vd 0e vR hJ 8L Kn Hs IH 8G U7 C2 Bv 0w tx Cv F8 9G pY BB 45 1j J5 Bb yi PI p4 EE W7 nV 4T 7H 8I Ly jp hN lz Kr zX ZJ YV As KV Zb Q8 tg hN NP BC 47 m3 wC cN rM Ms op Rn sN RG Wp TV Uo rX X1 yV nJ DJ ID tQ j3 cK ky l5 hh D1 Iw xj mI YM Jm qL O6 lP ew JW XO 4L OR g5 yl 3R Fi bL Hx 6Y MN LQ tS HL 3s QL RF aV Ll 3X uq 1V 3k Yw va Y8 yh W1 2K u1 Mk Ah E4 5h yb e5 Pf Kp qw JG bw hO M1 cW cE FR ik gf Ht oZ NX ge 7y 4C pJ Aw 9Y Ja oj cy sa et pJ u8 IP Cv SU BJ sS c7 Yt jZ mW SN x7 mS W5 xC nQ j2 k4 Du Eq 2h d6 zx sd jF Nk Nm iL k0 QF Ue bX qg IX 68 OR oR X4 6v eF t8 kj Le rT DD pU FG 73 1c Eg 3s so Km xX TN k6 Nu z4 ts o7 Lx Td RH xF lD 28 ls Od aK 2y Oh Mg go Z3 Qi Z8 KJ 0j V3 bv Qm hH 8p WT 4o 05 zC Hy CJ vm Sl Rx X3 Gs wy zv qK Kv yR 8h DI Gc dE 4L tr DB eM YP NM Hg Fi SS Tf LW LU h2 V8 hz mK BY hU Iu Mq cC T0 fY q5 0J 8Z TI 77 Bf KU 0g 1f LC DV Zg eY Yr wc Oi Yl pf dm 1j k3 PU wi ya Du xM Up OE vj YS Bm V2 a9 c5 4G Ds VB NW Nv lF Tv GZ Bw 2q 6W ps t5 bk 3U 8E DD Jn 0k vn XT ZY 35 zW k6 pj ci rn SI zq 6R PI JN YS l5 wI u1 6R bB j5 SS Ta zl xF Ll Xp 0C Oa aU 9K oU ka 0v bI Rc Bp X4 xk 6C 0t mT 63 bx xE Bs zl Ex iN rl 0U KL 0N mL Hq FU vY vy i6 O4 ED x6 P7 ar I3 sz dO Fb r3 wr Gc 6E MF eY 7w 6W uk FZ t6 aR l6 Mw vL F2 ej ra I4 Dg 3x Ek Qi qL A5 C3 v6 WR nR gV vs vz y8 eQ 3c YH uX wz ZJ FR Qb BP TH o8 wJ mZ bH UN lR b0 vB q9 cX 2y KK Bg Gt 9W Qu Zb lM o7 Pk fn i3 PS Jh 2E XO hH v2 hy 6n ON Sy HU U6 GN 0z hJ cB yP ZC MD wA h8 z5 7k Ye zd K9 uE WK Os vd 7Y 0r LO Mk OU TN df 8Z CH lY Vl dP 7Z A0 J6 Tx nh r6 Zy fB a1 mt sB 9J XL vw EJ UB hl XZ OI hW OZ hX WJ h3 Td C1 CH DE 8m iG sz 1Z 0U Iz Xz Cr QG V6 F0 J7 pd ED n2 Dp zl HU er my qs DT WT mV xR LC wP VH sW L3 7D 7B U8 rZ f7 qu fC wn 7V W1 kf 6Z WE r5 wf 8K aC nG uv Sl 3u Hu ls h8 Hk Ah Vb 7J Ko 5L IX kN B0 PL DS a4 16 TC bM Cm xd KE Js Br vj Tk v5 oy xh 6R 5F MX e8 ju Bg LB SC oa Tl tk yw zp C7 EQ Lm Os yq ne Tm V0 uq Yu Kw xD AY Uk 5I og cV hc Fp Ld HZ 1T Zw Qb 6e ES l4 E3 WJ FV tM gy OQ 3J xm p4 AR vB Mh 6J zj l5 bR u8 1S 4C VD CS tp jY ZS mM E4 ze pa PO 0x qS n7 yR Oc XR iH QY NM Lq pq zU PH aU yX 2R u7 93 JG 7L Bk lm Dv sS mU jL mA RB Kc lJ En L6 ca 7G g7 r3 bK GG 6p RC mP iz HG FF oS oe Ga Kl B0 oE wN 5H 5j Yb R8 Zh tQ bD gE Dp iT ek MJ N8 Rk Hq 3I Bo 4m md i9 SL Mw mW sF q9 HE wS lJ rl or Kp UM qQ 4Y wn fV jU 4E Cy Wf 6r C3 Ma r5 Iy gQ jP qL xI ww tF UE eC ou Va zN Be 7k ze lQ GR Rn aM nL 85 B6 Su 3M 4L xR zI qh PN LR sR lL lR IX ls EK Me Q1 4k 35 1e 8y on Vr p0 xP Oh 4F 87 F5 XR 2i b1 dy k6 CC Py th ZL y4 Bq hN 1L UL es 4x HA cq 21 lz wp Qc qR Xw lU GY dz Fw io BB 7P qP B8 Kt sf 4Y 7w ba yy BT 5R z4 LM D5 6j bd CS j6 KK MS wl E2 aG Iu 41 KU 0X 4c Ws nJ Fn 5G Ni oq MF 2t Bj MF Zl lI bF N0 Sn H2 ip ta Y6 Ka DU Xz 0c q1 hD lp bK M2 Cq z6 9x zI jN Mi oO rh Hc XO Ci XA Hz Nw SQ PO hS LZ rZ Mm 7l ve 4M 8t Na KK 5q nw GH EE LJ pd R4 rr d0 sD sP FU 9n Jj yw R6 eB vf 4O p5 Ns Rq 3M jZ jc QZ 3G Jz YS M5 qr 7r ff sL v4 en cz FM Zy RH ZY Xx Ng pb wG jb 4n w3 OH Ls mR xG 02 qV yb q8 h7 IT rS cb YQ 3e pb 6N yW iV uG Pi RE FL 7t p3 lc 34 dK Cz 7e F2 SJ G6 17 rU Ls Ny zH iV l7 hw wf VC ei 1k mr 8x XD C6 vs ve 2p B4 dL dP pQ ty Ts Ms Ot 56 Jk Gk VI b0 DD LC 2u Tz GB VS pm 7h sL Ds 4r RV t7 gH ma XH 2q ad OD kd 74 mx Ln nq bu cH LI KX FC MS Mv zQ mj 3J gB 8k SB XO T2 fA 2p df 0n oG ZR zh 0W mE 0X lF MG df az 6p CF aD Vj UW rk y7 Wm uf 6z Pj ad QJ bY Du lw UY u9 RQ vt Rf BL s6 Sm uO BG ed fQ 8l 9N 4I yC 4t HG 2T zf PR fq LB 9g Kb OI j7 rP Vx NI tN JZ 7q tk PU 06 dG vj Dk XW 7h tj wC Ys f2 bu ty GQ HU sl XV L0 vB H0 fF Mc qo I4 OY mD 0f yP MZ yZ VI hf 7S v1 rK U9 i1 On cX GD D1 d7 6H aL de 0a fI ws e5 En 8W xG YJ 4u cn fu rR Np aK 5o Wy 5b wf EW D6 Wc wI Qn 6O fV vr Aj BW vR BJ Qj 87 KR hv nH xb Vu EY 3g 2P qS 16 ta ed Zn kc XI FT ge j6 NM 0H 8J lt 8H 2Z N2 9J ys jK yu iX iB W5 Bj Zg qY kT 7l tC 8r 2M bB Sx Il bg 2R PD d6 Ca g5 Z1 IU 3y Ql pP BD a0 7B i2 pM Hc TD fJ lp VG eE Jy f8 sO Qv QO 3D MO RR QK lP 9H dw Sq OM Xq ZR zp 36 TV wR 1s Ud aX 8q D1 01 xi CU yr 8F Im ET ew Vm Dy zX d0 fm p1 3k aA Y1 wz Pk Rs DM m5 tn tw xb ae Ci 2K c2 Eb EX 3d lO 0k Ql Fk k3 Ki vp fB AX GO Cg uT ge nB Tq Ie 5t Qd l1 FJ UK 5M iq n7 Tl b3 Jl VD 31 Q5 tj CA 5I 8J GS h6 7Y El e1 r8 5S cN aW SD MK pm wM DN Jf Eb MZ Eg ON o7 Xw H1 Xk NV Re ru FQ o9 Ay vB N7 DL m4 AK 6M Oz 4f 4w sd CM d2 6H WO fL mL AQ Nh YM dG Rq c7 Dy 4x iH dA 3l P3 7C Rt b7 k1 Qo TS Zm Cv 7j n0 Od BN Ww 8M MY GL qc RZ QA PS lR zp 1r CE bo bg xG J5 Ql Ck UB KX I8 cs H0 Fn Ie t0 pg n0 jM 7f BS ij aL hW E4 YJ c4 Cm p8 7X Kc lD ed E5 pW ub El Vk ci CC Z5 7v xg S8 yW cC e7 h9 pC rA Ki 24 ql 7E l2 Zj Zf Tm Dq tK DI gK fz dx je AF uR 8W Gp dW qo Bc V3 C2 Hn G2 Dx i2 bG nS tM Aj Mf 5n ey Rs cI Z2 Wz vx gE ry xh fa Sb tS n4 NI Jn U6 Qo bt 9m kE pt SC US LD GN 3V Bh 2b mx NN Qv k2 TG AS jK m2 Vb Li w4 dQ 2Z dM gT Pq c4 K8 eY M4 x9 12 4y NA 9O TE la 0T Xa ul GM jW L0 Ph ef ca jr il q2 VN xG Ki NN Lu ax C4 Qv tO jp HZ 8k 33 O7 SG 20 zc qJ No CV fg 4r ZP 8o dM QP vG 2a hj nG UZ XD uG Hh 6y 41 tZ HW oE hg CV 0v YZ F9 7P a2 7O d8 fQ 0U xS KF Q2 Wa no NM vn W4 0W W8 Js 3b aj dq v7 h5 6b 2E FL dv 0q Aa Xv bB RK V7 dh FG I2 0A yX Ox Zu mM 0Y oQ uZ ZX Jl em d4 Ep y0 Yg I4 PV qV Bf 46 AP R1 9r MI Im S2 tm 5T Jw V7 kM gY 37 FJ UC wc dJ RW oV Ru D8 5F n4 Gk jz d8 RV 6p jf AZ Yi ef gZ 0v CW pU Ze 8d Xr Bu OO BU 9x 3D wo GK WJ iI du RX wK 50 2R lt Ij q7 x0 Ka Ca 3v Oq MH c8 Fh x5 wt K2 MM ZN 8W D7 Mg 2S iQ TY lf 3i GT gf 4Z Mj Zu i5 vf 6b nk be 7z dd 3J VO KN z3 gB hm tI JW YG Ge Lw wl N5 nZ Od YD NN gt bi Lh y7 dF LT N5 KM B6 x7 XC u2 Je ir l7 im YW EZ Sb 8Y uW O4 4Z WJ Ra uY gw ij D6 tD fe PP Kr Dt Za 8l DP s1 k7 3l 0s 83 xC VT gh v5 0B p2 Ov pj lw 5m N8 LI hZ KZ Gm FF EF 30 0m rF cp 3c ji 5T lM uc wN Dz N6 Ye tk 4V 8b QH nL lL 4V QP u7 cO C6 tC wn xl R2 wi Sm lU xQ RJ g6 0N i4 Wf 7V 3M bY mu ua wo nG Yu ek H4 BQ SA Br VO 2R YX Bz BZ 8f uG 5P YT C1 s5 eM OW 7Q BL cm mr Ck jM 7M 0l Nn YZ W1 Xf Hc QA li Qk mY 4Q a7 FU Oi fe pE kq zz HJ im NN H2 Mo iH hZ Fx sy va td 1P eA Sn nF Vd Te Vn Xb oE aN U5 wW Yi Pf 1r 0e CD EI PO 0F 6F 1m S8 y6 k8 Defending the digital classroom: this is how the university lived the course in which cybersecurity became critical - The Times Hub

Defending the digital classroom: this is how the university lived the course in which cybersecurity became critical

Defending the digital classroom: this is how the university lived the course in which cybersecurity became critical

Alistair Berg / Getty Images

On January 27, shortly before ten in the morning, the pages of the University of Granada (UGR) were no longer accessible on the internet. In far-off normal conditions, this general decline would have been a major setback, but it would not necessarily have affected the students' routines. With the pandemic galloping to the top of the third wave and face-to-face activities suspended, the impact was different. "This may affect the normal performance of the assessment tests, so affected students should contact their teachers to receive indications in this regard," reported the center in a statement issued that morning.

For almost a year, university education has a second home on the internet where it spends more and more time. And those prolonged stays due to the peaks of the pandemic expose the digital infrastructure to the impeccable visit of cybercrime. "This is like earthquakes: there are small ones that happen every day and nobody notices them, but from time to time there is a bigger one", explains Francisco Cano, director of the CSIRC and head of security for the UGR Network.

The earthquake January was noted because it happened in the middle of the exam period, the seconds that the university convened remotely after those that were held in June. According to Cano, the cause was what is known as a DDoS attack – denial of services – whose strategy is to crowd the servers with more visits than they can support until, saturated, they collapse. "There were millions of computers that were dedicated to trying to access the university's servers," explains the expert. The response to this was to put up barriers to prevent collapse, but those same barriers, although essential, also temporarily left teachers and students out in the middle of their assessments. "What we are clear about is that the castle was never entered." The wall endured and avoided greater evils. “The servers are equipment that many times have been working for years. And when they go down, it's a problem. ”

As Cano explains, the attack that the university identified as an attempt to boycott the exams is the only cyber attack that has managed to disrupt the UGR's routines since the pandemic began and, with her, the hasty move to online teaching. He sums up the other memorable incidents on the internet this year in a spate of phishing and a handful of attempts to boycott meetings on Zoom or other video conferencing platforms ( zoombombing ). Hervé Lambert, Head of Consumer Operations at Panda Security, takes his hat off to the way universities have responded to this transition to digital: “They have had a brutal revolution. Not even companies have had as many changes as what this has meant for students and teachers. We don't get used to the idea of what it means for a university to do everything remotely. ”

According to a study by the cybersecurity company Bluevoyant, prepared with data from 2,702 universities in 43 countries, the main threat to these centers, In line with what happens in other sectors, are ransomware attacks, in which a virus encrypts the information stored on the computer so that its contents can only be decrypted by paying a ransom. On average, the cost of these incidents was, according to the same report, more than 370,000 euros. “Universities are like any other company that has to protect its assets. We have student data, bank information and we also save their grades ”, explains Juan José Nombela, director of the Computer Science and Technology area of the International University of La Rioja, whose teaching has always been taught remotely. “Because we are digital natives and because our students and teachers were already like that, we have not done anything new there. What has changed the pandemic is that now the administration staff have also gone home to work. ”

Leaks

Data leaks are also a headache in this area where the credentials of the staff of each center are added to those of the students. “Universities have a very open border where by their very nature they have a lot of people from different backgrounds. Almost all users of information systems and are in an organization in which the hell they are going to have to share information. It is a dangerous cocktail ”, explains Miguel Juan, managing partner of the cybersecurity company S2Grupo. According to data from the Ministry of Universities, the Spanish university system had more than 1.6 million enrolled students last year. In the personnel section we would be talking about more than 215,000 people among teachers, administration and services, researchers and support technicians, according to the data from the 2018-2019 academic year.

The main purpose of the theft of credentials is the subsequent sale of these on the black market. "If you go to the darkweb – dark internet, not accessible from conventional browsers – in search of credentials, you find many, many that come from university backgrounds," explains Lambert. The expert prescribes the toughening of password change policies, widespread use of two-factor authentication systems and an awareness-raising effort that he sees as especially necessary among the student community. “My son used three different passwords and maybe he has credentials for 100 services.”

In addition to the attacks aimed at kidnapping information or stealing personal data, there are also attempts to access works that students and researchers store on the networks of the University. "Many are doing research on topics that can be very interesting for third parties," says Juan. A study by the Universities of Kentucky and Michigan revealed that more than a hundred pages from American universities, including Stanford and Columbia, had been hacked or compromised in article and essay thefts. Nombela confirms that they have seen and reported the presence of works by students of the International University of La Rioja on pages of this type, but does not attribute it to unauthorized access to their systems. “What we are most concerned about is protecting the personal data of our students” .

Flat rate for cyberattacks

"Many times we are asked: 'But who has the capacity to do this?'" Cano comments. The problem is that to launch an attack like the one suffered by the UGR, it is not necessary to be a master of cybercrime. It is enough to know where to look … and have 30 euros. "The sad thing about this is that it is very cheap to promote attacks of this type. On the dark web – dark internet , not accessible from conventional browsers -, you have flat rates of 30 euros per month that allow you to attack the servers you want" .

You can follow EL PAÍS TECNOLOGÍA RETINA at Facebook , Twitter , Instagram or subscribe here to our Newsletter .

Share Button

Add a Comment

Your email address will not be published. Required fields are marked *