College Security Risks

Improved Essays
As a security analyst in the Information technology environment at the Aim Higher College, I have seen many attacks from the hackers that attempt to steal the sensitive data of the college and expose it to the whole world or alter it in some way. I have seen the many threats that have existed on the college’s data and systems at one point. Furthermore, I discovered many vulnerabilities in college’s systems, I captured them before the intruders can get their hands on them and make an effort to exploit the vulnerabilities. Moreover, I gave many suggestions on how to fix and secure on many issues that were affecting the college’s network and systems. The malware threats that I saw on the campus systems stunned me when I ran an anti-virus protection …show more content…
I used two scanning tools called Zenmap and OpenVAS that are free to the public, so anyone can use them even a hacker to scan anything that he or she wants to with just an IP address. In addition, the hacker can exploit these vulnerabilities on these systems and do some serious amount of damage to the college’s security. The results that I got back from the Zenmap scan were many open ports, such as one them being port number twenty-three, which runs a service called Telnet, it is used to enable a user to connect to a remote host using a Telnet client. If this port stays open, then hacker just need to access the port and brute-force the user’s username and password then they will have access to your whole machine. Furthermore, I found port number one thousand ninety-nine was open, this service is called Remote Administration Tool and this port could be used by hackers to produce Trojans by performing remote access to the tool crafting packets and requests upon the college’s server to infect all systems on campus. On the results of the OpenVAS scan there were many high severity vulnerabilities that can create tons of attacks towards the campuses database systems. I found a vulnerability named distcc that was found on port number three thousand thirty-two and when this is not configured properly to restrict access to the server port it will allow many remote hackers to execute arbitrary code and will execute by the server without any authorization checks. Another found open port was from the FTP port twenty-one it is a vsftpd backdoor vulnerability that can affect the source package of the application, but on this port, there is also a proFTPD server vulnerability that attacker can security bypass an authentication point because the application fails to validate the domain name in a signed certificate

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Describe 3 ways a hacker can try to intrude a system. To protect from unwanted intrusion, viruses or hacking, we should consider the following points: Antivirus protection: This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Having control over users passwords and access to network locations can help keep a network secure. The other issue that the lab set up is exceptions. Exception are an issue in our lab environment because if a user is trying to ftp and they want to use port 1000 the system wont know how to handle it. This is important because if a hacker tries to connect to the network and notices that the system can only use port 80 for the web server it gives the attacker more information about your network. A…

    • 604 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Another type of security event or baseline anomalie could be the increased network traffic which could indicate an unauthorized server, software, or potential malware. Shareware installed on a client device is a perfect example where network traffic could increase when downloading electric content onto a corporate network that could potentially be infected with malware. Shareware also opens up the device to sharing its data to the outside world potentially leaking propriatry and confidential data. Monitoring network bandwidth, closing firewall ports, and removing local administrator rights are a few ways to remediate shareware activity. Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Physical access control, audit review: Unauthorized access to sensitive facilities could occur without challenge, during which time a malicious party may directly connect to the supervisory control and data acquisition (SCADA) system and potentially set up a more permanent and remote connection for ongoing unauthorized access at a later time. Physical access to organizational facilities is a security vulnerability if not control as unauthorized personnel may access critical or sensitive areas. 5. Audit review, analysis and reporting: Without formalized review and validation of logs, unauthorized users, applications, or other unauthorized events may be present in the system and operate in the industrial control systems network without detection. 6.…

    • 301 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    To understand how I need to proceed with my chosen solution to the problem experienced by the Wayward Pines Public Library, I must first identify the current state of the computer at the library and then decided on the best methodology to accomplish my chosen solution. There is a total of 16 public access computers at the library which is for the specific use by library patrons to access the internet and the online card catalog. These 16 machines are set up in a secluded area of the library not far from the information and circulation desk. The computer area is a collection of small computer tables, and the tables are arranged in groups of four and resemble a square, with two tables next to each other and two table opposite.…

    • 1106 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Healthcare Overview This industry is vulnerable in many different facets, the main one being private health information (PHI). This type of information is protected by the Health Insurance Portability and Accountability Act, more commonly known as HIPAA, which sets the national standard for how the information is handled. HIPAA makes it imperative for healthcare organizations to meet these aforementioned standards. PricewaterhouseCoopers (PwC) made cyber security as one of the key issues facing the healthcare industry in 2016.…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    If this flow is manipulated, there can be vulnerabilities for unauthorised entries, bringing in malware or other harmful or unwanted data. Method: Within the lab, we employed the command prompt to discover connection…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The Security and Confidentiality policy is an important policy not just for the business but for students too as anything that disobeys orders can risk the safety of student accounts that actually hold personal information and student resources such as the shared area, if this gets corrupted then the college will face losing valuable lesson plans that have taken a long while to plan. As a college is a busy place, there is an increase chance of an intruder coming in and hacking systems to expose private information (college network) that are held on the server systems or another way by using a student’s account to plant malware, viruses or other threats through open workstations. The Data Protection Act says that no data should be leaked to…

    • 403 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    From the time I was very young I had my future planned out. My major and career have changed a few times since then. I am now planning on studying athletic training in college and becoming an athletic trainer. I have researched the University of Georgia, Georgia College and State University, Mercer University, and University of North Georgia and have also gone over their positives and negatives. University of Georgia has many great aspects and very few negatives.…

    • 1162 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Campus Safety: An Annotated Bibliography Bagenstos, Samuel R. " What went wrong with Title IX?" Washington Monthly Sept.-Oct.…

    • 1020 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Safe College Students

    • 159 Words
    • 1 Pages

    Many people suggest that college campuses are safe learning environments for college students. The communities in which colleges are located experience a high rate of violent crimes which carry over on to the campus. Many college students have experienced a criminal event or crime while in college (Flannery & Quinn-Leering, 2000). The authors suggested that the traditional college students experienced violent behavior during their freshman and sophomore years on campus. Important research has shown that most literature relevant to this topic is in the form of peer review journals, which include both quantitative and qualitative data.…

    • 159 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    SQL Injection Attacks

    • 1338 Words
    • 6 Pages

    The websites attacked were from NASA’s Instrument Systems and Technology Division and its Software Engineering Division. Gunter Ollmann, Vice-President of Research at Security Company Damballa, stated that the attacker went by the alias “c0de.breaker” and exploited NASA’s poorly secured access controls in order to execute his/her SQL injection (Hacker Uses SQL Injection, 2009). The SQL injection attack revealed 25 administrator’s credentials and the attacker was able to alter web content on NASA’s websites (Moscaritolo,…

    • 1338 Words
    • 6 Pages
    Great Essays