This page contains a Flash digital edition of a book.
Cybersecurity. Convenience.
Human error. Inexperienced network liferation of applications used by students is tions, VoIP and messaging are not threats
administrators or others who have admin- nonetheless a challenge for security directors. themselves, yet they pose risks to enterprise
istrative privileges can, often without even Sheldon Malm, senior director of security networks. Palo Alto Networks analyzed
realizing it, leave databases open. In such strategy for Rapid 7, says rich internet appli- 255 Enterprise 2.0 applications. Of them,
cases a bad guy need not hack his way in; cations move tasks from secure servers to 70 percent are capable of transferring files;
just search with impunity. A researcher— “clients” and back with little user awareness. 64 percent have known vulnerabilities; 28
not a hacker—at Dartmouth found sche- Vulnerabilities are created in the name of user percent are known to propagate malware;
matics for Marine 1 (the President’s heli- convenience and customer satisfaction. and 16 percent can tunnel other applica-
copter) and the First Lady’s safe houses in Students themselves pose problems. De- tions. Examples of new threats introduced
Washington simply by searching. spite being technologically adept, they are to enterprise networks by applications such
often naïve about the risks they take. For as Facebook include Koobface, Fbaction
are campuses particularly vulnerable? example, they open attachments or links on and Boface, each of which can hijack ac-
Not necessarily. Virginia Rezmierski, direc- social network sites without really knowing counts and personal data.
tor of policy development and education the “friend” who sent them. Or they pick
at the University of Michigan, was the lead up a thumb drive lying around a student What’s the fallout?
researcher on the Computer Incident Factor lounge and insert it into their laptop. The A lot of law suits, right? Wrong. Accord-
Analysis and Categorization (CIFAC) proj- drive might have been that of a forgetful ing to Frank Vinik of United Educators,
ect. CIFAC collected security incident data student. Or it might have been intentionally the institution-owned insurance company,
from colleges and universities to identify the left by a bad guy, expecting someone to pick just one suit has been brought over a data
nature of the incidents and the action taken. it up, and inadvertently trigger an auto-run breach—and that suit was unsuccessful.
This data was later compared to security inci- executable to a malicious website. As soon However, he cautions that no suit does
dents in the business sector. Campuses were as the student logs on to the university net- not equate to no loss. There is the hard-to-
found to be no more or less vulnerable. work, the malware infects it. determine, but nonetheless costly, loss of
The increase in the number, and more Business-enabling applications like trust. Negative publicity and the resulting
importantly the types of devices, and the pro- social networking, collaborative applica- damage to an institution’s reputation can
AD-067 Todays Campus_half 12/1/09 9:53 AM Page 1
USA Funds Life Skills — Financial literacy and
time management for college students.
USA Funds® Life Skills® gives you the tools to teach your students how to manage their finances and time while
they pursue their degrees and after graduation. Our online curriculum addresses the following topics:
u
Financial aid and paying for college.
u
Preparing for life after college.
u
School and personal life management.
u
Personal finance for graduate, medical and
u
Credit management. married students.
Visit www.usafunds.org to learn more about USA Funds Life Skills and see how it can help make a difference on
your campus.
© 2009 United Student Aid Funds, Inc. All rights reserved.
subscribe at no charge at www.todayscampus.com
T
oday’s
C
ampus
25
Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68
Produced with Yudu - www.yudu.com