Chapter 11 Computer Crime and Information Security What’s at stake Threats Defenses Please discontinue use of cell phone and turn off ringer Succeeding with Technology – 3rd Edition What’s at stake? Succeeding with Technology – 3rd Edition Information Security Overview All computer systems are vulnerable to attack. Most are already infected and/or compromised, including PCs used by most students in this class. It is only going to get worse. For more info… • www.mcafee.com/us/threat_center • www.cert.org • http://www.microsoft.com/athome/security Succeeding with Technology – 3rd Edition Two-thirds of Internet experts expect a devastating attack on the Internet between now and 2015. At stake: Personal Private Information What would concern you most if a person who wished to do you harm had full control of your PC? What personal information do you consider private? All too common headlines… “Hackers attacked computer servers of a California university and may have gained access to the personal information of 59,000 people affiliated with the school…” Succeeding with Technology – 3rd Edition Depending on the circumstance, private information may include your: • • • • • • • • • • • • • Name Photo Phone number Address Birthday Social Security Number Bank Account Number Credit Card Number College Transcripts Financial Status Medical Records Religious affiliation Political affiliation Identity Theft Identity theft is the criminal act of using stolen information about a person to assume that person’s identity, typically for financial gain. 350 300 250 200 150 100 50 0 2003 2004 2005 Millions of US Dollars Lost to Identity Theft Source: http://www.consumer.gov/sentinel/trends.htm Succeeding with Technology – 3rd Edition At stake: Organizational Information For many businesses, the information it processes and stores is highly valuable and key to its success. Business intelligences is the process of gathering and analyzing information in the pursuit of business advantage. Competitive intelligence is concerned with gathering information about competitors. Counterintelligence is concerned with protecting one’s own information from access by the competition. Succeeding with Technology – 3rd Edition Biggest security threats to businesses in order of frequency: • Virus • Insider abuse of Internet access • Laptop theft • Unauthorized access by insiders • Denial-of-service attacks • System penetration • Theft of proprietary info • Sabotage • Financial fraud • Telecommunications fraud • Active wiretap At stake: National and Global Security Cyberterrorism is a form of terrorism that uses attacks over the Internet to intimidate and harm a population. Washington, June 8, 2006 – Over the last two years, Abu Musab al-Zarqawi established the Web as a powerful tool of the global jihad, mobilizing computer-savvy allies who inspired extremists in Iraq and beyond with lurid video clips of the bombings and beheadings his group carried out. Succeeding with Technology – 3rd Edition Food for thought… The Internet is a powerful tool both for those who wish to build bridges between distant cultures and those that wish to tear them down. China Hacking: http://abcnews.go.com/TheLaw/story?id=3966047 http://www.ciotoday.com/story.xhtml?story_id=022000RB46F8&n l=5 http://arstechnica.com/news.ars/post/20070914chinese-government-at-the-center-of-five-cyberattack-claims.html The Cyber Cold War http://www.reuters.com/article/technologyNews/idU SL2932083320071129?feedType=RSS&feedNam e=technologyNews What are the threats? Succeeding with Technology – 3rd Edition Professionalization “Cyberattack on Google Said to Hit Password System,” NewYork Times April 2010. (“Ever since Google disclosed in January that Internet intruders had stolen information from its computers, the exact nature and extent of the theft has been a closely guarded company secret. But a person with direct knowledge of the investigation now says that the losses included one of Google’s crown jewels, a password system that controls access by millions of users worldwide to almost all of the company’s Web services, including e-mail and business applications.”) Succeeding with Technology – 3rd Edition Hijacked Websites "Cyber criminals move focus to web: Cyber criminals will increasingly turn their attention to the web and away from e-mail security in 2007" BBC News (Jan. 23, 2007) ("The internet now represents the easiest way for cyber criminals to gain entry to corporate networks, as more users are accessing unregulated sites, downloading applications and streaming audio/video. ... They are also subtly changing tactics - instead of sending so-called spyware-infected e-mails, they are sending e-mails linking to websites which contain a malicious downloader [Trojan].") Succeeding with Technology – 3rd Edition Hijacked Websites Robert McMillan, "The Web is Dangerous, Google Warns: The search site's bots find that 1 in 1000 Web pages is infected with malicious drive-by download software" PC World (Feb. 16, 2008) ("In the past year the Web sites of Al Gore's "An Inconvenient Truth" movie and the Miami Dolphins were hacked, and the MySpace profile of Alicia Keys was used to attack visitors. Criminals ... have built very successful automated tools that poke and prod Web sites, looking for programming errors and then exploit these flaws to install the drive-by download software. Often this code opens an invisible iFrame page on the victim's browser that redirects it to a malicious Web server. That server then tries to install code on the victim's PC.") Succeeding with Technology – 3rd Edition Hardware Devices "Electronic gadgets latest sources of computer viruses," CNN.com News (Mar. 13, 2008) ("From iPods to navigation systems, some of today's hottest gadgets are landing on store shelves with some unwanted extras from the factory: pre-installed viruses that steal passwords, open doors for hackers and make computers spew spam.") Succeeding with Technology – 3rd Edition Social Engineering "Beware Hurricane Katrina Scams," ask.com (2007) ("Hoaxes, Phishing Attacks, Malware and Other Threats In The Wake Of Katrina"). Elinor Mills, "Fake parking tickets direct to malicious Web site," CNET (Feb. 4, 2009) (In a scary onlineoffline Internet scam, hybrid cars in North Dakota have been tagged with fake parking citations that include a Web address hosting malicious software that drops a Trojan onto the computer.") "Fake media file snares PC users," BBC News (May 8, 2008) ("The fake file poses as a music track, short video or movie and has been widely seeded on filesharing networks to snare victims.") Succeeding with Technology – 3rd Edition Extortion/Ransomware "CIA: Hackers demanding cash disrupted power utilities overseas," MIT Technology Review (Jan. 18, 2008) ("Hackers literally turned out the lights in multiple cities after breaking into electrical utilities and demanding extortion payments before disrupting the power, a senior CIA analyst told utility engineers at a trade conference.") Succeeding with Technology – 3rd Edition Spam Larry O'dell, "Va. court upholds spammer's conviction," USA Today (Feb. 29, 2008) ("A divided Virginia Supreme Court affirmed the nation's first felony conviction for illegal spamming on Friday, ruling that Virginia's anti-spamming law does not violate free-speech rights.") Succeeding with Technology – 3rd Edition Botnets John Markoff, "Attack of the Zombie Computers Is a Growing Threat, Experts Say," NY Times (Jan. , 2007) ("These systems, called botnets, are being blamed for the huge spike in spam that bedeviled the Internet in recent months, as well as fraud and data theft.") Succeeding with Technology – 3rd Edition Logic Bomb Thomas Claburn, "Fannie Mae Contractor Indicted For Logic Bomb," Information Week (Jan. 29, 2009) ("A contract software engineer at a federal agency is accused of planting a logic bomb in the agency's system after he was fired for making a mistake. The malware could have shut down operations for a week at mortgage bank Fannie Mae had it gone off as scheduled.") Richard Adhikari, "SF's Rogue IT Admin Facing 4 Felonies," InformationWeek (Dec. 29, 2008) ("San Francisco District Attorney ... announced ... that Terry Childs, 43, will be arraigned ... He is accused of tampering with the city and county of San Francisco's network system in such a way as to deny other authorized administrators access to the network, and to set up devices to gain unauthorized access to the system.") Succeeding with Technology – 3rd Edition Rootkits "Warning on stealthy Windows virus," BBC.com (Jan. 11, 2008) ("Security experts are warning about a stealthy Windows virus [dubbed "Mebroot"] that steals login details for online bank accounts. ... Many are falling victim via booby-trapped websites that use vulnerabilities in Microsoft's browser to install the attack code. ... the virus [a type known as a rootkit] is dangerous because it buries itself deep inside Windows to avoid detection. ... Once installed, the virus ... usually downloads other malicious programs, such as keyloggers, to do the work of stealing confidential information. ... Mebroot ... uses its hidden position ... so it can re-install these associated programs [keyloggers, etc.] if they are deleted by anti-virus software. Although the password-stealing programs that Mebroot installs can be found by security software, few commercial anti-virus packages currently detect [Mebroot's] presence [and it] cannot be removed while a computer is running."). Succeeding with Technology – 3rd Edition How do they work? Succeeding with Technology – 3rd Edition Gaining control of your computer Login as you: use your authentication Guessing your password Steal your password Invade your computer while you use it Cause your computer to execute code (instructions) without you knowing it Succeeding with Technology – 3rd Edition Gaining your password Key-logging software Even the sounds of typing can be decoded Packet-sniffing software Packet-spoofing software Port scanning software Social engineering phishing Succeeding with Technology – 3rd Edition Invading your computer Trojan Horse---performs a useful task, while also carrying out some secret destructive act. Logic bomb Virus---same as a biological virus. Spreads from program to program, or disk to disk, using each infected machine to make more copies of itself. Worms---Like viruses, use computer hosts to reproduce themselves. Unlike viruses, worm programs travel independently over computer networks. Viruses and worms are considered malicious software, or malware, Check out the latest malware at http://www.mcafee.com/us/threat_center Succeeding with Technology – 3rd Edition But how? Exploit Vulnerabilities due to security or policy flaws Buffer overflow attacks Time-of-check to time-of-use Operation with user privileges Security patches Succeeding with Technology – 3rd Edition Viruses and Worms Yeah right! This didn’t come from Microsoft. The attachment is not a patch, nor an innocent text file (as it appears) but an executable file containing a virus. Succeeding with Technology – 3rd Edition WEB PAGE EMAIL Web Server Shared Network P2P FILE-SHARING NETWORK P2P NETWORK Succeeding with Technology – 3rd Edition INSTANT MESSAGE Portable Device Spyware, Adware, and Zombies Spyware is software installed on a computer without the user’s knowledge to either monitor the user or allow an outside party to control the computer. The Internet service provider Earthlink said it uncovered an average of 28 spyware programs on each of its member’s PCs that were scanned Adware is spyware that displays advertisements. Succeeding with Technology – 3rd Edition Zombies A computer that carries out actions (often malicious) under the remote control of a hacker either directly or through spyware or a virus is called a zombie computer. Experts say hundreds of thousands of computers are added to the ranks of zombies each week. Succeeding with Technology – 3rd Edition Zombies Zombie computers can join together to form zombie networks (botnet). Zombie networks apply the power of multiple PCs to overwhelm Web sites with distributed denial-of-service attacks, to crack complicated security codes, or to generate huge batches of spam. It has been estimated that 80 to 90 percent of spam originates from zombie computers. Storm worm botnet for rent Succeeding with Technology – 3rd Edition Scams, Spam, Fraud, and Hoaxes Succeeding with Technology – 3rd Edition Scams, Spam, Fraud, and Hoaxes Internet fraud is the crime of deliberately deceiving a person over the Internet in order to damage them and to obtain property or services from him or her unjustly. A phishing scam combines both spoofed e-mail and a spoofed Web site in order to trick a person into providing private information. 350 300 250 200 150 100 50 0 2003 2004 Millions of US$ Lost to Internet Fraud Spoofing is the act of assuming the identity of another person or organization typically through email or on the Web. Succeeding with Technology – 3rd Edition 2005 Classic Phishing Is this email from customer.service@citibank.com legitimate? Holding the mouse pointer over the link in the original email shows that it really links to http://24.27.89.64:87 most likely a hacker’s Website. Succeeding with Technology – 3rd Edition If you clicked the link it would take you to a spoofed Citibank Webpage that looks like the real thing, and ask you to supply personal information like your username and password. Scams, Spam, Fraud, and Hoaxes Spam is the unsolicited junk mail that makes up more than 60 percent of today’s email. A virus hoax is an email that warns of a virus that doesn’t exist. Succeeding with Technology – 3rd Edition Scams, Spam, Fraud, and Hoaxes The email that has gotten thousands of Windows users to trash their own systems… The objective of this e-mail is to warn all Hotmail users about a new virus that is spreading by MSN Messenger. The name of this virus is jdbgmgr.exe and it is sent automatically by the Messenger and by the address book too. The virus is not detected by McAfee or Norton and it stays quiet for 14 days before damaging the system. The virus can be cleaned before it deletes the files from your system. In order to eliminate it, it is just necessary to do the following steps: 1. Go to Start, click "Search" 2.- In the "Files or Folders option" write the name jdbgmgr.exe 3.- Be sure that you are searching in the drive "C" 4.- Click "find now" 5.- If the virus is there (it has a little bear-like icon with the name of jdbgmgr.exe DO NOT OPEN IT FOR ANY REASON 6.- Right click and delete it (it will go to the Recycle bin) 7.- Go to the recycle bin and delete it or empty the recycle bin. IF YOU FIND THE VIRUS IN ALL OF YOUR SYSTEMS SEND THIS MESSAGE TO ALL OF YOUR CONTACTS LOCATED IN YOUR ADDRESS BOOK BEFORE IT CAN CAUSE ANY DAMAGE. Succeeding with Technology – 3rd Edition Scams, Spam, Fraud, and Hoaxes The email that has gotten thousands of Windows users to trash their own systems… Do the search. Oh no! I’ve got the Teddy Bear virus! Better delete it! For more on this topic check out www.vmyths.com Think again! That file with the silly little Teddy bear icon is actually a necessary system file in Windows! Succeeding with Technology – 3rd Edition Mini-quiz Give an example of a “buffer overflow” attack. Succeeding with Technology – 3rd Edition 11.2 Defenses Succeeding with Technology – 3rd Edition Passwords A username identifies the user to the computer system. A password is a combination of characters known only to the user and used for authentication. For a password to be effective it should be: strong by including words that are unrelated to your interests, and include upper and lowercase letters, numbers, and symbols unique – don’t use the same password for your bank account as you do for your email account changed regularly – change your password twice a year OR MAYBE NOT Succeeding with Technology – 3rd Edition ID Devices and Biometrics Security ID cards and tokens, “something you have” authentication, are used in some corporations to protect access to restricted areas and computer systems. Biometrics is the science and technology of authentication by scanning and measuring a person’s unique physical features such as fingerprints, retinal patterns, and facial characteristics. More about tokens: http://en.wikipedia.org/wiki/Security-Token http://www.opticom.lv/en/products/security/authentication/rsa123/rsa1/ Succeeding with Technology – 3rd Edition Check out Face Recognition User Permissions User Permissions refers to the access privileges afforded to each network user in terms of who is able to read, write, and execute a file, folder, or drive. Files and folders are assigned user and group ownership. System Administrator 1 2 4 5 6 3 User 1 Succeeding with Technology – 3rd Edition User 2 User Permissions Different operating systems have differing ways of handling user permissions. UNIX Windows XP (home) Succeeding with Technology – 3rd Edition Mac OS X Encryption Encryption is a security technique that uses highlevel mathematical functions and computer algorithms to encode data so that it is unintelligible to all but the intended recipient. Data stored on a PC can be encrypted and set so that a second password is required to decrypt it. Demo: Encrypting a PPT file (tools > options > security) More on Encryption: http://en.wikipedia.org/wiki/Encryption Succeeding with Technology – 3rd Edition Encryption Computer encryption systems generally belong in 1 of 2 categories: Symmetric-key encryption Public-key encryption Symmetric-key Each computer has a secret key used to encrypt a packet before it is sent over the network. Requires knowing which computers will be talking so you can install the key on each one. Advanced Encryption Standard (AES), uses 128-, 192- or 256-bit keys. A 128-bit key can have more than 300,000,000,000,000,000,000,000,000,000,000,000 key combinations Succeeding with Technology – 3rd Edition Public-key Encryption Public-key encryption uses two different keys at once -- a private key and a public key. The private key is known only to one computer, the public key is available to all. Use the receiver’s public key to encrypt your message. Only the possessor of the private key can decrypt the message. A message encrypted with a private key, can be decrypted with the corresponding public key. The key pair is based on prime numbers (numbers that only have divisors of itself and one, such as 2, 3, 5, 7, 11 and so on) of long length. The encryption is computationally intensive. Used together with symmetric-key encryption. Succeeding with Technology – 3rd Edition Certification Authorities But how do we know the specified public key really belongs to the named site? That's where the certification authorities come in. The certification authorities validate the public key. Secure network communications is the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. Succeeding with Technology – 3rd Edition Threats to Wireless Networks Neighbors Internet Hackers Passers by www.wardriving.com Z Wireless Access Point / Router Cable Modem To Cable Wireless Access Co. Point / Router The Internet Cable Modem Succeeding with Technology – 3rd Edition Securing a Wireless Network Use the Access Points configuration utility to: Disable the Access Point’s broadcasting to make the access point invisible to the general public. Change the Access Point’s password from the default. Set the Access Point to only allow certain computers (MAC addresses) to connect. Encrypt data being sent over the network with WEP or WPA. Succeeding with Technology – 3rd Edition Defending Against Hackers A firewall is network hardware and software that examines all incoming data packets and filters out ones that are potentially dangerous. All Windows users should protect their network connection with a firewall. Succeeding with Technology – 3rd Edition Defending Against Viruses and Worms Knowledge and caution play Antivirus software, also known as virus scan software, uses several techniques to find viruses on a computer system, remove them if possible, and keep additional viruses from infecting the system. Succeeding with Technology – 3rd Edition a big part in protecting PCs against viruses and worms: • Don’t open e-mail or IM attachments that come from friends or strangers unless they are expected and inspected by antivirus software. • Keep up with software patches for your operating system, your Web browser, your e-mail and IM software. • Use caution when exploring Web sites created and maintained by unknown parties. • Avoid software from unknown sources. • Stay away from file-sharing networks; they do not protect users from dangerous files that are being swapped Defending Against Spyware Antispyware is software that searches a computer for spyware and other software that may violate a user’s privacy, allows the user to remove it, and provides continuing protection against future attacks. Succeeding with Technology – 3rd Edition Defending Against Scams, Spam, Fraud, and Hoaxes To avoid phishing scams, do not click links received in email. Exam Web addresses closely to make sure that they are legitimate. Submit form data only from Web pages that have a secure connection (https://) Do not believe any virus warning unless it comes from a verifiable source. Use common sense and be wary of offers too good to be true. Succeeding with Technology – 3rd Edition