Lesson6 - Computer and Internet Crime
Lesson6 - Computer and Internet Crime
Lesson6 - Computer and Internet Crime
Of special concern is a zero-day attack that takes place before the security
community or software developer knows about the vulnerability or has
been able to repair it. One would hope that the dis-coverer of a zero-day
vulnerability would provide his knowledge to the original software
manufacturer so that a fix can be created for the problem.
TYPES OF EXPLOITS
There are numerous types of computer attacks, with new varieties being
invented all the time. Some of the more common attacks including: the
virus, worm, Trojan horse, spam, distributed denial-of-service, rootkit,
phishing, spear-phishing, smishing, and vishing.
Viruses
Technically, a virus is a piece of programming code, usually disguised as
something else, that causes a computer to behave in an unexpected and usually
undesirable manner. Often a virus is attached to a file, so that when the
infected file is opened, the virus executes. Other viruses sit in a computer’s
memory and infect files as the computer opens, modifies, or creates them. Most
viruses deliver a “payload,” or malicious software that causes the computer to
perform in an unexpected way. For example, the virus may be programmed to
display a certain message on the computer’s display screen, delete or modify a
certain document, or reformat the hard drive.
A true virus does not spread itself from computer to computer. A virus is
spread to other machines when a computer user opens an infected email
attachment, downloads an infected program, or visits infected Web sites. In
other words, viruses spread by the action of the “infected” computer user.
Macro viruses have become a common and easily created form of virus.
Attackers use an application macro language (such as Visual Basic or
VBScript) to create programs that infect documents and templates.
Worms
Unlike a computer virus, which requires users to spread infected files to other
users, a worm is a harmful program that resides in the active memory of the
computer and dupli-cates itself. Worms differ from viruses in that they can
propagate without human inter-vention, often sending copies of themselves to
other computers by email.
Trojan Horses
A Trojan horse is a program in which malicious code is hidden inside a
seemingly harmless program. The program’s harmful payload might be
designed to enable the hacker to destroy hard drives, corrupt files, control the
computer remotely, launch attacks against other computers, steal passwords or
Social Security numbers, or spy on users by recording keystrokes and
transmitting them to a server operated by a third party.
A Trojan horse can be delivered as an email attachment, downloaded from
a Web site, or contracted via a removable media device such as a CD/DVD or
USB memory stick.
Once an unsuspecting user executes the program that hosts the Trojan horse, the
malicious payload is automatically launched as well—with no telltale signs.
Common host programs include screen savers, greeting card systems, and games.
Another type of Trojan horse is a logic bomb, which executes when it is triggered
by a specific event. For example, logic bombs can be triggered by a change in a
particular file, by typing a specific series of keystrokes, or by a specific time or
date.
Spam
Email spam is the abuse of email systems to send unsolicited email to large
numbers of people. Most spam is a form of low-cost commercial advertising,
sometimes for question-able products such as pornography, phony get-rich-quick
schemes, and worthless stock. Spam is also an extremely inexpensive method of
marketing used by many legitimate organizations.
Rootkits
A rootkit is a set of programs that enables its user to gain administrator-level
access to a computer without the end user’s consent or knowledge. Once installed,
the attacker can gain full control of the system and even obscure the presence of
the rootkit from legitimate system administrators.
When it is determined that a computer has been infected with a rootkit, there is little
to do but reformat the disk; reinstall the operating system and all applications; and
recon-figure the user’s settings, such as mapped drives.
Phishing
Phishing is the act of fraudulently using email to try to get the recipient to reveal
personal data. In a phishing scam, con artists send legitimate-looking emails urging
the recipient to take action to avoid a negative consequence or to receive a reward.
Smishing is another variation of phishing that involves the use of Short Message Service
(SMS) texting. In a smishing scam, people receive a legitimate-looking text message on
their phone telling them to call a specific phone number or to log on to a Web site. This is
often done under the guise that there is a problem with their bank account or credit card
that requires immediate attention. However, the phone number or Web site is phony and is
used to trick unsuspecting victims into providing personal information such as a bank
account number, personal identification number, or credit card number.
Vishing is similar to smishing except that the victims receive a voice mail telling them to
call a phone number or access a Web site.
Over the years, several laws have been enacted to help prosecute those
responsible for computer-related crime; these are summarized in Table 3-6. For
example, the USA Patriot Act defines cyberterrorism as hacking attempts that
cause $5,000 in aggregate damage in one year to medical equipment, or that
cause injury to any person. Those convicted of cyberterrorism are subject to a
prison term of 5 to 20 years.
Identity Theft and Assumption Makes identity theft a federal crime with
Deterrence penalties up
to 15 years imprisonment and a maximum fine
Act (U.S. Code Title 18, Section 1028) of
$250,000
Note that a firewall cannot prevent a worm from entering the network as an email
attach-ment. Most firewalls are configured to allow email and benign-looking
attachments to reach their intended recipient.
g) Detection
Even when preventive measures are implemented, no organization is
completely secure from a determined attack. Thus, organizations should
implement detection systems to
catch intruders in the act. Organizations often employ an intrusion detection system to
minimize the impact of intruders.
Response
An organization should be prepared for the worst—a successful attack that
defeats all or some of a system’s defenses and damages data and information
systems. A response plan should be developed well in advance of any incident
and be approved by both the organi-zation’s legal department and senior
management. A well-developed response plan helps keep an incident under
technical and emotional control.
Computer Forensics
Computer forensics is a discipline that combines elements of law and computer
science to identify, collect, examine, and preserve data from computer systems,
networks, and stor-age devices in a manner that preserves the integrity of the
data gathered so that it is admissible as evidence in a court of law. A computer
forensics investigation may be opened in response to a criminal investigation or
civil litigation. It may also be launched for a variety of other reasons, for
example, to retrace steps taken when data has been lost, to assess damage
following a computer incident, to investigate the unauthorized disclosure of
personal or corporate confidential data, or to confirm or evaluate the impact of
industrial espionage.