0% found this document useful (0 votes)
32 views46 pages

CyberSecurity Guide

The document outlines the cybersecurity risks faced by schools, detailing various types of cyberattacks such as ransomware, phishing, and malware, and emphasizes the importance of implementing robust security measures. It highlights real-world examples of cyber incidents affecting educational institutions, including the HSE ransomware attack and a data breach at a primary school, underscoring the need for proper data protection policies and staff training. Additionally, it provides guidance on risk reduction strategies and the necessity of standalone data backups to mitigate potential losses.

Uploaded by

onepiece.zoro.av
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views46 pages

CyberSecurity Guide

The document outlines the cybersecurity risks faced by schools, detailing various types of cyberattacks such as ransomware, phishing, and malware, and emphasizes the importance of implementing robust security measures. It highlights real-world examples of cyber incidents affecting educational institutions, including the HSE ransomware attack and a data breach at a primary school, underscoring the need for proper data protection policies and staff training. Additionally, it provides guidance on risk reduction strategies and the necessity of standalone data backups to mitigate potential losses.

Uploaded by

onepiece.zoro.av
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 46

Cybersecurity Risks

and
Guidance for schools
Sept’ 2024

Oide Technology in Education Website


https://www.oidetechnologyineducation.ie/technology-infrastructure/data-security/

Email: [email protected]
Overview

• What is Cybersecurity
• What is a Cyberattack

• HSE had a high profile ‘Ransomware’ attack on 14 May 2021


• Ransomware is just one type of cyberattack
• Other relevant risks: Phishing, Malware, Viruses, Spyware, Trojans

• Are schools systems and data at risk of a cyberattack?


• What type of cyber risks are relevant for schools?
• Guidance on how schools can reduce these risks
• Some relevant resources, links etc.,
Policy Context: Digital Planning,
Digital Learning Framework (DLF)

Digital Strategy for


Schools to 2027
Data Brokers: Profiting from your data

• Data brokers are companies that collect or purchase public, personal, private info’
about you and then sell that data. (over 5,000 brokers, revenue of over €250
Billion per year)
• Consumer data is valuable, where you shop online, credit card details, coupons
store’s loyalty card, facebook pages you like, what you spend money on,
birthday, addresses, your job title, your interests.
• Information on the Public Record: includes court records, motor vehicle records,
census data, birth certificates, marriage licenses, voter registration information,
bankruptcy records, divorce records.
• If you spend a lot of time on social media or in the online world, you're giving
data brokers even more information about you. Data brokers collect personal info
from the posts you've made or ‘liked’ online, online quizzes you've taken, and the
websites you've visited.
• Some data brokers act legally using public data, many act illegally

https://us.norton.com/blog/privacy/how-data-brokers-find-and-sell-your-personal-info
HSE Ransomware attack

Took place on 14 May 2021


• All HSE systems were affected
• Forced to move to paper based system
• Confidential medical data was stolen, published online

• A malicious email was received on one PC on 16th March, it was opened 2 days later
• A Microsoft Excel attachment which contained ‘malware’ was downloaded
• 31st March: HSE AV software detected unusual activity, but checks were inconclusive
• Over next few weeks the attackers secretly gained further system access
• Attackers ‘activated’ ransomware on 14 May 2021, 8 weeks after initial file download

Recovery:
• 6 weeks later, 75% of servers and 70% of devices were restored
• By Sept, 4 months later, 95% of servers & devices were restored
• Though no ransom was paid, the attack cost the HSE over €100 million
School data breach

https://www.irishtimes.com/news/ireland/irish-news/primary-school-pupils-data-held-to-ransom-by-hackers-1.3044951

• 2016: a data breach report from a primary school • Commissioner found the school had broken the law by
• Ransomware attack by a third party. failing to ensure that adequate security measures were in
• School’s files, which included children’s names, dates of place to protect the student data. Her office recommended
birth and PPS numbers, inaccessible. to the school that it take steps ‘to mitigate the risks
identified’.
• The Commissioner found the school had deficiencies in the
measures it had taken to secure pupils’ personal data, • The school implemented staff training on the risks
including the fact that no polices or procedures were in associated with email and the use of personal USB keys
place to maintain adequate back-ups. and also reviewed its procedures to ensure appropriate
contracts were in place with its ICT providers.
• No procedures or policy documents focusing on system
attacks such as ransomware or viruses and had no contracts • Commissioner stated that: “This case demonstrates that
in place with its ICT services providers, the data processors, schools, like other organisations interacting online must
as required by law. ensure that they have appropriate technical security and
organisational measures in place to prevent loss of
• Actions by ICT suppliers were ‘inadequate in response to the personal data, and to ensure that they can restore data in
attack’. the event of crypto-ransomware attacks’
• A lack of staff training and awareness of the risks associated
with opening unknown email attachments or files.
Types of Cyberattack

https://www.preemptive.com/five-evil-things-a-hacker-does-to-your-app/

Spoofing
https://www.g2.com/articles/spoofing

Identity Theft

Ransomware
https://us.norton.com/blog/malware/types-of-malware

Zero-Day

https://www.avast.com/c-malware

https://www.itprotoday.com/vulnerabilities-and-threats/how-tell-
if-ransomware-message-real-or-fake

https://spanning.com/blog/zero-day-vulnerability/
Human Factor, Internet of Things (IoT)

https://ssdtechie.com/2020/07/06/the-human-factor-in-cybersecurity-employees/

https://www.mcafee.com/blogs/enterprise/cloud-security/how-to-create-a-
strong-password-you-actually-remember/

https://enterprisersproject.com/article/2016/2/internet-hackable-things-why-iot-devices-need-better-security

https://obtsynergy.com/why-you-are-your-biggest-online-security-threat/
Impact of Ransomware
Implications of Personal/Work mix

• Social media has a very strong presence in schools


• Risks in ‘personal space’ can become risks to the ‘work/school space’
• Many users use the same passwords in Social Media and Work/Schools contexts
• Does this raise the cyber risk in schools?
• Finding a suitable balance?

Personal Work/School

https://www.insurancebusinessmag.com/us/news/cy
ber/social-media-activity-exposing-many-users-to- https://www.dnainfo.com/chicago/20170519/chinatown/st-therese-chinese-
cyber-risks--report-245417.aspx catholic-school-principal-phyllis-cavallone-jurek-stanley-c-golder-leadership-
award/
Schools and Cybersecurity

• If schools cannot or would not pay ransoms, why are they a target of cyberattacks?
• Schools have large numbers of potential targets, manage increasing amounts of
personal data, and so this data can be seen as an ‘attractive’ target.

• Ransomware encrypts (ie. locks) all accessible or connected school devices

• May result in a full loss of digital data, including connected backups

• Mandatory reporting (GDPR) of a data breach to Office of Data Commissioner


• School ‘Reputation’, defacement of school website or social media accounts

• Significant workload and costs to restore systems and data – if possible

• Overall an extremely high negative impact to a school


Who is targeting Schools

• Online criminals:
Attempt to steal and sell important data using ransomware attacks etc.,

• Hackers:
may not be financially motivated, but want to cause disruption or reputational damage to schools

• Phishing Campaigns:
These attacks leverage ‘social engineering’ and mimic genuine providers to deceive schools into
providing login and password details, credit card information etc.,

• Malicious Insiders:
Disgruntled staff or unhappy students may use their access to a school’s IT systems to carry out
malicious activity to cause disruption or reputational damage.

• ‘Indiscriminate or Untargeted’ cyberattacks:


don’t care who the victim is, they target as many users as possible. They use techniques such as
‘phishing’, ‘water-holing’ and ‘port scanning’

Guide: Cyber Security for schools:


https://ncsc.gov.ie/pdfs/NCSC_Quick_Guide_Schools.pdf
Some Cybersecurity Terms
Glossary
• Credentials - A user's authentication information used to verify identity - typically one, or more, of
password, token, certificate.
• Decryption – taking encoded or encrypted text or other data and converting it back into text you or the
computer can read and understand
• Encryption - A mathematical function that protects information by making it unreadable by everyone
except those with the key to decode it.
• Firewall - Hardware or software which uses a defined rule set to constrain network traffic to prevent
unauthorised access to or from a network.
• Multi-factor authentication - The use of two different components to verify a user's claimed identity.
Patching - Applying updates to firmware or software to improve security and/or enhance functionality.
Phishing - Untargeted, mass emails sent to many people asking for sensitive information (such as bank
details) or encouraging them to visit a fake website.
• Port scanning - A port scan is a common technique hackers use to discover open doors or weak points in a
network.
• Ransomware - Malicious software that makes data or systems unusable until the victim makes a
payment.
• Water-holing - Setting up a fake website (or compromising a real one) in order to exploit visiting user
• Many more …
Impact on School Infrastructure

Teacher Devices School Network Cloud based Services


• Payment systems
Data Backups School Wifi • Admin Systems
• Learning platforms
School Server • Online Applications
• School Website
Software Applications, • Communications
Apps Systems with parents etc
• School App
Student Devices
Managing Software Updates
‘Other’ Devices

External Parties
Improving Data and
Prevention: Awareness/Education Cybersecurity
for Staff & Students
Malware

https://us.norton.com/blog/malware/types-of-malware
Phishing

• Social engineering is the ‘art’ of exploiting human


psychology. Today’s cyber attackers are combining social
engineering and technology for profit.

• According to the InfoSec Institute, phishing is the most


commonly used social engineering attack.

• These attacks leverage social engineering to trick victims into


giving up sensitive information such as passwords or credit
card information.

https://www.csoonline.com/article/2117843/what-is-phishing-examples-
types-and-techniques.html

https://us.norton.com/blog/privacy/5-tips-for-social-media-security-and-
privacy
Can technology prevent Cyberattacks?

• High quality technology alone


cannot keep data safe – why - the
human factor, Social Engineering
Social Engineering

• Many cyberattacks use techniques known as


social engineering
• This is based on human psychology and
understanding how we ‘humans’ think and act
• What motivates our actions
• It exploits how we can be manipulated into
unknowingly taking actions that may result in
providing ‘access’ to data
• Attacks can happen online, via email, or in
direct communication with external parties
• High priority alerts are used to cause user
anxiety/panic
https://threatpost.com/rethinking-responsibilities-social-engineering-attacks/148466/
• This can cause users to act un-intentionally (eg.,
alerts of problems with bank accounts, tax,
overdue payment, loss of critical service)
Malware attacks

• Malware: (Malicious software)


• Any program or file that’s harmful to computers or data

• Includes viruses, spyware, keyloggers, ransomware & trojans


• Virus: malware that makes copies of itself and inserts these into other
files https://www.packetlabs.net/posts/pipedream-malware-toolkit/

• Spyware: malicious software designed to gather data, and send it to 3rd


parties
• Keyloggers: records keystrokes, recording everything you type on a
keyboard
• Ransomware (already discussed)

• Trojans: malware that conceals its real content. Like the ‘Trojan Horse’
used to attack the city of Troy (~1200 BC), harmful content is hidden
‘within’ the trojan delivery agent
Phishing Attack

• Phishing is not a type of ‘Malware’

• It’s a method of attack to access private


information, using social engineering /
deception

• Tries to deceive users into unknowingly https://business-review.eu/tech/online/what-is-a-phishing-attack-and-how-do-you-steer-clear-of-them-224941

divulging confidential information

• Phishing can occur through email ‘spoofing’ • Often phishing attacks are indiscriminately
or phone calls where an attacker pretends to directed towards a large number of users by
be a ‘trusted’ party email or phone

• When hackers specifically target an individual


user, this is known as ‘spear phishing’
Phishing Invoice attack

• Phishing - method of accessing data using


social engineering / deception
• Email with attached Invoice from a 3rd party
attacker
• Invoice is designed to look like the legitimate
company that the school uses for website
services
• Raises anxiety that if invoice is not paid the
service may be affected
Phishing email from software provider

• Phishing email with request to take


immediate action
• Tries to impersonate a legitimate
company that the school uses for
online services
• Raises anxiety that if action is not
taken the service could stop working
Phishing invite in Google Docs

• This phishing request invites the user


to click on a malicious link
• Designed to look like a familiar process
that schools use on a regular basis
• This could target staff or students
within a school
Phishing - Domain Spoofing

• This phishing request invites a user to


login to a malicious website
• Designed to look like a trusted
website that schools already use
• Could target staff or students within
a school
Phishing email from Cloud Provider

• This phishing email invites the user to


click on a link to malware
• Looks like a familiar service that schools
already use
• This could target any staff or students in
a school
In an ideal world ….
‘Cybersecurity-Denial’ is not an option
Cyber risk reduction strategies

Overall Principle:
Access to data and resources to be based on work related ‘need’
• Policies need to be consistent with school culture, & based on consultation

Different roles require different levels of access to data


• Principal, Deputy Principal
• Administration Staff
• Teachers, other staff
• Students
• Visitors

• Segment the school network and wifi based on type of users


• Leadership/Admin, Staff, Students, Guest
• This needs to be implemented on the school network
• Supports GDPR principles
• Reduces risk of issues, data breach
School Cybersecurity Policy - Discussion

• Access to data and resources needs to be restricted to those who really need it.
• The number of data administrators (ie ‘admin accounts’) need to be minimized
• All ‘admin accounts’ need to be approved by the School Principal
• Data to be stored securely
• Robust data backups to be in place

• Possible examples:
• Student devices not to have access to Leadership/Admin or Staff network areas
• Policy on USBs for staff - USBs to be used for school work only, AV Scan
• Policy on USBs for students - USB to be used for school work only, AV scan
• Policy on school owned teacher mobile devices, to be used for school work only
• Consider enforcing two factor authentication (at least for staff)

• Network and Wifi


• Network to be segmented either physically or by VLANs, and SSIDs for Wifi
• to be discussed with your school network/wifi support provider
Importance of standalone data backups

• To reduce the risk of permanent loss of important


school data due to malware, equipment failure,
or other causes, the single most important step
that schools should have in place is to carry out
regular ‘standalone’ backups of important school
data.

• A standalone backup is one that is stored in a


separate, disconnected and/or ‘off-site’ location,
so that if the original data is lost or inaccessible,
the school still has a copy of the data.
https://medium.com/technology-innovations-insights/what-impact-can-data-


backup-and-recovery-trends-have-on-organizations-d65195a021b6
The ‘standalone’ location could be a separate
drive or could be on a ‘cloud based’ service
Secure Wifi, Software updates

• Ensure school wifi is configured securely


• Admin/Leadership, Staff, Student, Guest
• Ask your wifi provider to confirm this

• Switch off unused wireless connections such as


bluetooth connections
http://re-brostrend.com/secure-your-wi-fi-network/

• Install recommended software security updates


from Microsoft, Google, Apple etc.

• Microsoft’s ‘Windows 10’ operating system (OS)


includes AV software, however it is still
recommended to have to 3rd party malware/AV
software installed for Microsoft devices.

https://www.sancuro.com/blog/post/why-software-updates-are-so-important/
New Email – Open or Delete?

Danger Signs:- Delete emails without opening them if:

• You don’t recognize the sender


• It’s a generic/mass/bulk email
• It’s not addressed to a specific person
• It looks ‘unusual’
• Something doesn’t feel right about it
• It requests an urgent response
• You feel under pressure to act
• It’s unexpected
• Special offer, OIALO, TGTBT
• An ‘appeal’ for financial support
• Requests that you ‘click on a link’
• It’s refers to an problem with your bank account,
credit card, package delivery/unpaid fee, software
renewal, service expiry, your password etc., https://www.komando.com/tech-tips/migrate-email-between-accounts/707359/

• Unless you know and trust the sender don’t click


on attachments
Beware of Scams

Scams: using internet services or software to defraud or


take advantage of victims, typically for financial gain.
Online scams: Top 20 internet scams
•Phishing scams
•Ransomware
•Scareware
•Travel scams
•Fake shopping websites
•Grandparent scams
•Romance scams
•Hitman scams
•Lottery scams
•Tech support scams
•Disaster relief scams
•COVID-19 scams
•The Nigerian letter scams
•Money transfer scams
•Pre-approved notice scams
•Cryptocurrency scams
•Social media scams
•Social media impersonation
•Mobile scams
•Job offer scams

https://us.norton.com/blog/emerging-threats/internet-scams
Privacy: Social Media Cleanup

Social Media Cleanup Checklist: A 9-step cybersecurity guide

https://us.norton.com/blog/privacy/social-media-clean-up
Viruses – Need for AV on different types of devices

• A software virus is a type of malicious software, or malware, that attaches itself to existing files, for
example to Microsoft Excel or Word files.
• When these files are opened the virus activates and spreads between computers and causes damage
to data and software.
• Viruses aim to disrupt systems, cause operational issues, and result in data loss and leakage.
• Virus can be used with other types of malware to carry out ransomware attacks.
• Viruses need a user action, such as opening a file, to activate.
• Other types of malware such as worms don’t need a user action to be activate.

• Antivirus (AV) is software that detects, and quarantines the virus. Using a regularly updated database
of malware and viruses, it scans a device for viruses. No antivirus protection is 100% effective but is
recommended especially for Windows based devices.

• Chromebooks and Apple devices may be considered a ‘lower risk’ of being infected by ‘viruses’,
however they are still at risk from other cyberattacks including phishing etc.

https://www.security.org/antivirus/
iPads and Viruses

• In general Apple iPads cannot get viruses unless the user is jailbreaking, meaning is
downloading apps from outside of the App Store.

• If you’re using iPads as intended and only downloading apps from the App store, it’s
unlikely to get viruses.

• The reason why iPads do not get viruses is that every app in the App store is scanned for
malicious code.

• Also each app is isolated from one another so viruses can’t spread to other systems

• As with all other types of devices iPads can’t protect users from Phishing, scams etc

• While it’s unlikely that an iPad has a virus, you can tell if it has a virus if your mouse moves
without you touching the trackpad, you are getting a lot of pop-ups, your passwords stop
working, etc.

https://www.security.org/antivirus/ipads/
Managing Passwords

• Managing passwords is critical to cybersecurity.


Affects all computer based or online activities.

• No personal or social media passwords to be


used on school devices
• Good password management can take
significant effort, but not doing so exposes
users to SERIOUS RISK!
https://www.malwarebytes.com/blog/news/2018/09/two-factor-authentication-2fa-secure-seems

• Your activity may impact you school, and can be


traced back to particular devices (as per HSE
2FA is strongly recommended
attack one 1 PC)

• Two Factor Authentication (2FA) uses two


separate ways to login, eg., 1: email/password,
2: code received by text message
Passwords – Some Tips

• Never reveal your passwords to others


• Use different passwords for different
accounts. Never use the same passwords for
work/personal use
• Use Two-Factor Authentication (2FA)
• Use long passwords: Min 8 characters long,
ideally 12 characters
• Consider using a Password Manager
• Use ‘hard to guess’ but ‘easy to remember’ • Many advantages, however firstly
• Don’t use single words, dictionary words, understand how they work:
Examples:
DOB, favourite teams, child or pet names, LastPass: https://lastpass.com/
these can be easily found on social media KeePass: https://keepass.info/
Keeper: https://keepersecurity.com/
• Use ‘complexity’: eg., include upper and lower Password Safe: https://pwsafe.org/
case letters, numbers, and special characters Dashlane: https://dashlane.com/
Tips re’ Ransomware

Ransomware tips:
Most of the ransomware attacks are linked to poor protection practices by employees.

1. Do not pay the ransom. It only encourages and funds these attackers. Even if the ransom is paid, there
is no guarantee that you will be able to regain access to your files.

2. Restore impacted files from a known good backup.

3. Do not provide personal information when answering an email, unsolicited phone call, text message or
instant message. Phishers will try to trick employees into installing malware, or gain intelligence for
attacks by claiming to be from IT. Use reputable AV software and a firewall.

4. Make sure that all systems and software are up-to-date with relevant patches.

5. Make sure you use a trustworthy Virtual Private Network (VPN) when accessing public Wi-Fi

https://us.norton.com/blog/emerging-threats/ransomware-what-can-you-do-about-it#
Spotting Fake/Spoofing Websites

• Examples of ‘Trusted’ Websites


• Dataprotection.ie
• Education.ie
• Scoilnet.ie
• pdsttechnologyineducation.ie

• Trusted sites are secure (use


encryption) to prevent
eavesdropping on data

• The have a ‘padlock’ symbol https://www.pandasecurity.com/en/mediacenter/security/what-makes-websites-


trustworthy/

• “https” (‘s’ indicated secure) rather


than just “http” or ‘www’.
Cyberwise
https://cyberwise.ie/
Reporting a data breach to DPC

https://www.dataprotection.ie/
Reporting Cybersecurity
Incidents and Crimes
Types of incidents and level of support
• A cybersecurity incident is considered to be any adverse event that threatens the
confidentiality, integrity, authenticity or availability of a network or information system.
• As a member of the public if you feel that you have experienced a cyber security incident
that may have a national impact please contact the NCSC at the email [email protected].
• The level of support given by NCSC will vary depending on the type and severity of the
incident, the constituent and/or constituents impacted and available resources.

Cybersecurity vs Cybercrime
• There are a number of cyber-related events which may not be considered as cyber security
incidents but could constitute a cyber crime. Cyber bullying, threats via email, text or instant
message, online fraud or online extortion are all examples of potential cyber crimes.
• If you feel you have been a victim of a cybercrime you should contact An Garda Síochána.

Ransomware Support Website


• https://www.nomoreransom.org/
• If you feel you have been a victim of Ransomware you should contact An Garda Síochána.
Schools Cybersecurity Checklist Summary

Network Security: Fit for purpose router and firewall in place to prevent unauthorised access and
malicious content.
User Awareness: Produce security policies detailing the correct and secure use of devices and online
systems. Regular cyber security awareness training.

Malware Prevention: Produce appropriate policies on malware, install anti-virus protection on the
school’s devices. Disable USB ports unless strictly necessary.

Account Security: Manage and limit user access as well as monitoring user activity. Create a
password policy. Recommend strong and unique passwords for accounts and services. Consider
using a password manager to store passwords. Enable multi-factor authentication (MFA) on all
accounts if possible.

Backups: Create backups regularly and consider a cloud solution. Have policy to control all access to
removeable media, limit media types and scan media before importing onto the network. Apply
software updates as they become available.

Prepare: Develop an incident plan and involve staff. Document contact details of external people
who can help during an incident. Monitor systems and network for unusual activity.
Guidance on CyberSecurity: Useful Links

The National Cyber Security Centre


https://ncsc.gov.ie/guidance/
Some relevant website links:
Quick Guide: Cyber Security for schools: https://www.garda.ie/en/crime/fraud/
https://ncsc.gov.ie/pdfs/NCSC_Quick_Guide_Schools.p
df https://www.fraudsmart.ie/personal/fraud
-scams/
Guidance on ransomware https://www.fraudsmart.ie/personal/fraud
https://www.ncsc.gov.ie/ransomware/
-scams/email-fraud/phishing/

Citizensinformation.ie Data and Cybersecurity - Oide Technology


https://www.citizensinformation.ie/en/consumer/buyi in Education
ng-digital-content-and-services/scams-and-fraud/
Thank You
Please send any queries to [email protected]

You might also like