Kids in the UK are hacking their own schools for dares and notoriety

Spread the love

Children are making a sign in the UK’s Cyber ​​Security Area, and their parents are not the way they want them. According to the country’s Information Commissioner’s Office (ICO), students were behind more than half of the private data violations in the school.

A Warning To teachers and educational institutions, the ICO has outlined the analysis of its 215 data violation report, causing security events derived from internal schools, finding out that 57% of the hack students have removed it.

About a third of the violation were possible because students usually guessed the passwords used, or just login details according to the ICO.

The ICO, however, said that a small number of events (5%) protection and network control needed more sophisticated techniques to bypass. The regulator has given an example of how the regulator used tools to break the password of the three -year -old student and bypass the security protocols to bypass the security protocols; Two students have even acknowledged as part of a Hacking forumThe

“Children are hacking on their schools’ computer systems – and it can set up for their cyber crime life.”

The warning also says that the reason why the kids hack the system are among them, they have courage, notorious, money, revenge and rivalry.

“What starts as a bold, a challenge as a challenge, the ICO’s chief cyber expert, Heather Tom, said,” Some fun in the school setting can eventually participate in a harmful attack on companies or critical infrastructure. “

The report focuses on how these violations took place: About a quarter of data violations took advantage of the weak data protection practice, such as allowed teachers to use their devices; 20% hacks were caused by employees using private devices for work; And inappropriate access controls for systems such as Microsoft SharePoint caused 17% violation.

Calling its explorations “worrying” ICO schools refresh GDPR training and improved cybercuity and data protection practices and call on to help solve these problems by reporting on time.

Leave a Reply

Your email address will not be published. Required fields are marked *