11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

100 computer crime <strong>and</strong> securitycomputer crime <strong>and</strong> securityThe growing economic value <strong>of</strong> information, products, <strong>and</strong>services accessible through computer systems has attractedincreased attention from opportunistic criminals. In particular,the many potential vulnerabilities <strong>of</strong> online systems<strong>and</strong> the Internet have made computer crime attractive <strong>and</strong>pose significant challenges to pr<strong>of</strong>essionals whose task it isto secure such systems.The motivations <strong>of</strong> persons who use computer systemsin unauthorized ways vary. Some hackers primarily seekdetailed knowledge <strong>of</strong> systems, while others (<strong>of</strong>ten teenagers)seek “bragging rights.” Other intruders have the moretraditional criminal motive <strong>of</strong> gaining access to informationsuch as credit card numbers <strong>and</strong> personal identities thatcan be used to make unauthorized purchases (see identitytheft). <strong>Computer</strong> access can also be used to intimidate (seecyberstalking <strong>and</strong> harassment), as well as for extortion,espionage, sabotage, or terrorism (see cyberterrorism).Attacking <strong>and</strong> defending information infrastructure is nowa vital part <strong>of</strong> military <strong>and</strong> homel<strong>and</strong> security planning (seeinformation warfare).According to the federal Internet Crime Complaint Center,in 2006 the most commonly reported computer-relatedcrime was auction-related fraud (44.9 percent), followed bynondelivery <strong>of</strong> goods (19 percent)—these no doubt reflectthe high volume <strong>of</strong> auction <strong>and</strong> e-commerce transactions.Various forms <strong>of</strong> financial fraud (including identity theft)make up most <strong>of</strong> the rest.The new emphasis on the terrorist threat following September11, 2001, has included some additional attention tocyberterrorism, or the attack on computers controlling keyinfrastructure (including banks, water <strong>and</strong> power systems,air traffic control, <strong>and</strong> so on). So far ideologically inspiredattacks on computer systems have mainly amounted tosimple electronic v<strong>and</strong>alism <strong>of</strong> Web sites. Internal systemsbelonging to federal agencies <strong>and</strong> the military tend to berelatively protected <strong>and</strong> isolated from direct contact withthe Internet. However, the possibility <strong>of</strong> a crippling attackor electronic hijacking cannot be ruled out. Commercialsystems may be more vulnerable to denial-<strong>of</strong>-service attacks(see below) that cause economic losses by preventing consumersfrom accessing services.Forms <strong>of</strong> AttackSurveillance-based attacks involve scanning Internet trafficfor purposes <strong>of</strong> espionage or obtaining valuable information.Not only businesses but also the growing number <strong>of</strong>Internet users with “always-on” Internet connections (seebroadb<strong>and</strong>) are vulnerable to “packet-sniffing” s<strong>of</strong>twarethat exploits vulnerabilities in the networking s<strong>of</strong>tware oroperating system. The main line <strong>of</strong> defense against suchattacks is the s<strong>of</strong>tware or hardware firewall, which both“hides” the addresses <strong>of</strong> the main computer or network <strong>and</strong>identifies <strong>and</strong> blocks packets associated with the commonforms <strong>of</strong> attack (see firewall).In the realm <strong>of</strong> harassment or sabotage, a “denial <strong>of</strong> service”(DOS) attack can flood the target system with packetsthat request acknowledgment (an essential feature <strong>of</strong> networkoperation). This can tie up the system so that a Webserver, for example, can no longer respond to user requests,making the page inaccessible. More sophisticated DOSattacks can be launched by first using viruses to insert programsin a number <strong>of</strong> computers (a so-called botnet), <strong>and</strong>then instructing the programs to simultaneously launchattacks from a variety <strong>of</strong> locations.<strong>Computer</strong> viruses can also be used to r<strong>and</strong>omly v<strong>and</strong>alizecomputers, impeding operation or destroying data (seecomputer virus). But a virus can also be surreptitiouslyinserted as a “Trojan horse” into a computer’s operating systemwhere it can intercept passwords <strong>and</strong> other information,sending them to the person who planted the virus. Viruseswere originally spread through infected floppy disks (<strong>of</strong>ten“bootleg” copies <strong>of</strong> s<strong>of</strong>tware). Today, however, the Internetis the main route <strong>of</strong> access, with viruses embedded in e-mailattachments. This is possible because many e-mail <strong>and</strong> otherprograms have the ability to execute programs (scripts) thatthey receive. The main defense against viruses is regularuse <strong>of</strong> antivirus s<strong>of</strong>tware, turning <strong>of</strong>f scripting capabilitiesunless absolutely necessary, <strong>and</strong> making a policy <strong>of</strong> notopening unknown or suspicious-looking e-mail attachmentsas well as messages that pretend to be from reputable banksor other agencies (see phishing <strong>and</strong> spo<strong>of</strong>ing).<strong>Computer</strong> SecurityBecause there are a variety <strong>of</strong> vulnerabilities <strong>of</strong> computersystems <strong>and</strong> <strong>of</strong> corresponding types <strong>of</strong> attacks, computersecurity is a multifaceted discipline. The vulnerability <strong>of</strong>computer systems is not solely technical in nature. Sometimesthe weakest link in a system is the human link.Hackers are <strong>of</strong>ten adept at a technique they call “socialengineering.” This involves tricking computer operatorsinto giving out sensitive information (such as passwords)by masquerading as a colleague or someone else who mighthave a legitimate need for the information.Since computer crimes <strong>and</strong> attacks can take so manyforms, the best defense is layered or in depth. It includesappropriate s<strong>of</strong>tware (firewalls <strong>and</strong> antivirus programs,<strong>and</strong> network monitoring programs for larger installations).It emphasizes proper training <strong>of</strong> personnel, ranging fromsecurity investigators to clerical users. Finally, if informationis compromised, the use <strong>of</strong> strong encryption can makeit much less likely to be usable (see encryption).While the flexibility <strong>and</strong> speed <strong>of</strong> the Internet can aidattackers, it can also facilitate defense. Emergency responsenetworks <strong>and</strong> major vendors <strong>of</strong> antivirus s<strong>of</strong>tware canquickly disseminate protective code or “patches” that closevulnerabilities in operating systems or applications.The growing concern about vulnerability to computerintrusion <strong>and</strong> information theft has also been reflected inattempts to make operating systems inherently more secure.The introduction <strong>of</strong> new security features in Micros<strong>of</strong>t WindowsVista has received mixed reviews. Some features, suchas User Account Control, make it harder for viruses orother automated attacks to access critical system resources,but also annoy users by constant requests for permission tocarry out common tasks. This reflects a fundamental truth:Security features that make everyday computing moretedious tend to be turned <strong>of</strong>f or bypassed by users.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!