A government guard has warned of “internal threat” of students Hack your own school systems After increase in Cyber attack,
Information Commissioner Office (ICO) Revealing a “worrying pattern”, disclosed that the disciples themselves are responsible for more than half of the inner cyber attacks of the school.
It said that while these attacks can begin as “slightly fun” in school, they can cause real damage and warns that it can be results for young people, installing them for “life of cyber crime”.
ICO analyzed 215 individual data breech reports due to internal attacks in the education sector between January 2022 and 2024.
It was found that 57 percent of incidents occurred due to students and about one -third of insider attacks were caused by students to estimate weak passwords or go down on paper bits.
ICO said that this means teen hackers are “not broken, they are logging in”.
Heather Tommy, the leading cyber expert, said: “Education settings are facing a large number of cyber attacks, there is still growing evidence that ‘Insider Danger’ is poorly understood, is largely unaffected and can cause future damage and risk of criminality.
“Starts as a courage, a challenge, a school setting has a little fun, eventually giving birth to children participating in damage to organizations or significant infrastructure.
“It is important that we understand the interests and motivations of the next generation in the online world to ensure that children are on the right side of the law and progress in rewarding a career in one field in the constant need of experts.”
Schools are facing increasing number of cyber attacks. According to the government’s survey of cyber security violations, 60 percent of secondary schools and 44 percent primary schools identified violations or attacks.
An example given by ICO expanded how three years 11 students accessed the information management system of a secondary school, which holds personal information of more than 1,400 students.
The students said that they wanted to “test their skills and knowledge” and used the downloaded equipment to break the password and safety protocol.
Another case saw a student using a staff login to reach the information management system of AA College. The system stored personal information related to over 9,000 employees, students and applicants such as names and home addresses, school records, health data, security and rustic log and emergency contacts.
Further analysis of 215 events found that 23 percent of incidents were left unattainable, such as devices were abandoned, without a legitimate need to use staff devices or employees or without permission to use or data.
20 percent of the incidents occurred due to employees sending data to individual devices and 17 percent were caused by the wrong set up or access to system rights such as Sharepoint.
Only 5 percent of events were identified as internal formulas using refined techniques to bypass safety and network control.