
{"id":100189,"date":"2020-02-05T11:10:32","date_gmt":"2020-02-05T10:10:32","guid":{"rendered":"http:\/\/uniavisen.dk\/hackere-har-faaet-koebenhavns-universitet-til-at-indfoere-besvaerligt-login\/"},"modified":"2020-02-05T11:13:41","modified_gmt":"2020-02-05T10:13:41","slug":"the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers","status":"publish","type":"post","link":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/","title":{"rendered":"The University of Copenhagen beefs up cybersecurity in response to hackers"},"content":{"rendered":"<p>In June 2019, news broke that <a href=\"https:\/\/kunet.ku.dk\/nyhedsrum\/nyheder\/Sider\/It-nyt-phishing-angreb.aspx\">500 employees of the university<\/a> had clicked on an email sent by hackers, thereby leaking personal information. Within the last year, the university has been subject to an additional three attacks perpetrated by hackers.<\/p>\n<p>In response to the threat, the University of Copenhagen has implemented a new, so-called two-factor authentication method which requires users to authenticate computer logins to the email system via their smartphones whenever their computers are disconnected from the University of Copenhagen network.<\/p>\n<p>The new system is a nuisance according to the students, the University Post has been in contact with.<\/p>\n<p>Mads Buhl Pedersen, a second-year student of political science, appreciates the importance of preventing hackers from attacking the university, but says the method is not without problems.<\/p>\n<p>\u00bbAs a student, it\u2019s frustrating that you need to use your phone every time, you want to log in to check your email inbox\u2014which is to say on a daily basis. My phone often runs out of power during the day, so I can\u2019t read or write e-mails,\u00ab he says.<\/p>\n<h3>Special measures for people over 30?<\/h3>\n<p>Kim Otto Ursin Johansen is head of a team at the university\u2019s central IT-department, KU-IT, working on improving cybersecurity. According to him, the old system, which relied on a personal username and a password, was to easy for hackers to abuse.<\/p>\n<p>\u00bbUsing false e-mails, they attempt to access the system and have users share data with them. Typically, they are looking for KU-usernames and passwords. When they obtain them, all of the features that are available to users are now available to them. In the past, we only relied on a username and a password to access a host of systems, including KUnet, KU-mail, and web files. Once a hacker has access, he or she can abuse or destroy people\u2019s data.\u00ab<\/p>\n<p>Students like Mads Buhl Pedersen argue that the university ought to apply a mandatory e-mail filter that screens for phishing e-mails on accounts belonging to anyone over the age of 30.<\/p>\n<blockquote><p>Younger students know not to hand out personal information online, when they received e-mails from unknown senders.<\/p>\n<p class=\"quotee\">Mads Buhl-Pedersen, student<\/p>\n<\/blockquote>\n<p>\u00bbYounger students know not to hand out personal information online, when they received e-mails from unknown senders,\u00ab he says.<\/p>\n<p>Kim Otto Ursin Johansen from KU-IT cannot help but laugh at the suggestion.<\/p>\n<p>\u00bbExperts on cybersecurity all agree that two-factor authentication is the way to go. If someone steals your KU-username and password they can abuse it. For an example, criminals are able to send out more spam e-mails from one user to other users. The more data they have, the more credible the e-mail look, which means more people are likely to fall for it,\u00ab he says.<\/p>\n<p>\u00bbYou can buy phishing software from criminals just like you would by the Office suite. It sounds absurd, but that\u2019s what\u2019s going on. With two-factor authentication we can combat them,\u00ab says Kim Otto Ursin Johansen.<\/p>\n<h3>Why secure the candy drawer before the money safe?<\/h3>\n<p>At the Faculty of Law, first-year student S\u00f8ren Claudi is baffled by the university\u2019s decision to focus on securing the e-mail system first, when the intranet contains more sensitive data:<\/p>\n<p>\u00bbIf a hacker were to gain access to my KUnet account, he or she could access to my grades, my social security number, etc. Accessing my email, the hacker would only see my correspondences with professors,\u00ab says S\u00f8ren Claudi.<\/p>\n<p>\u00bbThe way I see it, the university is prioritizing adding an extra lock to the candy drawer, when they should be focusing on securing the money safe,\u00ab he says.<\/p>\n<p>The University Post has asked Kim Otto Ursin Johansen why two-factor authentication has yet to be implemented on KUnet.<\/p>\n<p>\u00bbKUnet is an obvious candidate for implementation of two-factor authentication, but the e-mail system is also a quite vulnerable area,\u00ab he says. \u00bbWe have a policy at the University of Copenhagen of sending social security numbers via the internal e-mail system when need be.\u00ab<\/p>\n<p>An article from <a href=\"https:\/\/www.bbc.com\/news\/education-47805451\">the BBC details how easily a hacker<\/a> can force his or her way into a university network in less than two hours.<\/p>\n<h3>Login options<\/h3>\n<p>Last fall, shortly after the implementation of two-factor authentication, history student Sigrid Boel Jacobsen left for the United States, and she found it frustrating that she was not able to access her KU-mail using an American SIM card on her phone, as her e-mail account was connected to her Danish SIM card. This prevented her from emailing her instructors.<\/p>\n<blockquote><p>You can download a separate app and connect to the two-factor authentication system and thus avoid using a phone number and a SIM card all together.<\/p>\n<p class=\"quotee\">Kim Otto Ursin Johansen, KU-IT<\/p>\n<\/blockquote>\n<p>\u00bbWe need more options in terms of accessing web-mail using two-factor authentication,\u00ab says Kim Otto Ursin Johansen from KU-IT.<\/p>\n<p>\u00bbUsing a phone is the standard option. However, if you are travelling, you can also use the NET-IQ app which is part of the two-factor authentication system. You can also use Google Authenticator or Microsoft Authenticator. So, you can download a separate app and connect to the two-factor authentication system and thus avoid using a phone number and a SIM card all together,\u00ab he says.<\/p>\n<p>\u00bbAnother option is to use a Fido 2-key, a small USB drive which costs about 150-200 kroner. You put it in your computer and use it as a virtual key. One final solution is installing a mail client on your computer to download your e-mails. There\u2019s a guide to setting this up in the system.\u00ab<\/p>\n<p>\u00bbWe\u2019re not trying to bother anyone. We want to help, but cybersecurity is our main priority,\u00ab says Kim Otto Ursin Johansen.<\/p>\n<p><em>Translation: Theis Duelund<\/em><br \/>\n<!-- end of module 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Students, accessing their emails, report difficulties with the new two-factor authentication method. According to the IT-department, there isn\u2019t much to do about it.<\/p>\n","protected":false},"author":7,"featured_media":99798,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[44],"tags":[300,1003,2969,1632,296],"class_list":["post-100189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-campus","tag-it","tag-it-sikkerhed-en","tag-kim-otto-ursin-johansen-en","tag-mobiltelefon-en","tag-studieliv-en","expression-news_article"],"acf":[],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The University of Copenhagen beefs up cybersecurity in response to hackers<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The University of Copenhagen beefs up cybersecurity in response to hackers\" \/>\n<meta property=\"og:description\" content=\"Students, accessing their emails, report difficulties with the new two-factor authentication method. According to the IT-department, there isn\u2019t much to do about it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"University Post\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uniavis\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/christoffer.zieler\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-05T10:10:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-05T10:13:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Christoffer Zieler\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Uniavisen\" \/>\n<meta name=\"twitter:site\" content=\"@Uniavisen\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christoffer Zieler\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\\\/\"},\"author\":{\"name\":\"Christoffer Zieler\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/#\\\/schema\\\/person\\\/a96cc389f544930451424dd312b34b8c\"},\"headline\":\"The University of Copenhagen beefs up cybersecurity in response to hackers\",\"datePublished\":\"2020-02-05T10:10:32+00:00\",\"dateModified\":\"2020-02-05T10:13:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\\\/\"},\"wordCount\":956,\"image\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uniavisen.dk\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/designudennavn.jpg\",\"keywords\":[\"IT\",\"it-sikkerhed\",\"Kim Otto Ursin Johansen\",\"mobiltelefon\",\"studieliv\"],\"articleSection\":[\"Campus\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\\\/\",\"url\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\\\/\",\"name\":\"The University of Copenhagen beefs up cybersecurity in response to hackers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uniavisen.dk\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/designudennavn.jpg\",\"datePublished\":\"2020-02-05T10:10:32+00:00\",\"dateModified\":\"2020-02-05T10:13:41+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/#\\\/schema\\\/person\\\/a96cc389f544930451424dd312b34b8c\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uniavisen.dk\\\/en\\\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/uniavisen.dk\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/designudennavn.jpg\",\"contentUrl\":\"https:\\\/\\\/uniavisen.dk\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/designudennavn.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Studerende foresl\u00e5r, at K\u00f8benhavns Universitet m\u00e5lretter sikkerhedstiltag til folk over 30 og lader de unge it-brugere v\u00e6re i fred.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The University of Copenhagen beefs up cybersecurity in response to hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/#website\",\"url\":\"https:\\\/\\\/uniavisen.dk\\\/\",\"name\":\"University Post\",\"description\":\"Independent of management\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uniavisen.dk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/#\\\/schema\\\/person\\\/a96cc389f544930451424dd312b34b8c\",\"name\":\"Christoffer Zieler\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4bf8592c5d42f63ff76abd26557ba3887d83a2e784a2508b81d423cf582346fa?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4bf8592c5d42f63ff76abd26557ba3887d83a2e784a2508b81d423cf582346fa?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4bf8592c5d42f63ff76abd26557ba3887d83a2e784a2508b81d423cf582346fa?s=96&d=identicon&r=g\",\"caption\":\"Christoffer Zieler\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/christoffer.zieler\"],\"url\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/author\\\/christoffer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The University of Copenhagen beefs up cybersecurity in response to hackers","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/","og_locale":"en_US","og_type":"article","og_title":"The University of Copenhagen beefs up cybersecurity in response to hackers","og_description":"Students, accessing their emails, report difficulties with the new two-factor authentication method. According to the IT-department, there isn\u2019t much to do about it.","og_url":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/","og_site_name":"University Post","article_publisher":"https:\/\/www.facebook.com\/uniavis","article_author":"https:\/\/www.facebook.com\/christoffer.zieler","article_published_time":"2020-02-05T10:10:32+00:00","article_modified_time":"2020-02-05T10:13:41+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn.jpg","type":"image\/jpeg"}],"author":"Christoffer Zieler","twitter_card":"summary_large_image","twitter_creator":"@Uniavisen","twitter_site":"@Uniavisen","twitter_misc":{"Written by":"Christoffer Zieler","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/#article","isPartOf":{"@id":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/"},"author":{"name":"Christoffer Zieler","@id":"https:\/\/uniavisen.dk\/#\/schema\/person\/a96cc389f544930451424dd312b34b8c"},"headline":"The University of Copenhagen beefs up cybersecurity in response to hackers","datePublished":"2020-02-05T10:10:32+00:00","dateModified":"2020-02-05T10:13:41+00:00","mainEntityOfPage":{"@id":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/"},"wordCount":956,"image":{"@id":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn.jpg","keywords":["IT","it-sikkerhed","Kim Otto Ursin Johansen","mobiltelefon","studieliv"],"articleSection":["Campus"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/","url":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/","name":"The University of Copenhagen beefs up cybersecurity in response to hackers","isPartOf":{"@id":"https:\/\/uniavisen.dk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/#primaryimage"},"image":{"@id":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn.jpg","datePublished":"2020-02-05T10:10:32+00:00","dateModified":"2020-02-05T10:13:41+00:00","author":{"@id":"https:\/\/uniavisen.dk\/#\/schema\/person\/a96cc389f544930451424dd312b34b8c"},"breadcrumb":{"@id":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/#primaryimage","url":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn.jpg","contentUrl":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn.jpg","width":2560,"height":1707,"caption":"Studerende foresl\u00e5r, at K\u00f8benhavns Universitet m\u00e5lretter sikkerhedstiltag til folk over 30 og lader de unge it-brugere v\u00e6re i fred."},{"@type":"BreadcrumbList","@id":"https:\/\/uniavisen.dk\/en\/the-university-of-copenhagen-beefs-up-cybersecurity-in-response-to-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uniavisen.dk\/en\/"},{"@type":"ListItem","position":2,"name":"The University of Copenhagen beefs up cybersecurity in response to hackers"}]},{"@type":"WebSite","@id":"https:\/\/uniavisen.dk\/#website","url":"https:\/\/uniavisen.dk\/","name":"University Post","description":"Independent of management","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uniavisen.dk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/uniavisen.dk\/#\/schema\/person\/a96cc389f544930451424dd312b34b8c","name":"Christoffer Zieler","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4bf8592c5d42f63ff76abd26557ba3887d83a2e784a2508b81d423cf582346fa?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4bf8592c5d42f63ff76abd26557ba3887d83a2e784a2508b81d423cf582346fa?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4bf8592c5d42f63ff76abd26557ba3887d83a2e784a2508b81d423cf582346fa?s=96&d=identicon&r=g","caption":"Christoffer Zieler"},"sameAs":["https:\/\/www.facebook.com\/christoffer.zieler"],"url":"https:\/\/uniavisen.dk\/en\/author\/christoffer\/"}]}},"advancedCustomFields":{"layout_group":[{"acf_fc_layout":"Headline","use_post_title":true,"headline":"","style":"default","highlighted_words":"","text_size":"small"},{"acf_fc_layout":"Image","image":{"ID":99797,"id":99797,"title":"Design uden navn","filename":"designudennavn-scaled.jpg","filesize":610033,"url":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn-scaled.jpg","link":"https:\/\/uniavisen.dk\/en\/hackere-har-faaet-koebenhavns-universitet-til-at-indfoere-besvaerligt-login\/design-uden-navn-7\/","alt":"","author":"7","description":"","caption":"Studerende foresl\u00e5r, at K\u00f8benhavns Universitet m\u00e5lretter sikkerhedstiltag til folk over 30 og lader de unge it-brugere v\u00e6re i fred.","name":"design-uden-navn-7","status":"inherit","uploaded_to":99795,"date":"2020-01-24 12:42:04","modified":"2020-01-24 12:43:36","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/uniavisen.dk\/wp-includes\/images\/media\/default.png","width":2560,"height":1707,"sizes":{"thumbnail":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn-480x320.jpg","medium-width":480,"medium-height":320,"medium_large":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn-768x512.jpg","medium_large-width":768,"medium_large-height":512,"large":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn-1280x853.jpg","large-width":1280,"large-height":853,"1536x1536":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn-1536x1024.jpg","1536x1536-width":1536,"1536x1536-height":1024,"2048x2048":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn-2048x1365.jpg","2048x2048-width":2048,"2048x2048-height":1365,"featured-soft":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn-290x193.jpg","featured-soft-width":290,"featured-soft-height":193,"featured-hard":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn-290x180.jpg","featured-hard-width":290,"featured-hard-height":180,"narrow":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn-700x467.jpg","narrow-width":700,"narrow-height":467,"extended":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn-990x660.jpg","extended-width":990,"extended-height":660}},"style":"full","text_placement":"metadata-below","image_link_url":"","image_link_title":"","caption_prefix":"","enable_alternative_caption":true,"alternative_caption":"Students suggest implementing special security measures for people over 30."},{"acf_fc_layout":"Standfirst","subject":"IT-security","text":"Studerende fort\u00e6ller, at de har problemer med at bruge ny tofaktorgodkendelse, n\u00e5r de vil l\u00e6se eller sende mails. Men der er ikke noget at g\u00f8re, siger it-ansvarlig.","use_post_excerpt":true},{"acf_fc_layout":"Byline","is_author":false,"contributors":[{"use_registered_user":false,"user":false,"contributor_name":"Mikael Leon Sokoler","contributor_title":"Student reporter","contributor_image":false}]},{"acf_fc_layout":"Content","content":"<p>In June 2019, news broke that <a href=\"https:\/\/kunet.ku.dk\/nyhedsrum\/nyheder\/Sider\/It-nyt-phishing-angreb.aspx\">500 employees of the university<\/a> had clicked on an email sent by hackers, thereby leaking personal information. Within the last year, the university has been subject to an additional three attacks perpetrated by hackers.<\/p>\n<p>In response to the threat, the University of Copenhagen has implemented a new, so-called two-factor authentication method which requires users to authenticate computer logins to the email system via their smartphones whenever their computers are disconnected from the University of Copenhagen network.<\/p>\n<p>The new system is a nuisance according to the students, the University Post has been in contact with.<\/p>\n<p>Mads Buhl Pedersen, a second-year student of political science, appreciates the importance of preventing hackers from attacking the university, but says the method is not without problems.<\/p>\n<p>\u00bbAs a student, it\u2019s frustrating that you need to use your phone every time, you want to log in to check your email inbox\u2014which is to say on a daily basis. My phone often runs out of power during the day, so I can\u2019t read or write e-mails,\u00ab he says.<\/p>\n<h3>Special measures for people over 30?<\/h3>\n<p>Kim Otto Ursin Johansen is head of a team at the university\u2019s central IT-department, KU-IT, working on improving cybersecurity. According to him, the old system, which relied on a personal username and a password, was to easy for hackers to abuse.<\/p>\n<p>\u00bbUsing false e-mails, they attempt to access the system and have users share data with them. Typically, they are looking for KU-usernames and passwords. When they obtain them, all of the features that are available to users are now available to them. In the past, we only relied on a username and a password to access a host of systems, including KUnet, KU-mail, and web files. Once a hacker has access, he or she can abuse or destroy people\u2019s data.\u00ab<\/p>\n<p>Students like Mads Buhl Pedersen argue that the university ought to apply a mandatory e-mail filter that screens for phishing e-mails on accounts belonging to anyone over the age of 30.<\/p>\n<blockquote><p>Younger students know not to hand out personal information online, when they received e-mails from unknown senders.<\/p>\n<p class=\"quotee\">Mads Buhl-Pedersen, student<\/p>\n<\/blockquote>\n<p>\u00bbYounger students know not to hand out personal information online, when they received e-mails from unknown senders,\u00ab he says.<\/p>\n<p>Kim Otto Ursin Johansen from KU-IT cannot help but laugh at the suggestion.<\/p>\n<p>\u00bbExperts on cybersecurity all agree that two-factor authentication is the way to go. If someone steals your KU-username and password they can abuse it. For an example, criminals are able to send out more spam e-mails from one user to other users. The more data they have, the more credible the e-mail look, which means more people are likely to fall for it,\u00ab he says.<\/p>\n<p>\u00bbYou can buy phishing software from criminals just like you would by the Office suite. It sounds absurd, but that\u2019s what\u2019s going on. With two-factor authentication we can combat them,\u00ab says Kim Otto Ursin Johansen.<\/p>\n<h3>Why secure the candy drawer before the money safe?<\/h3>\n<p>At the Faculty of Law, first-year student S\u00f8ren Claudi is baffled by the university\u2019s decision to focus on securing the e-mail system first, when the intranet contains more sensitive data:<\/p>\n<p>\u00bbIf a hacker were to gain access to my KUnet account, he or she could access to my grades, my social security number, etc. Accessing my email, the hacker would only see my correspondences with professors,\u00ab says S\u00f8ren Claudi.<\/p>\n<p>\u00bbThe way I see it, the university is prioritizing adding an extra lock to the candy drawer, when they should be focusing on securing the money safe,\u00ab he says.<\/p>\n<p>The University Post has asked Kim Otto Ursin Johansen why two-factor authentication has yet to be implemented on KUnet.<\/p>\n<p>\u00bbKUnet is an obvious candidate for implementation of two-factor authentication, but the e-mail system is also a quite vulnerable area,\u00ab he says. \u00bbWe have a policy at the University of Copenhagen of sending social security numbers via the internal e-mail system when need be.\u00ab<\/p>\n<p>An article from <a href=\"https:\/\/www.bbc.com\/news\/education-47805451\">the BBC details how easily a hacker<\/a> can force his or her way into a university network in less than two hours.<\/p>\n<h3>Login options<\/h3>\n<p>Last fall, shortly after the implementation of two-factor authentication, history student Sigrid Boel Jacobsen left for the United States, and she found it frustrating that she was not able to access her KU-mail using an American SIM card on her phone, as her e-mail account was connected to her Danish SIM card. This prevented her from emailing her instructors.<\/p>\n<blockquote><p>You can download a separate app and connect to the two-factor authentication system and thus avoid using a phone number and a SIM card all together.<\/p>\n<p class=\"quotee\">Kim Otto Ursin Johansen, KU-IT<\/p>\n<\/blockquote>\n<p>\u00bbWe need more options in terms of accessing web-mail using two-factor authentication,\u00ab says Kim Otto Ursin Johansen from KU-IT.<\/p>\n<p>\u00bbUsing a phone is the standard option. However, if you are travelling, you can also use the NET-IQ app which is part of the two-factor authentication system. You can also use Google Authenticator or Microsoft Authenticator. So, you can download a separate app and connect to the two-factor authentication system and thus avoid using a phone number and a SIM card all together,\u00ab he says.<\/p>\n<p>\u00bbAnother option is to use a Fido 2-key, a small USB drive which costs about 150-200 kroner. You put it in your computer and use it as a virtual key. One final solution is installing a mail client on your computer to download your e-mails. There\u2019s a guide to setting this up in the system.\u00ab<\/p>\n<p>\u00bbWe\u2019re not trying to bother anyone. We want to help, but cybersecurity is our main priority,\u00ab says Kim Otto Ursin Johansen.<\/p>\n<p><em>Translation: Theis Duelund<\/em><\/p>\n"},{"acf_fc_layout":"ArticleEnd"},{"acf_fc_layout":"Newsletter","lang_select":"Dansk","identifier":"Nyhedsbrev","headline":"Modtag et ugentligt nyhedsoverblik i din inbox","button_text":"Tilmeld nu","class":""},{"acf_fc_layout":"OtherStories","headline":"","hand_picked_posts":false,"references":false,"category":false,"theme":false,"number_of_posts":"4","style":"default"}],"expression":{"term_id":15,"name":"News Article","slug":"news_article","term_group":0,"term_taxonomy_id":15,"taxonomy":"expression","description":"","parent":0,"count":11493,"filter":"raw"},"enable_comments":true,"align_content":"alignleft","feature_color":""},"taxonomyData":{"category":[{"term_id":44,"name":"Campus","slug":"campus","term_group":0,"term_taxonomy_id":44,"taxonomy":"category","description":"","parent":0,"count":1547,"filter":"raw"}],"post_tag":[{"term_id":300,"name":"IT","slug":"it","term_group":0,"term_taxonomy_id":300,"taxonomy":"post_tag","description":"","parent":0,"count":12,"filter":"raw"},{"term_id":1003,"name":"it-sikkerhed","slug":"it-sikkerhed-en","term_group":0,"term_taxonomy_id":1003,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":2969,"name":"Kim Otto Ursin Johansen","slug":"kim-otto-ursin-johansen-en","term_group":0,"term_taxonomy_id":2969,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":1632,"name":"mobiltelefon","slug":"mobiltelefon-en","term_group":0,"term_taxonomy_id":1632,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":296,"name":"studieliv","slug":"studieliv-en","term_group":0,"term_taxonomy_id":296,"taxonomy":"post_tag","description":"","parent":0,"count":21,"filter":"raw"}],"post_format":[],"expression":[{"term_id":15,"name":"News Article","slug":"news_article","term_group":0,"term_taxonomy_id":15,"taxonomy":"expression","description":"","parent":0,"count":11493,"filter":"raw"}],"translation_priority":[]},"featured_media_url":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2020\/01\/designudennavn-1280x853.jpg","_links":{"self":[{"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/posts\/100189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/comments?post=100189"}],"version-history":[{"count":5,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/posts\/100189\/revisions"}],"predecessor-version":[{"id":100205,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/posts\/100189\/revisions\/100205"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/media\/99798"}],"wp:attachment":[{"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/media?parent=100189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/categories?post=100189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/tags?post=100189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}