
{"id":45712,"date":"2017-03-06T10:24:18","date_gmt":"2017-03-06T09:24:18","guid":{"rendered":"https:\/\/uniavisen.dk\/paa-ku-hackere-cyberspionage-hverdagskost\/"},"modified":"2017-03-07T13:40:15","modified_gmt":"2017-03-07T12:40:15","slug":"paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal","status":"publish","type":"post","link":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/","title":{"rendered":"Hacking and cyber espionage &#8211; just a normal day at UCPH"},"content":{"rendered":"<p>It is probable that foreign states carry out cyber espionage against Danish public research. This is the assessment of the Center for Cyber \u200b\u200bSecurity (CFCS) which now calls on Danish research centers, and especially universities to protect their research results.<\/p>\n<p>The threat that Danish research institutions are facing is <secret text=\"The scale goes from NO THREAT, to LOW, MEDIUM, HIGH and VERY HIGH\">HIGH<\/secret>, which is the second highest threat assessment by the CFCS which is a unit in the Danish Defence Intelligence Service FE.<\/p>\n<h3>Danish research a target<\/h3>\n<p><secret url=\"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/prt_www40.hentindhold_cms-200x180.jpeg\" text=\"Arkivfoto\">Poul Halkj\u00e6r Nielsen<\/secret> is information security manager at the University of Copenhagen (UCPH) and he confirms that the university experiences attempts at hacking or phishing every day.<\/p>\n<p>&#8220;Like the rest of the world we are a target,&#8221; he says.<\/p>\n<p>According to Poul Halkj\u00e6r Nielsen it is difficult to estimate how often UCPH is exposed to attempts at cyber-intrusion, as not all attempts are discovered.<\/p>\n<p>&#8220;It&#8217;s probably all the time. There are both people and programs that scan the network to find vulnerabilities. And if there is a vulnerability, they get into the network. It&#8217;s an art to ensure that all systems, at the very least, are fundamentally updated,&#8221; says information security manager.<\/p>\n<h3>Tradition for open doors &#8211; also for hackers<\/h3>\n<p>CFCS reckons that hackers have relatively easy access to Danish research because universities and public research uphold a tradition for openness. It makes communities highly vulnerable to cyber attacks.<\/p>\n<blockquote><p>You can look at it as a nightclub with a doorman. Some people we want to have coming in, while others are simply too drunk<\/p>\n<p class=\"quotee\">Poul Halkj\u00e6r Nielsen, information security manager at the University of Copenhagen<\/p>\n<\/blockquote>\n<p>&#8220;Our Internet is indeed an open door. It is not because everyone is allowed into the network, and we also set up a number of criteria, but there is always someone trying to get in. You can look at it as a nightclub with a doorman. Some people we want to have coming in, while others are simply too drunk,&#8221; says Poul Halkj\u00e6r Nielsen and continues:<\/p>\n<p>&#8220;The sun is always up somewhere on the planet, and there is always someone who is awake, and always someone shooting at us.&#8221;<\/p>\n<p>CFCS recommends that management at all levels of Danish universities and research centers make themselves aware of the cyber threat. It is not just an IT technical challenge, it is also about staff and students&#8217; behavior, and about knowledge of network vulnerabilities, the centre writes in its threat assessment.<\/p>\n<h3>Individual responsibility<\/h3>\n<p>Poul Halkj\u00e6r Nielsen emphasises the individual user&#8217;s responsibility.<\/p>\n<p>&#8220;It starts with the individual user and rests ultimately on the individual. UCPH offers a wide range of services, but it&#8217;s you as a user that can often opt in and opt out. You have to look at what you actually work with, and how it must be protected.&#8221;<\/p>\n<p>The University of Copenhagen has released a series of videos describing how to best protect and safeguard the university&#8217;s data and networks. You can find videos, along with advice <a href=\"https:\/\/intranet.ku.dk\/CookieAuth.dll?GetLogon?curl=Z2FmedarbejderguideZ2FitZ2Fstrategi_og_sikkerhedZ2FsikkerhedZ2FSiderZ2Fdefault.aspx&amp;reason=0&amp;formdir=7\">here (needs log-in)<\/a>.<br \/>\n<!-- end of module 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Center for Cyber \u200b\u200bSecurity concludes that Danish research is an easy target for hackers<\/p>\n","protected":false},"author":14,"featured_media":45609,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[46],"tags":[328,319,329,320,304,330],"class_list":["post-45712","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-science","tag-cyberspionage-en","tag-cyberspionage","tag-datasikkerhed-en","tag-datasikkerhed","tag-forskning","tag-forskning-en","expression-portrait_article"],"acf":[],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacking and cyber espionage - just a normal day at UCPH<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking and cyber espionage - just a normal day at UCPH\" \/>\n<meta property=\"og:description\" content=\"Center for Cyber \u200b\u200bSecurity concludes that Danish research is an easy target for hackers\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/\" \/>\n<meta property=\"og:site_name\" content=\"University Post\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uniavis\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-06T09:24:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-07T12:40:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Liv Rossander\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Uniavisen\" \/>\n<meta name=\"twitter:site\" content=\"@Uniavisen\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Liv Rossander\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\\\/\"},\"author\":{\"name\":\"Liv Rossander\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/#\\\/schema\\\/person\\\/842763b6b7295a02e95a5ca8eb2821b6\"},\"headline\":\"Hacking and cyber espionage &#8211; just a normal day at UCPH\",\"datePublished\":\"2017-03-06T09:24:18+00:00\",\"dateModified\":\"2017-03-07T12:40:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\\\/\"},\"wordCount\":529,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uniavisen.dk\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/wordcloud2.jpg\",\"keywords\":[\"cyberspionage\",\"cyberspionage\",\"datasikkerhed\",\"datasikkerhed\",\"forskning\",\"forskning\"],\"articleSection\":[\"Science\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\\\/\",\"url\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\\\/\",\"name\":\"Hacking and cyber espionage - just a normal day at UCPH\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uniavisen.dk\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/wordcloud2.jpg\",\"datePublished\":\"2017-03-06T09:24:18+00:00\",\"dateModified\":\"2017-03-07T12:40:15+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/#\\\/schema\\\/person\\\/842763b6b7295a02e95a5ca8eb2821b6\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uniavisen.dk\\\/en\\\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\\\/#primaryimage\",\"url\":\"https:\\\/\\\/uniavisen.dk\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/wordcloud2.jpg\",\"contentUrl\":\"https:\\\/\\\/uniavisen.dk\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/wordcloud2.jpg\",\"width\":1024,\"height\":768},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacking and cyber espionage &#8211; just a normal day at UCPH\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/#website\",\"url\":\"https:\\\/\\\/uniavisen.dk\\\/\",\"name\":\"University Post\",\"description\":\"Independent of management\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uniavisen.dk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/uniavisen.dk\\\/#\\\/schema\\\/person\\\/842763b6b7295a02e95a5ca8eb2821b6\",\"name\":\"Liv Rossander\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1a921e44962d37d3315f06a2f379ef57bcdde34675badad84706182818a1bc5a?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1a921e44962d37d3315f06a2f379ef57bcdde34675badad84706182818a1bc5a?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1a921e44962d37d3315f06a2f379ef57bcdde34675badad84706182818a1bc5a?s=96&d=identicon&r=g\",\"caption\":\"Liv Rossander\"},\"url\":\"https:\\\/\\\/uniavisen.dk\\\/en\\\/author\\\/liv\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking and cyber espionage - just a normal day at UCPH","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/","og_locale":"en_US","og_type":"article","og_title":"Hacking and cyber espionage - just a normal day at UCPH","og_description":"Center for Cyber \u200b\u200bSecurity concludes that Danish research is an easy target for hackers","og_url":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/","og_site_name":"University Post","article_publisher":"https:\/\/www.facebook.com\/uniavis","article_published_time":"2017-03-06T09:24:18+00:00","article_modified_time":"2017-03-07T12:40:15+00:00","og_image":[{"width":1024,"height":768,"url":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2.jpg","type":"image\/jpeg"}],"author":"Liv Rossander","twitter_card":"summary_large_image","twitter_creator":"@Uniavisen","twitter_site":"@Uniavisen","twitter_misc":{"Written by":"Liv Rossander","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/#article","isPartOf":{"@id":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/"},"author":{"name":"Liv Rossander","@id":"https:\/\/uniavisen.dk\/#\/schema\/person\/842763b6b7295a02e95a5ca8eb2821b6"},"headline":"Hacking and cyber espionage &#8211; just a normal day at UCPH","datePublished":"2017-03-06T09:24:18+00:00","dateModified":"2017-03-07T12:40:15+00:00","mainEntityOfPage":{"@id":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/"},"wordCount":529,"commentCount":0,"image":{"@id":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/#primaryimage"},"thumbnailUrl":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2.jpg","keywords":["cyberspionage","cyberspionage","datasikkerhed","datasikkerhed","forskning","forskning"],"articleSection":["Science"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/","url":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/","name":"Hacking and cyber espionage - just a normal day at UCPH","isPartOf":{"@id":"https:\/\/uniavisen.dk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/#primaryimage"},"image":{"@id":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/#primaryimage"},"thumbnailUrl":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2.jpg","datePublished":"2017-03-06T09:24:18+00:00","dateModified":"2017-03-07T12:40:15+00:00","author":{"@id":"https:\/\/uniavisen.dk\/#\/schema\/person\/842763b6b7295a02e95a5ca8eb2821b6"},"breadcrumb":{"@id":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/#primaryimage","url":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2.jpg","contentUrl":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2.jpg","width":1024,"height":768},{"@type":"BreadcrumbList","@id":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskostat-ucph-hackers-and-cyber-espionage-are-just-normal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uniavisen.dk\/en\/"},{"@type":"ListItem","position":2,"name":"Hacking and cyber espionage &#8211; just a normal day at UCPH"}]},{"@type":"WebSite","@id":"https:\/\/uniavisen.dk\/#website","url":"https:\/\/uniavisen.dk\/","name":"University Post","description":"Independent of management","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uniavisen.dk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/uniavisen.dk\/#\/schema\/person\/842763b6b7295a02e95a5ca8eb2821b6","name":"Liv Rossander","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1a921e44962d37d3315f06a2f379ef57bcdde34675badad84706182818a1bc5a?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1a921e44962d37d3315f06a2f379ef57bcdde34675badad84706182818a1bc5a?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1a921e44962d37d3315f06a2f379ef57bcdde34675badad84706182818a1bc5a?s=96&d=identicon&r=g","caption":"Liv Rossander"},"url":"https:\/\/uniavisen.dk\/en\/author\/liv\/"}]}},"advancedCustomFields":{"expression":{"term_id":14,"name":"Portrait Article","slug":"portrait_article","term_group":0,"term_taxonomy_id":14,"taxonomy":"expression","description":"","parent":0,"count":796,"filter":"raw"},"enable_comments":true,"align_content":"alignleft","feature_color":"","layout_group":[{"acf_fc_layout":"Headline","use_post_title":true,"headline":"","style":"heavy","highlighted_words":"","text_size":"small"},{"acf_fc_layout":"Image","image":{"ID":45609,"id":45609,"title":"wordcloud_Hackere og cyberspionage er hverdag p\u00e5 KU","filename":"wordcloud2.jpg","filesize":96543,"url":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2.jpg","link":"https:\/\/uniavisen.dk\/en\/paa-ku-hackere-cyberspionage-hverdagskost\/wordcloud-2\/","alt":"","author":"14","description":"","caption":"","name":"wordcloud-2","status":"inherit","uploaded_to":45599,"date":"2017-03-02 14:39:00","modified":"2017-03-02 14:39:29","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/uniavisen.dk\/wp-includes\/images\/media\/default.png","width":1024,"height":768,"sizes":{"thumbnail":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2-480x360.jpg","medium-width":480,"medium-height":360,"medium_large":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2-768x576.jpg","medium_large-width":768,"medium_large-height":576,"large":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2.jpg","large-width":1024,"large-height":768,"1536x1536":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2.jpg","1536x1536-width":1024,"1536x1536-height":768,"2048x2048":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2.jpg","2048x2048-width":1024,"2048x2048-height":768,"featured-soft":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2-290x218.jpg","featured-soft-width":290,"featured-soft-height":218,"featured-hard":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2-290x180.jpg","featured-hard-width":290,"featured-hard-height":180,"narrow":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2-700x525.jpg","narrow-width":700,"narrow-height":525,"extended":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2-990x743.jpg","extended-width":990,"extended-height":743}},"style":"narrow","text_placement":"metadata-below","image_link_url":"","image_link_title":"","caption_prefix":"","enable_alternative_caption":false,"alternative_caption":""},{"acf_fc_layout":"Standfirst","subject":"","text":"Center for Cyber \u200b\u200bSecurity concludes that Danish research is an easy target for hackers","use_post_excerpt":false},{"acf_fc_layout":"Byline","is_author":true,"contributors":false},{"acf_fc_layout":"Content","content":"<p>It is probable that foreign states carry out cyber espionage against Danish public research. This is the assessment of the Center for Cyber \u200b\u200bSecurity (CFCS) which now calls on Danish research centers, and especially universities to protect their research results.<\/p>\n<p>The threat that Danish research institutions are facing is <secret text=\"The scale goes from NO THREAT, to LOW, MEDIUM, HIGH and VERY HIGH\">HIGH<\/secret>, which is the second highest threat assessment by the CFCS which is a unit in the Danish Defence Intelligence Service FE.<\/p>\n<h3>Danish research a target<\/h3>\n<p><secret url=\"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/prt_www40.hentindhold_cms-200x180.jpeg\" text=\"Arkivfoto\">Poul Halkj\u00e6r Nielsen<\/secret> is information security manager at the University of Copenhagen (UCPH) and he confirms that the university experiences attempts at hacking or phishing every day.<\/p>\n<p>&#8220;Like the rest of the world we are a target,&#8221; he says.<\/p>\n<p>According to Poul Halkj\u00e6r Nielsen it is difficult to estimate how often UCPH is exposed to attempts at cyber-intrusion, as not all attempts are discovered.<\/p>\n<p>&#8220;It&#8217;s probably all the time. There are both people and programs that scan the network to find vulnerabilities. And if there is a vulnerability, they get into the network. It&#8217;s an art to ensure that all systems, at the very least, are fundamentally updated,&#8221; says information security manager.<\/p>\n<h3>Tradition for open doors &#8211; also for hackers<\/h3>\n<p>CFCS reckons that hackers have relatively easy access to Danish research because universities and public research uphold a tradition for openness. It makes communities highly vulnerable to cyber attacks.<\/p>\n<blockquote><p>You can look at it as a nightclub with a doorman. Some people we want to have coming in, while others are simply too drunk<\/p>\n<p class=\"quotee\">Poul Halkj\u00e6r Nielsen, information security manager at the University of Copenhagen<\/p>\n<\/blockquote>\n<p>&#8220;Our Internet is indeed an open door. It is not because everyone is allowed into the network, and we also set up a number of criteria, but there is always someone trying to get in. You can look at it as a nightclub with a doorman. Some people we want to have coming in, while others are simply too drunk,&#8221; says Poul Halkj\u00e6r Nielsen and continues:<\/p>\n<p>&#8220;The sun is always up somewhere on the planet, and there is always someone who is awake, and always someone shooting at us.&#8221;<\/p>\n<p>CFCS recommends that management at all levels of Danish universities and research centers make themselves aware of the cyber threat. It is not just an IT technical challenge, it is also about staff and students&#8217; behavior, and about knowledge of network vulnerabilities, the centre writes in its threat assessment.<\/p>\n<h3>Individual responsibility<\/h3>\n<p>Poul Halkj\u00e6r Nielsen emphasises the individual user&#8217;s responsibility.<\/p>\n<p>&#8220;It starts with the individual user and rests ultimately on the individual. UCPH offers a wide range of services, but it&#8217;s you as a user that can often opt in and opt out. You have to look at what you actually work with, and how it must be protected.&#8221;<\/p>\n<p>The University of Copenhagen has released a series of videos describing how to best protect and safeguard the university&#8217;s data and networks. You can find videos, along with advice <a href=\"https:\/\/intranet.ku.dk\/CookieAuth.dll?GetLogon?curl=Z2FmedarbejderguideZ2FitZ2Fstrategi_og_sikkerhedZ2FsikkerhedZ2FSiderZ2Fdefault.aspx&amp;reason=0&amp;formdir=7\">here (needs log-in)<\/a>.<\/p>\n"},{"acf_fc_layout":"ArticleEnd"},{"acf_fc_layout":"Banner","img":false,"url":""},{"acf_fc_layout":"OtherStories","headline":"","hand_picked_posts":false,"references":false,"category":false,"theme":false,"number_of_posts":"4","style":"default"}]},"taxonomyData":{"category":[{"term_id":46,"name":"Science","slug":"science","term_group":0,"term_taxonomy_id":46,"taxonomy":"category","description":"","parent":0,"count":831,"filter":"raw"}],"post_tag":[{"term_id":328,"name":"cyberspionage","slug":"cyberspionage-en","term_group":0,"term_taxonomy_id":328,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":319,"name":"cyberspionage","slug":"cyberspionage","term_group":0,"term_taxonomy_id":319,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":329,"name":"datasikkerhed","slug":"datasikkerhed-en","term_group":0,"term_taxonomy_id":329,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw"},{"term_id":320,"name":"datasikkerhed","slug":"datasikkerhed","term_group":0,"term_taxonomy_id":320,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw"},{"term_id":304,"name":"forskning","slug":"forskning","term_group":0,"term_taxonomy_id":304,"taxonomy":"post_tag","description":"","parent":0,"count":118,"filter":"raw"},{"term_id":330,"name":"forskning","slug":"forskning-en","term_group":0,"term_taxonomy_id":330,"taxonomy":"post_tag","description":"","parent":0,"count":10,"filter":"raw"}],"post_format":[],"expression":[{"term_id":14,"name":"Portrait Article","slug":"portrait_article","term_group":0,"term_taxonomy_id":14,"taxonomy":"expression","description":"","parent":0,"count":796,"filter":"raw"}],"translation_priority":[]},"featured_media_url":"https:\/\/uniavisen.dk\/wp-content\/uploads\/2017\/03\/wordcloud2.jpg","_links":{"self":[{"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/posts\/45712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/comments?post=45712"}],"version-history":[{"count":5,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/posts\/45712\/revisions"}],"predecessor-version":[{"id":45784,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/posts\/45712\/revisions\/45784"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/media\/45609"}],"wp:attachment":[{"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/media?parent=45712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/categories?post=45712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uniavisen.dk\/en\/wp-json\/wp\/v2\/tags?post=45712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}