What’s more, there are times when a student might have only intended to have a little fun and break into a school’s network without realizing the breadth of what they’ve gotten access to or what the consequence might be for changing or probing sensitive information. So if a student happens to be a teacher’s aide during a free period, he or she may have access to a password and username and be tempted to use it-or be pressured by a peer to do so, McLaughlin said. “A lot of the time it’s not about being super clever, it’s about being opportunistic,” she said. And it’s not necessarily a new phenomenon, she added, referencing “Ferris Bueller’s Day Off,” a 1986 movie in which the title character illegally enters his school’s computer system to change his attendance record. School district chief technology officers definitely grapple with the issue of student hackers, said Amy McLaughlin, the cybersecurity director for the Consortium for School Networking. That means when principals, teachers, and superintendents are trying to figure out which of their students may have the potential to get into trouble online, they may want to focus on not only the tech-savvy youths but also the kids who are getting into problematic behaviors at an early age, Holt said. The entry points appear somewhat similar to traditional delinquency, which tells us that hacking may not be as unique as it’s often thought to be.” It can be guessing someone’s password to get into their email account. “But in reality,” he said, “hacking doesn’t have to be that complicated. He is the lead author of the study, which examines cybersecurity crimes within a broader pool of worldwide data on juvenile delinquency collected in 2007, the most recent year the data could be analyzed. Society has the idea that “a hacker is a lone kind of sophisticated computer user,” said Thomas Holt, a cybercrime expert at Michigan State University.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |