Bob Fabien Zinga

Strategic Leadership | Secure Enterprise IT Business Operations | Project Management

  • Home
  • Résumé
    • Bio
    • USN BIO
    • Linkedin
    • Forbes | Council
    • Microsoft Transcript
  • Blog
    • Current News
    • Cybersecurity
    • IP Officer
    • Safe and Secure Online
    • Campaign Drug Free
  • Contact
    • Book BZ
You are here: Home / Uncategorized / US University to spend $3 million on cyber security after hack attacks

US University to spend $3 million on cyber security after hack attacks

August 30, 2015 By Bob Fabien Zinga Leave a Comment

Rutgers University in New Brunswick is to spend up to $3 million (£1.9 million) on cyber security to prevent hackers crippling the university’s computer networks.

This expensive action is in response to at least four cyber attacks during the 2014-2015 school year that knocked the school offline and resulted in cancelled classes.

According to documentation sourced from the state’s Open Public Records, the flagship state university has hired three cyber security companies that are currently testing the huge computer network used by the university, and looking for vulnerabilities.

The firms that have been hired are:

  • FishNet Security, a major information security company that is privately owned, headquartered in Kansas, and has offices in New York City.
  • Level 3 Communications, a multinational telecommunications and Internet service provider based in Colorado.
  • Imperva, a leading California-headquartered company that specialises in providing data and cyber security products to help combat cyber attack.

For security reasons, campus officials remain mum about exactly what the three firms are doing, but confirm that they are budgeting between $2 and $3 million to ensure that the networks are not crippled again. Since the money is reportedly a “new expense,” the university has had to raise its tuition fees by 2.3 per cent for the new 2015-2016 school year, to pay for cyber protection.

The increase in fees, which translate to around $300 per student per year, was announced mid July at the same time as an announcement that room and board fees are increasing by about 2.6 per cent.

This means that students who opt to live on campus will be paying more than $624 more than they did during the previous school year, depending which campus they are on.

Fees for out-of-state students have been hiked even more, by as much as 4 per cent.

University hack still a mystery

While the senior staff at Rutgers has admitted the university was an easy target for hackers, reports state that the source of the distributed denial-of-services (DDoS) attacks is still a mystery. The worst attack was in April 2015, when professors were forced to cancel classes, and students weren’t able to submit assignments, access wifi for tests, or use their university email.

The Federal Bureau of Investigation (FBI) was called in, but neither they nor the university has commented on the current status of the investigation – or even confirmed whether it is still ongoing. Staff at Rutgers has though stated that the various attacks do seem to be related.

Someone calling themselves Exfocus has claimed responsibility for the cyber attacks, stating he (or she) was paid an hourly rate of $500 via Bitcoin to disrupt the computer networks. However there is no proof that the person is a genuine hacker or whether the claims that were made on social media were just a hoax.

Whether Exfocus was responsible for the attack or not, universities are among the many institutions and high-profile companies being targeted by hackers.

Mid-August the University of Virginia was the target of a cyber attack identified as originating in China. Even though there was no evidence that the attackers had managed to access important personal information of students or employees (like banking information of social security numbers), the university immediately upgraded its cyber security and insisted that everyone accessing the network change their login passwords.

In May Pennsylvania State University disabled its network for three days to enable IT security company, FireEye to improve computer security protocols. The university has not commented on the cyber attacks, but it is understood that the FBI uncovered two cyber attack breaches late 2014 specifically aimed at the College of Engineering. During the security upgrade, two further attacks were uncovered, this time in the College of Liberal Arts network where vulnerabilities were exploited by malware. Like the University of Virginia attacks, the Penn State attacks were identified as originating in China, and no sensitive information was stolen – only usernames and passwords.

Putting the attacks into perspective, and showing just how vulnerable state universities can be, the university did reveal to the media that it had successfully countered more than 22 million cyber attacks a day last year.

“If you’re connected to the Internet these days you are under constant attack,” the university stated. It’s as simple as that.”
Source: http://www.itproportal.com/2015/08/26/us-university-spend-3-million-cyber-security-hack-attacks/

Filed Under: Uncategorized

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

 

Recent Posts

  • Important Links for IP Officers December 14, 2020
  • BUSINESS RULES FOR DOCUMENTING PHYSICAL FITNESS ASSESSMENT (PFA) RESULTS ON PERFORMANCE REPORTS January 9, 2019
  • NAVY MAS Codes January 8, 2019
  • US Naval Officer Designators December 17, 2018
  • Numerical List of Navy Standard Subject Identification codes (SSICs) for Military Personnel and General Administration and management December 17, 2018
  • Navy Ranks and Insignias November 23, 2018
  • Navy Maximum Weight for Height Screening Table November 21, 2018

Recent Comments

  • Bob on NAVY MAS Codes
  • Kimberly Henley-Brown on NAVY MAS Codes
  • Robert Powell on NAVY RFAS Codes

Archives

  • December 2020
  • January 2019
  • December 2018
  • November 2018
  • June 2018
  • October 2017
  • November 2016
  • October 2016
  • June 2016
  • December 2015
  • October 2015
  • September 2015
  • August 2015

Categories

Copyright © 2021 · Silicon Valley Cyber Security Executive · LinkedIn · Forbes | Council