13.07.2015 Views

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Computer Software <strong>Security</strong>Computer security researcher Steve Gibson is seen in his home office in Laguna Hills, California, in April, 2002. Two years prior, Gibson was testing intrusiondetectionsoftware when he suddenly found a program running on his computer that he had unknowingly installed. The hidden program secretly tagged alongwith another program <strong>and</strong> monitored his Internet habits. AP/WIDE WORLD PHOTOS.100,000 known viruses, with new viruses being detectedliterally every day.Viruses can enter computers via different routes. Acommon route is as an attachment to an email. When theemail is opened the virus is triggered to disrupt whatevercomputer code it has been targeted towards. Viruses thattarget email addresses can distribute themselves to othercomputer very quickly. An infamous example is the “Love”virus, which infected millions of computers worldwidewithin hours of its release in May 2000.There are a wide variety of anti-virus software programsavailable that will recognize, quarantine <strong>and</strong> destroymany of these viruses. Anti-virus programs need tobe updated frequently (often accomplished automatically“on-line” with some vendors products) to keep pace withthe appearance of new viruses.Theft. Next to viruses, theft represents the biggest securityissue for computer users. Various hardware options aredesigned to lessen the chance of theft. Anti-theft softwareis also available. There are several software programs thataim to lessen the usability, <strong>and</strong> so the appeal, of a stolencomputer (particularly laptop computers). In one setup, aregistered identifier number is beamed out when thestolen computer is hooked up to the Internet. Proprietarysoftware can detect <strong>and</strong> even track the location of thesending computer. Another strategy uses motion-sensingsoftware that is adjusted to the motion patterns of thenormal user. A different range of motions that are uncharacteristicof the principle user can trigger an audio alarm.As well, the computer is triggered to shut down <strong>and</strong>reboot. The user then needs to supply a complicatedpassword to use the computer <strong>and</strong> even to read thescrambled files (see below) from the hard drive. Thisprotection occurs even when the computer is shut off.Data encryption <strong>and</strong> ownership. Encryption is the scramblingof the data so as to make the data undecipherable.Encryption programs can scramble the data that is residentin the computer as well as data sent to anothercomputer via email. The message can be reassembled tothe original format if the receiving computer has anencryption program installed.With contracts being sent over the Internet, the ownership<strong>and</strong> legal status of such information has become animportant issue. Digital signatures can be affixed to adocument sent via the Internet to establish ownership, inthe same way that a signature on a paper contract islegally binding. Countries including the United Stateshave sanctioned the use of digital signatures.262 Encyclopedia of <strong>Espionage</strong>, <strong>Intelligence</strong>, <strong>and</strong> <strong>Security</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!