State College, Pa- Students in cyber security spend a lot of time practicing how to defend against hacking. But, far less time is typically spent teaching college students what to do after a hack occurs.
Wednesday, Penn State students were put in that exact situation, during a hack response simulation.
WTAJ was present for the simulation and saw students from varied disciplines present on Wednesday.
When you hear “hack response” you probably think of the tech field. Yes, there were technology students present at Wednesday’s simulation. But, there were also law students present who have to make sure companies follow the proper rules following a hack. This may include mandatory reporting to customers who’ve had their information stolen.
If you have a strong cyber security system, you can’t be hacked right?
“Even if you have the strongest security, it’s still possible,” said PSU Engineering student Petr Esakov.
All it takes is one click from an unsuspecting employee and “poof”…information is stolen.
“You need to know how to deal with those attacks,” Esakov added.
That’s exactly what Penn State students did Wednesday as they were shown a hack, and given 30 minutes to respond as a team to a set of questions.
Questions like: How can the hacker be identified? What was stolen? And who must be legally told their information was stolen?
“That includes people’s who’s data was disclosed, but that also includes state officials, federal officials, and even credit reporting agencies,” said Dickinson Law student Benjamin Cohen, in referencing who an organization may be required to alert after a data breach.
With law and tech students working together, it also simulated approaches businesses can have after a hack.
“They’re gonna be ahead of the curve and save themselves thousands, millions, potentially billions of dollars,” said Anne Mckenna, a Lead Developer of the hack response simulation.