Untangling The Web Tuesday/Thursday 10:50am-12:00pm The 21st Century: When War is Fought Through the Web November 24, 2010 |Created by: Travis Francis My Webpage: http://uhaweb.hartford.edu/TFRANCIS/Paper.html The 21st Century: When War is Fought Through The Web Travis Francis The 21st Century: When War is Fought Through the Web Recently Purdue University thought they had a minor glitch in their campus network, only to find out the system had been hacked. The culprit gained access to about 100 passwords of students and employees and was able to obtain some personal information. This put the school in a panic and they had to find the best solution to recover from this incident. Due to the increase in hacking activity, technology officers face the continuing challenges of maintaining sensitive data on campus networks and finding secure methods to protect the data. We first have to look at the intent of a hacker. A hacker wants the easy route in life; they are similar to drug dealers in that they want the fast cash and want to be anonymous and hard to track down. Most hackers are looking for social security and credit card numbers so they can access your financial records. Could the hacker’s intent be more innocent, like they are looking to dump movies or send out junk e-mails? Maybe, but not likely. We do know from previous knowledge that hackers are often bad news and bring problems to your software. Purdue acting proactively, sent emails to all 60,000 students, faculty members and employees on the main campus asking them to change their network passwords. Within 24 hours about 15,000 people had changed their passwords. By day four, more than fifty percent 1|P age Travis Francis The 21st Century: When War is Fought Through The Web of the professors and 38 percent of the students had changed their passwords. There was mixed emotions regarding the incident. Some felt it was not a big deal, while others felt the network should always work and they were being inconvenienced. I can relate to this incident personally. A friend had their computer hacked partially because of his confidence that the network was safe and it’s not a big deal. He used short cuts and didn’t have firewalls up because they thought it was a waste of time, until his computer was hacked and crucial banking information was stolen. At this point, the damage is done. Do not under estimate a hacker’s ability! They are very computersavvy and they attack those who are not computer savvy. There are steps that could be taken to avoid hacking. Users could be forced to change passwords. It’s also a good idea to have a series of passwords that you use for different websites just so you don’t become too predictable. The more passwords you have the better off you are. You should never leave passwords lying around on your desk or left on a sticky note, that can lead to a co-worker hacking into your system. Doing so will lead you prone to having your information hacked. Another more expensive measure would be to equip every campus machine with hardware called a one-time-password-token device. The drawbacks to taking these types of measures is colleges prefer to keep their networks open and accessible. 2|P age Travis Francis The 21st Century: When War is Fought Through The Web Although instituting campus wide password changes could be a logistical nightmare, Purdue did require all campus network users to accept new randomly generated password. If the technology officers are able to identify either the hacker’s intentions or identity, they may be able to determine which servers need to be made more secure. The idea to help eliminate this problem is let people know what is going on and ask for their help protecting the data. Purdue University is not alone; others are finding themselves in the same position. For example, California State University at Hayward, network was attacked by a hacker, compromising personal information for over 2,000 people. Hayward officials within five days of the attack sent apology letters to the people whose personal information may have been exposed. Another reason the officials had to move quickly is because a California Law passed in 2003 requires that within 10 days of an attack, public universities must notify anyone whose personal information may have been exposed. Other schools in California have had their networks attacked by Hackers, California Polytechnic State University and Berkeley. Large universities can afford to implement the more expensive measures to prevent hackers from being successful. They can afford to invest substantial money and staff hours to react when the hacking occurs. As a result of this, the hackers are attacking the smaller universities because they often leave their networks relatively unprotected. One has to remember hackers don’t want to work too hard and they can be 3|P age Travis Francis The 21st Century: When War is Fought Through The Web compared to a robber. A robber is not going to break into a store with a cop in it and hackers are not going to break into a secured network because they don’t want to get caught. Colleges and universities should have a plan in place and be able to act quickly against these hackers. They need to tell students and professors right away what happened and request they change their passwords as soon as possible. They need to form a plan before making a fix. They also need to try and track down the hackers and try to find out what their intent was. Knowing what the hacker’s motives are will help in reaching an applicable solution to the problem. Another thought that should be considered in shutting down the network and to keep a close eye on the servers. They need to analyze what happened and what went wrong, so they can be pro-active and be prepared for the next time the hacking may occur. You just have to remember that there are different kinds of hackers. Some hackers use expensive and highly function malware. Malware in short is Software developed for the purpose of causing harm to a computer system. If you are as proactive as possible then you will be a safe internet user and enjoy the web without being at risk for being invaded by criminal activity. This article was interesting and very informative. I think hacking is a growing problem and more people will experience the headaches and inconveniences that occur when your network has been hacked. One of the best ways I believe to address this issue is to educate people and make them realize how important it is that they make their networks secure. After reading this, I pondered over the question as to why some people could feel that hacking is ethical and not criminal. Some people may feel that hackers are bad. Other may say that actually, hackers are merely computer 4|P age Travis Francis The 21st Century: When War is Fought Through The Web programmers who go in to someone else's code and reorganize it somehow. Some say the opposite; hackers are programmers to whom we owe a lot of thanks for working out troubles in software and the Internet. Do you agree with this statement? I do not. I believe that hacking should be considered criminal. Any computer hacking that is committed by a person who uses this information to accomplish acts of terrorism, vandalism, credit and debit card fraud, and identity theft, intellectual property theft should be considered a criminal act and be prosecuted. Computer hacking always involves some type of infringement on the privacy of others or some type of damage to computer-based property. Computer hacking can be done for numerous reasons; including performing fraudulent acts intended to secure financial gain at the expense of businesses or consumers. Computer hacking become so common that there had to be a new term for it. Cybercrime is a relatively new word. It refers to any crime that involves a computer and a network. Some of the most common forms of cybercrime that we hear of today is hacking, plagiarism, illegal downloads, and child pornography. If you participate in any of these activities, in my opinion you deserve to go to jail. If you do the crime, you should do the time! I am glad I chose this topic for research. As I plan my future out I always knew I wanted to be in law enforcement. I thought this whole time I wanted to be a State Trooper but now after reading this article and doing some research on this topic, I am now looking into the Criminal Intelligence Agency (CIA) . I will be able to have a fun and stable paying job while working on something I love, computers! This will be a great opportunity for me to see what is going on in the world and how I can maybe help deter these criminal acts! 5|P age The 21st Century: When War is Fought Through The Web Travis Francis 1. Have you been hacked Never? a. 303 People 2. Have you been hacked Once? a. 102 People 3. Have you been hacked Twice? a. 22 People 4. Have you been hacked Several Times (2-50 Times)? a. 22 People 5. Have you been hacked Lots( 50+ times)? a. 10 People People Who Have Been Hacked Never Once Twice Several Times(More than 2 303 102 22 22 less than 50) Lots (More then 50 10 times) Total 470 Votes How Many Times You Have Been Hacked? 350 300 Number of People 250 200 150 100 50 0 Never Once Twice Serveal Times Lots Occurence of Being Hacked 6|P age Travis Francis The 21st Century: When War is Fought Through The Web Works Cited Bibliography: Read, Brock. "When Hackers Attack. " The Chronicle of Higher Education. 51.11 (Nov 5, 2004): NA. Academic OneFile. Gale. UniversityofHartford. 15Oct.2010 http://find.galegroup.com/gtx/infomark.do?&contentSet= IACDocuments&type=retrieve&tabID=T002&prodId=AONE&docId=A147100311&source=gale&userGr oupName=a23uh&version=1.0 "What Is Cyberwar?" WiseGEEK: Clear Answers for Common Questions. Web. 24 Nov. 2010. <http://www.wisegeek.com/what-is-cyberwar.htm>. "Information Security in Education/Malicious Software - Wikibooks, Collection of Open-content Textbooks." Wikibooks. Web. 24 Nov. 2010. <http://en.wikibooks.org/wiki/Information_Security_in_Education/Malicious_Software>. "What Is Malware?" WiseGEEK: Clear Answers for Common Questions. Web. 24 Nov. 2010. <http://www.wisegeek.com/what-is-malware.htm>. 7|P age