCATIONAL TECHNOLOGY And EDUCATIONAL MEDIA
 
Education systems in pakistan
Education systems in  pakistanEducation systems in  pakistan
Education systems in pakistan
 
role and function of an educational media center
role and function of an educational media centerrole and function of an educational media center
role and function of an educational media center
 
Education system in pakistan
Education system in pakistan Education system in pakistan
Education system in pakistan
 
Education in-pakistan
Education in-pakistanEducation in-pakistan
Education in-pakistan
 
Impact of technology on education
Impact of technology on educationImpact of technology on education
Impact of technology on education
 

Similar to Cyberwarfare focusing on higher education as a prime target

Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...
MajedahAlkharji
 
Ilkka Turunen: Challenges and possibilities in networking in the US
Ilkka Turunen: Challenges and possibilities in networking in the USIlkka Turunen: Challenges and possibilities in networking in the US
Ilkka Turunen: Challenges and possibilities in networking in the US
THL
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
simba35
 
Read the Case Study at the end of Chapter 7. Perform the following a.docx
Read the Case Study at the end of Chapter 7. Perform the following a.docxRead the Case Study at the end of Chapter 7. Perform the following a.docx
Read the Case Study at the end of Chapter 7. Perform the following a.docx
niraj57
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
MajedahAlkharji
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher Education
Rapid7
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
AIRCC Publishing Corporation
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
ijcsit
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
IJCNCJournal
 
ACADEMIC HONESTY POLICY IN HIGHER EDUCATION AN ETHICAL DILEMMA OF PLAGIARISM...
ACADEMIC HONESTY POLICY IN HIGHER EDUCATION  AN ETHICAL DILEMMA OF PLAGIARISM...ACADEMIC HONESTY POLICY IN HIGHER EDUCATION  AN ETHICAL DILEMMA OF PLAGIARISM...
ACADEMIC HONESTY POLICY IN HIGHER EDUCATION AN ETHICAL DILEMMA OF PLAGIARISM...
Courtney Esco
 
Wandschneider ischool symposium
Wandschneider ischool symposiumWandschneider ischool symposium
Wandschneider ischool symposium
Stephen Abram
 
Massachusetts Cyber Security Ecosystem
Massachusetts Cyber Security EcosystemMassachusetts Cyber Security Ecosystem
Massachusetts Cyber Security Ecosystem
Brett Campbell
 
Academic Dishonesty A Preliminary Researchers View
Academic Dishonesty  A Preliminary Researchers ViewAcademic Dishonesty  A Preliminary Researchers View
Academic Dishonesty A Preliminary Researchers View
Leslie Schulte
 
College Cheating Immaturity, Lack of Commitment, and the Neut.docx
College Cheating Immaturity, Lack of Commitment, and the Neut.docxCollege Cheating Immaturity, Lack of Commitment, and the Neut.docx
College Cheating Immaturity, Lack of Commitment, and the Neut.docx
monicafrancis71118
 
Strategic informer spring 2012
Strategic informer spring 2012Strategic informer spring 2012
Strategic informer spring 2012IBCworld
 
Strategic Informer Spring 2012
Strategic Informer Spring 2012Strategic Informer Spring 2012
Strategic Informer Spring 2012
Matt Pedersen
 
Journal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docxJournal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docx
tawnyataylor528
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
Willy Marroquin (WillyDevNET)
 

Similar to Cyberwarfare focusing on higher education as a prime target (20)

Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...Key findings from information security survey at higher education institution...
Key findings from information security survey at higher education institution...
 
Ilkka Turunen: Challenges and possibilities in networking in the US
Ilkka Turunen: Challenges and possibilities in networking in the USIlkka Turunen: Challenges and possibilities in networking in the US
Ilkka Turunen: Challenges and possibilities in networking in the US
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
 
February Ed Report[4]-Chanel
February Ed Report[4]-ChanelFebruary Ed Report[4]-Chanel
February Ed Report[4]-Chanel
 
Read the Case Study at the end of Chapter 7. Perform the following a.docx
Read the Case Study at the end of Chapter 7. Perform the following a.docxRead the Case Study at the end of Chapter 7. Perform the following a.docx
Read the Case Study at the end of Chapter 7. Perform the following a.docx
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher Education
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
ACADEMIC HONESTY POLICY IN HIGHER EDUCATION AN ETHICAL DILEMMA OF PLAGIARISM...
ACADEMIC HONESTY POLICY IN HIGHER EDUCATION  AN ETHICAL DILEMMA OF PLAGIARISM...ACADEMIC HONESTY POLICY IN HIGHER EDUCATION  AN ETHICAL DILEMMA OF PLAGIARISM...
ACADEMIC HONESTY POLICY IN HIGHER EDUCATION AN ETHICAL DILEMMA OF PLAGIARISM...
 
Wandschneider ischool symposium
Wandschneider ischool symposiumWandschneider ischool symposium
Wandschneider ischool symposium
 
ISACA UW Handbook 2016
ISACA UW Handbook 2016ISACA UW Handbook 2016
ISACA UW Handbook 2016
 
Massachusetts Cyber Security Ecosystem
Massachusetts Cyber Security EcosystemMassachusetts Cyber Security Ecosystem
Massachusetts Cyber Security Ecosystem
 
Academic Dishonesty A Preliminary Researchers View
Academic Dishonesty  A Preliminary Researchers ViewAcademic Dishonesty  A Preliminary Researchers View
Academic Dishonesty A Preliminary Researchers View
 
College Cheating Immaturity, Lack of Commitment, and the Neut.docx
College Cheating Immaturity, Lack of Commitment, and the Neut.docxCollege Cheating Immaturity, Lack of Commitment, and the Neut.docx
College Cheating Immaturity, Lack of Commitment, and the Neut.docx
 
Strategic informer spring 2012
Strategic informer spring 2012Strategic informer spring 2012
Strategic informer spring 2012
 
Strategic Informer Spring 2012
Strategic Informer Spring 2012Strategic Informer Spring 2012
Strategic Informer Spring 2012
 
Journal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docxJournal of Information Technology Education Volume 11, 2012 .docx
Journal of Information Technology Education Volume 11, 2012 .docx
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
 

More from Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
Nicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
Nicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
Nicholas Davis
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
Nicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
Nicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
Nicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
Nicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
Nicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
Nicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
Nicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
Nicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
Nicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
Nicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
Nicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Nicholas Davis
 

More from Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 

Recently uploaded

Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 

Recently uploaded (20)

Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 

Cyberwarfare focusing on higher education as a prime target

  • 1. Cyberwarfare: Focusing on Higher Education as a Prime Target Nicholas A. Davis, CISSP, CISA Chief Information Security Officer University of Wisconsin System March 9, 2016
  • 2. Higher Education in the United States Research, both private and government focused Openness, the commitment to learning and freely sharing ideas Access to third party research and intellectual property An easy backdoor into other organizations
  • 3. Higher Education In the United States Dynamic student demographics, international students, government employees, members of the military Decentralized governance structures High speed networks with massive capacity to serve as a base to launch attacks Strained funding models, in some
  • 4. Higher Education is a Lucrative Target Theft of research for financial gain, national security benefit, or both Openness implies an assumption of good intentions among all who access the data, not arousing suspicion Identity theft at a university can be a treasure trove, not just for financial gain
  • 5. Higher Education is a Lucrative Target • Decentralized governance may lead to decentralized IT infrastructure, with technology gaps, enabling cyberattacks • Lack of funding may leave known vulnerabilities intact • Concern about individual right to privacy impacts IT security
  • 6. Favored Methods of Cyberattack Against Universities Conduct computer intrusions Collect sensitive research Utilize students or visiting professors to collect information Spot and recruit students or professors Send unsolicited email or invitations Send spies for language and cultural training, and to establish credentials Fund or establish programs at a university
  • 7. Dr. Reece Roth University of Tennessee Despite university warnings on the restrictions on his research, University of Tennessee professor Reece Roth employed a Chinese and an Iranian student to assist in plasma research Roth also traveled to China with his laptop computer containing export-restricted information and had a sensitive research paper emailed to him there through a Chinese professor’s email account In September 2008, Roth was found guilty on 18 counts of conspiracy, fraud, and violating the Arms Export Control Act; he was later sentenced to four years in prison
  • 8. Difficult to Change Mindset of Some in Academia Quote from Dr. Reece Roth “I see this interpretation of the export control act and concern about homeland security as a deadly threat to free scholarly inquiry,” he says. “The problems I worked on in the plasma lab were not easy problems. They were hard problems. When anyone who does research refuses to hire Chinese or Iranian students, they’re cutting off their nose to spite their face.”
  • 9. University of Maryland Attacker accessed social security numbers and other personal information up to 20 years old for 310,000 student, staff, and faculty Who do you think targeted the University of Maryland, and why did they do it?
  • 10. Knowledge of Identities of Many Federal Employees
  • 11. Summary Higher education ranks as the third biggest cyberattack target, behind banks and retail The nature of the business of higher education makes it an attractive and easy target, creating both motives and opportunities for cyberattack
  • 12. Summary To better prepare for continuous cyberattacks, universities, in general, could benefit from: Newer technologies, such as Cloud More homogeneous environments A model which funds cybersecurity in a manner consistent with the value of the assets being protected…………HOWEVER,
  • 13. Evolving Mindset is Most Critical For Improving Higher Education’s Readiness
  • 14. Contact Information: Nicholas Davis, CISSP, CISA Chief Information Security Officer University of Wisconsin System Email: ndavis@uwsa.edu Resource: FBI Whitepaper Higher Education and National Security: The Targeting of Sensitive, Proprietary, and Classified Information on Campuses of Higher Education https://www.fbi.gov/about- us/investigate/counterintelligence/higher-education-and- national-security