Cyber Security News / Education:University

U.S. Universities Rethink Cyber Security, Facing Millions of Attacks Weekly

American research universities are increasingly coming under cyber-attack, with millions of hacking attempts every week, most of which are thought to be from China.

According to an article from The New York Times, campuses are forced to tighten security, constrict the culture of openness and try to determine what information has been stolen. University officials have conceded that some hacking attempts were successful, but they decline to reveal specifics. They acknowledge, however, that they frequently do not learn of break-ins until much later, if ever, and it might not be possible to tell what was lost.

Universities and professors are awarded thousands of patents annually, some with major potential value (prescription drugs, computer chips, fuel cells, medical devices). The number and sophistication of attacks are outpacing the universities’ ability to respond, the article reports.

Officials do note that hackers have become adept at bouncing their work around the world to avoid detection; university personnel do not know whether the attacks are private or governmental, the article says.

The increased threat from hacking has forced some universities to rethink the basic structure of their computer networks and their open style. Some universities no long allow professors to take laptops to certain countries. However, compared with enterprise companies that also must protect intellectual property, universities’ networks pose a unique problem: they are built for collaboration between people and often between institutions, plus, thousands of faculty and students log-in every day.

At Perdue, the most sensitive data is most carefully guarded, separated out from the rest of the university’s access and protected with stronger data encryption. Sometimes, the data is not even connected to the larger campus network, especially when the work involves dangerous pathogens or research that could turn into weapons systems, the Times reports.

At the University of California, Berkeley, millions of attempted break-ins weekly caused the school’s cyber-security budget (already in the millions of dollars) to double in the last year.  

Did you enjoy this article? Click here to subscribe to Security Magazine. 

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security June 2015 issue cover

2015 June

In this June 2015 issue of SecurityIs the security director business’s new “corporate rock star?” Find out how CSOs can become the new leaders of their enterprises through mentorships, partnerships and creatively adding business value. Also, learn how security professionals are training employees in cyber security through games. And why are deterrence and detection so important when it comes to thwarting metal thieves? Find out in this issue.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.