You are on page 1of 4

The Importance of Cyber Security Awareness in Academia

The system of education continue to pursue classes despite challenges in environment, network
stability and accessibility, and availability of resources needed for education. This means that
the academic community will not be discouraged by lockdown and are resourceful enough to
choose online class as an alternative. Notwithstanding, even though classes are made possible
by technology, there are some things that are compromised along the way; and one of them is
cyber security.
In order to encapsulate all necessary information, the College Student Publication – Fulcrum
presents most common tips and threats, and four equally essential information such as Data
Theft, Communal Network, Public Network, and Social Media Security.

Here are some threats that could breach the privacy of student’s identity and intellectual
property:
Data Theft: “According to CNBC, cyber attackers know that students often have little
understanding of how to properly guard personal and financial data being input online, typically
for the first time. Experts say hackers can use this data for identity theft, credit fraud and
more.”
Mobile Malware: “Researchers at Check Point found that attacks targeting mobile devices have
risen by 50% since 2018. With more students moving from a desktop or laptop to smartphone
use, it is more important than ever to take mobile security seriously.”
Malicious Social Media Messaging: “According to a study on cybersecurity threats amid the
COVID-19 pandemic, hackers are taking advantage of platforms such as Facebook and
WhatsApp with scams to lure victims to phishing websites, which can compromise personal
information.”
Camfecting: “Many students today have a desktop webcam or camera built into their phone,
tablet or laptop. Unfortunately this can open the door to camfecting, where hackers are able to
remotely access and take control of a webcam.”
Social Engineering: “Social engineering scams are among the top cybersecurity threats faced by
higher education students, according to EducationDive. These attacks rely on manipulating
users into revealing confidential information.”
(SOURCE: https://bootcamp.berkeley.edu/blog/cybersecurity-in-education-what-teachers-
parents-and-students-should-know/)
With the advent of internet trolls, torrent websites that can download and hack your data
undetected, and advertisements or other websites that lure you into handing over your email,
it is important to know the repercussions of these security breach. As the old saying goes, “It’s
better to be safe than sorry.”

Here are tips to avoid cyber security breach:

Avoid Sharing Personal Information: “Be mindful about the information you divulge online —
such as school names, email addresses, home addresses and telephone numbers.”
Invest in Virus Protection: “Ensure you have antivirus protection with anti-phishing support
installed on all devices (desktops, laptops, tablets, etc.). Set it to update automatically and run
virus scans at least once a week.”
Keep Software Up-to-Date: “Be sure to keep your operating system, browser software and
apps fully updated with patches. Even new machines can have out-of-date software that can
put you at risk.”
Be on Guard for Phishing: “Do not open email attachments from untrusted sources. You may
be expecting emails from group members or teachers, but use caution when opening any
attachments.”
Be Careful What You Click: “Avoid visiting unknown websites or downloading software from
untrusted sources. These sites can host malware that will install (often silently) and
compromise your computer.”
(SOURCE: https://bootcamp.berkeley.edu/blog/cybersecurity-in-education-what-teachers-
parents-and-students-should-know/)

As online classes continue, it is not avoidable that some students have to use public WiFis and
computers as they try to log in to platforms that are used in their classes such as google
classroom, the PIT Parent and Student Information website, Moodle, and YouTube and even
Facebook. Both students and teachers alike have to log in to email accounts, and if these
accounts are logged in to networks that can be hacked, it will compromise not only the email of
the user, but also other accounts in different platforms that use the email address. This will
endanger both the intellectual properties and the identity of the user.
When talking about the purchases made online, it is always best to search about the platforms
your are using and how other people are satisfied in their services before purchasing for
yourself.
Another thing that will be compromised when you use the internet is your phones, laptops or
desktop computers as viruses could be downloaded alongside other resources simultaneously
while undetected. As a result, the software could be attacked and could be unusable if
damaged.

Here are some additional equally-important information about cyber security:


Illegal Downloads
“Illegally downloaded movies, music, and textbooks can be bait for hackers. If an attack affects
your computer it can put many other students on campus at risk as well. In a 2015 study
conducted by Digital Citizens Alliance and RiskIQ, one in three torrent websites exposed users
to malware. Forty-five percent of malware was delivered through drive-by downloads, which is
a download that happens without a person’s knowledge. Drive-by downloads install malware
onto a computer to rummage through files to find Social Security numbers and other protected
information.”
Password Protection
“Many think that if an account or device is password protected that they are safe from getting
hacked, but that is not always the case. Experts recommend using a unique password for each
of your accounts. A combination of upper and lowercase letters, numbers, and symbols makes
it nearly impossible to crack. Avoid using common password formats, and do not use birthdays
or names because it is easy for hackers to source this information online. Instead, use 12 letter
phrases to create long and secure passwords. It can also be resourceful to use two-step
verification when logging into certain sites such as Instagram. Two-step verification requires
you to enter a code that is sent as a text to your phone. This makes it nearly impossible for a
hacker to enter your account unless they have access to your phone.”
Public Wi-Fi
“Many college students do much of their studying at local coffee shops near campus. Because
logging into public networks puts you at risk, it’s important to be vigilant. Do not input sensitive
info, download questionable programs, or visit illegal sites. Also, don’t assume campus
computers are secure. If you’re working at a communal computer or workstation on campus,
you may be exposed to infected software or files. To ensure you are not leaving traces of your
digital footprint, search in privacy mode and clear your browsing history before logging off.”
Cyber Security Affects Everyone
“Although it may seem that older generations need more computer assistance, younger
generations are missing proper education in online safety too. As a young adult entering
college, it’s important to take the necessary steps to ensure you are being as safe as you can be
while using the internet and your devices. You can do this by avoiding torrent websites,
protecting your social media accounts by making them private, and increasing the strength of
your various passwords.”
Social Media
“Social media is more prevalent now than ever. Students are constantly posting and updating
their friends about their lives through their social platforms. It is crucial to never post personal
info such as: cell phone numbers, home address, name of your school, or any photos that could
identify your location. Even if your account is on a private setting, it is not completely secure.
Also, do not accept friend requests from people you do not know or have not met. This could
expose you and your private information to people who shouldn’t have access to it.”
(SOURCE: https://www.lmcins.com/blog/cyber-security-reminders-for-students)

Another hazard in Social Media is when pages, groups and posts make you support ideas that you do not
understand. This plays into a person’s agreeableness and cognitive biases. Why is this included? It is
because Social Media is filled with false news, and organizations that only exist to contradict the
government as a whole. The people spearheading these organizations are groups that support in
ideologies that don’t do good to the community. It is easy to find ideas that will feed your positivity bias
because these harmful ideologies are alluring and easy. This could cause you to believe fervently to
things that you aren’t sure if it is a fact or not.

The Press Media using Social Media as a platform such as this one could also be a potential source of
bias especially when information are manipulated to favor or discriminate a person or an organization.
The best solution to find out about the truth is to find references in respectably qualified sources.
Comparing data between two platforms also help point out the differences, biases and excluded or
included information.

In conclusion, the best way to keep your data and your mind clean is to be careful about the
information, products, and services that are offered in the internet, and always double-check the
information presented to you. As a reminder, it doesn’t cost anything to be careful, but it surely pays to
be irresponsible.

You might also like