While we would like to believe that ITACS students are the least likely to contribute to security vulnerabilities to Temple University or each other because of their background knowledge in technology, I see where both could be a possibility. In reality, data breaches or data loss typically is a consequence of negligent behavior by well-meaning people. It is easy to believe that you know everything about computers if you are skilled at generating spreadsheets, word processing documents, presentations, etc. However, just because you are “technologically sophisticated”, does not mean you have a full understanding of security concepts. By letting your guard down and installing software, visiting questionable sites, or opening attachments from unknown senders at the tech center, or using the university’s wifi, you are providing an “endpoint” or weak link in the security chain that can create a “front door” for hackers to take advantage of. Exposing Temple’s property to malicious software could wreak havoc on computer systems and interrupt online learning and resources, and put the university’s student and staff’s personal identifiable information in jeopardy which would impact both the university and those who benefit from the institution.
I would say that ITACS students represent information security vulnerabilities to Temple University and to each other. The reason I say this is because of human carelessness. While we should know better being in this major, that is not always the case. For example, I was an accounting undergrad and had little tech background before starting this program. An ITACS student could leave their computer logged in or forget their USB drive at the tech center. This could allow any stranger who walks into the tech center to have complete access to the student’s information, and even more info about Temple that they would not have otherwise had access to. A student may also accidentally download software that puts Temple’s security at risk, or click a shady email. Obviously after getting a better understanding from my first readings I would be more hesitant to make such mistakes, but it would be ignorant to say that we pose no risk whatsoever.
I think the ITACS students represent the information security breaches between Temple and each other. All the student groups, faculty, staff, and staff of Temple will become the target of cyberattacks. For example, phishing emails can obtain various private information of people through malicious cyberattacks, including private emails, phone numbers, bank card information, or social security. Number etc. This information may be used for illegal purposes. In addition, hackers can attack Temple’s network security to obtain more other information through the student’s private account, such as the TU account. At the same time, Temple owns the private information of each school. Once the information of students, teachers, or employees is leaked, everyone will be exposed or threatened.
ITACS students are supposed be aware of the security vulnerabilities and threats, but it is possible they can be prone to security vulnerabilities and attacks, we are humans after all and we tend to make mistakes without the intent. For example, A student might receive false alarms or notification on TU email saying that the system is infected and they need to install university recommended anti-virus software, which itself could be a malware. Another type of attack would be that the students are required to send personal information as it is required by the university for registration purposes. I feel like as cybersecurity professionals are getting evolved and trained so are the hackers or cyber criminals.
ITACS Students may pose a vulnerability threat to Information security to Temple University in the areas concerned with intellectual property usages, exposure of unauthorized information embroiled in billions when capitalized on over the internet and breach of Temple University policies. Students can be a vulnerable target to each other in areas surrounding shoulder surfing of identity theft such as credit card numbers, personal information, however, this reason is not only limited to the poor handling of personal or personnel identifiable information electronically, and misappropriation of credentials (user profiles and passwords) granted by the Temple University for academic purposes.
Elizabeth Gutierrez says
While we would like to believe that ITACS students are the least likely to contribute to security vulnerabilities to Temple University or each other because of their background knowledge in technology, I see where both could be a possibility. In reality, data breaches or data loss typically is a consequence of negligent behavior by well-meaning people. It is easy to believe that you know everything about computers if you are skilled at generating spreadsheets, word processing documents, presentations, etc. However, just because you are “technologically sophisticated”, does not mean you have a full understanding of security concepts. By letting your guard down and installing software, visiting questionable sites, or opening attachments from unknown senders at the tech center, or using the university’s wifi, you are providing an “endpoint” or weak link in the security chain that can create a “front door” for hackers to take advantage of. Exposing Temple’s property to malicious software could wreak havoc on computer systems and interrupt online learning and resources, and put the university’s student and staff’s personal identifiable information in jeopardy which would impact both the university and those who benefit from the institution.
Alexander William Knoll says
I would say that ITACS students represent information security vulnerabilities to Temple University and to each other. The reason I say this is because of human carelessness. While we should know better being in this major, that is not always the case. For example, I was an accounting undergrad and had little tech background before starting this program. An ITACS student could leave their computer logged in or forget their USB drive at the tech center. This could allow any stranger who walks into the tech center to have complete access to the student’s information, and even more info about Temple that they would not have otherwise had access to. A student may also accidentally download software that puts Temple’s security at risk, or click a shady email. Obviously after getting a better understanding from my first readings I would be more hesitant to make such mistakes, but it would be ignorant to say that we pose no risk whatsoever.
Yangyuan Lin says
I think the ITACS students represent the information security breaches between Temple and each other. All the student groups, faculty, staff, and staff of Temple will become the target of cyberattacks. For example, phishing emails can obtain various private information of people through malicious cyberattacks, including private emails, phone numbers, bank card information, or social security. Number etc. This information may be used for illegal purposes. In addition, hackers can attack Temple’s network security to obtain more other information through the student’s private account, such as the TU account. At the same time, Temple owns the private information of each school. Once the information of students, teachers, or employees is leaked, everyone will be exposed or threatened.
Shubham Patil says
ITACS students are supposed be aware of the security vulnerabilities and threats, but it is possible they can be prone to security vulnerabilities and attacks, we are humans after all and we tend to make mistakes without the intent. For example, A student might receive false alarms or notification on TU email saying that the system is infected and they need to install university recommended anti-virus software, which itself could be a malware. Another type of attack would be that the students are required to send personal information as it is required by the university for registration purposes. I feel like as cybersecurity professionals are getting evolved and trained so are the hackers or cyber criminals.
Oluwaseun Soyomokun says
ITACS Students may pose a vulnerability threat to Information security to Temple University in the areas concerned with intellectual property usages, exposure of unauthorized information embroiled in billions when capitalized on over the internet and breach of Temple University policies. Students can be a vulnerable target to each other in areas surrounding shoulder surfing of identity theft such as credit card numbers, personal information, however, this reason is not only limited to the poor handling of personal or personnel identifiable information electronically, and misappropriation of credentials (user profiles and passwords) granted by the Temple University for academic purposes.