Educause Security Discussion mailing list archives
How do you handle students who attempt to exploit internal resources?
From: Ben Spencer <ben.spencer () MOODY EDU>
Date: Sat, 11 Nov 2006 10:03:42 -0600
Recently we had an adventurous student who decided that he would try some common web based exploits against our intranet website (which is available on the internet). He came to us and informed us what he found. Through the conversation, it was revealed that this action was intentional. He was let off knowing that we had other options but were not going to pursue them. That was with the understanding that he would not continue his activities. Well, activities, though different now, continue. These second activities apparently caused an outage of a public website. How are these type of situations handled at your university? These things tend to depend on the specifics of the situation and I intentionally left a lot of them out. Benji --- Benji Spencer System Administrator Ph: 312-329-2288
Current thread:
- How do you handle students who attempt to exploit internal resources? Ben Spencer (Nov 11)
- <Possible follow-ups>
- Re: How do you handle students who attempt to exploit internal resources? Michael Cole (Nov 11)
- Re: How do you handle students who attempt to exploit internal resources? Sadler, Connie (Nov 11)
- Re: How do you handle students who attempt to exploit internal resources? Bob Ono (Nov 11)
- Re: How do you handle students who attempt to exploit internal resources? Jeff Kell (Nov 11)
- Re: How do you handle students who attempt to exploit internal resources? Willis Marti (Nov 12)
- Re: How do you handle students who attempt to exploit internal resources? Samuel Young (Nov 12)
- Re: How do you handle students who attempt to exploit internal resources? Theresa M Rowe (Nov 13)
- Re: How do you handle students who attempt to exploit internal resources? Russell Fulton (Nov 13)
- Re: How do you handle students who attempt to exploit internal resources? David Gillett (Nov 13)
- Re: How do you handle students who attempt to exploit internal resources? John C. A. Bambenek (Nov 13)