In normal situations the main focus of security is to protect access to data systems and the information they contain. When dealing with automated systems security issues could lead to major economic losses through damaged equipment, or even loss of life!
Security violations normally come from disgruntled employees, but recently anonymous crackers (incorrectly called hackers in the press) have become a significant threat. Modern operating systems and software are often designed with some security features. Most assume that there is limited physical access to the computer. The most elaborate security system doesn’t work if the the hard drive is stolen. The best strategy to keep a system safe is to understand how hackers can break into a computer. What follows are the most common type of attacks.
Social engineering involves the use of people and trust to get access to a computer. This often involves understanding the psychology of trust and exploiting it to get passwords and other information. A common ruse to get an employee password is as follows. Call an employee in a company likely to have a high level of software access, such as a secretary of a high level executive. Claim to be from the IT (Information Technology) department, talk for a while and then ask for help solving a problem with the password account. When agreement is obtained, ask the secretary to change the account password, and let you know what the new one is.
Crackers will also practice ’surfing’. Shoulder surfing involves peeking over the shoulder of users as they enter passwords. Garbage surfing involves taking a garbage can before being emptied and searching the contents for useful information, such as credit card numbers. Cubicle surfing involves checking for posted passwords around computers. Some users hate to remember passwords and will post them for all to see (or sometimes taped to the bottom of the keyboard). To protect against these types of problems the following strategies help,
• allow users to select their own password, they are more likely to remember them, and not write them down. Assigning cryptic passwords and changing them often ensures that even the most advanced users will write it down somewhere.
• check user passwords for simplicity. Problem passwords include a single word in the dictionary, a users first/last name, a first/name followed by ’1’, common jargon and popular phrases, curse words, etc.
• watch the activity of simpler users. One easy way to do this is with the command ’last | more’. This will show a list of users, when they logged in, and how they logged in. Look for irregularities, such as a low end user who suddenly starts using telnet and ftp.
The advent of the Internet has made anonymous crackers more common. Most computers can be accessed from the Internet, even if indirectly. Two major threats include a denial of service (DOS) attack and a break-in. DOS attacks involve flooding a site with irregular network packets, sent from other computers (that were victims of break-ins). The outcome of this attack is that network access slows so much it becomes unusable.
Break-ins occur when a security hole is found in the operating system, or when a virus or trojan horse is downloaded by a user. Security holes in an operating system often involve network services, such as ftp and mail servers. When planning to break into a computer most crackers will first identify which services are active on a computer. After this they will try to exploit known vulnerabilities to get access to the computer. After breaking in they will try to install software so that they will have future access to the computer, and hide their presence. Most crackers will return to the computer they have broken into numerous times until discovered.
Viruses are designed to spread indesciminately and infect computers. Once infected the virus often lays dormant for a while before executing some mission such as spreading to other programs/files, displaying a message, or erasing a hard drive. Like real viruses, the damaging ones often burn-out quickly, the milder ones spread and become a nuisance. Previously these were only spread through downloaded programs, and they could only be activated by somebody running software. Recently viruses have started to exploit holes in consumer oriented software. In simple terms, the same features that make the software easy to use also make it a security threat. This means that users can get viruses from an email message without reading it. Trojan horses are programs that actually do something useful (unlike viruses). but they include some ’unwanted extras’. These might give a cracker access to the system running the trojan horse program, or worse. These can be added to trusted software by modifying the source code of a useful software package, and then releasing it for use. Administrators might download and install the software believing it is the regular version, but instead install the security holes. These security problems can be lessened with the following strategies.
• Security holes can be closed by applying software patches are made available when vulnerabilities are discovered. These should be downloaded and applied whenever available. Security advisories are available from (www.cert.net?) and (www.bugtraq.org?).
When breaking into a computer the goal is to obtain the ’root’ or ’Administrator’ account. If a cracker ever gets a few minutes at the keyboard logged in as ’root’ or ’Administrator’, they can give themselves easy access. System administrators should not leave their account logged in without an automatic screen lock function. The administrator should also track the usage of their account to look for any irregular activities.
9.1 Computers and Hardware[an error occurred while processing this directive]