CyberCrimes 2
CyberCrimes 2
CyberCrimes 2
Contents
5 References …………………………………………………………………………. 13
Cyber Crimes
Cyber crime, also called computer crime, is any illegal behavior directed by means of
electronic operations that targets the security of computer systems and the data processed.
It involves a number of issues ranging from the theft of information from a computer
system or network, to the use of a computer as a tool during committing a crime. As more
companies connect their networks to the Internet, awareness of computer crimes becomes
very important.
Cyber Crimes 3
1 Types of Attacks
In this age of automation and connectivity, almost all organizations are vulnerable to
cyber crimes. Here are the most common targets for cyber crimes:
Business Attacks
Businesses may be the target of their competitors. The worldwide economic competition
is becoming more and more fierce. Industrial espionages have become a growing threat
because of the competition among national economies. Even “friendly” nations in the
past have become our economic enemies.
Financial Attacks
Professional criminals may target Banks and other financial organizations for financial
gain. These days, our money may seem to be nothing but bits in a computer, numbers on
a screen, and ink on an occasional bank statement. We tend to depend on more on
computer to pay our bills and deposit our checks electronically. Theft and fraud cases are
also increasingly done electronically as well.
Terrorist Attacks
Terrorists may target any organization but especially government and utility company
computers. Their purposes could be to paralyze the government or cause disastrous
accidents.
Grudge Attacks
Any company can be the target of its own employees or ex-employees. Similarly,
universities may be the target of their students and former students. Their goals are for
revenge.
“Fun” Attacks
Any organization can be the target of crackers, sometimes they’re seeking for the
intellectual challenge, and sometimes they are professionals who may do it to ber hired.
2 Types of Offenders
Crackers
Cracker is a person who engages in computer and telecommunications intrusion.
Crackers operate in groups or in individuals. The motivation of a cracker is to access a
system or data.
Cyber Crimes 4
Criminals
There are three major types of criminal behavior: espionage, fraud and abuse. The
common motivation of a criminal is financial gain.
Vandals
Vandals can be roughly divided into two groups: users and strangers. Users are those who
are authorized to use the system they abuse, but they have extended their privileges.
Strangers are those who are not authorized to use the system in any way. A main
motivation of vandal is to damage the system or data files.
Cyber crimes can be classified in many ways. You might divide them by who commits
them and what their motivation might be. Or, you might divide these crimes by how they
are committed. Here, I have chosen to divide computer attacks by the types of computer
security that ought to prevent them.
Wiretapping
Wiretapping is Interception of communications signals with the intent to gain access to
information transmitted over communications circuits.
Telephone and network wiring is often not secured as it should be. Intruders can
physically damage it and can pick up the data flowing across the wires. Criminals
Cyber Crimes 5
Eavesdropping on Emanations
Computer equipment emits electromagnetic impulses. Whenever you strike a computer
key, an electronic impulse is sent into the immediate area. Potential offenders may take
advantage of these electronic emanations by monitoring, intercepting, and decoding
them.
Because of the emanation threat, government computers used to store and process
classified information require special physical shielding. It’s a major concern for military
and intelligence data.
One example may involve flooding a computer resource with more requests than it can
handle. The attack is initiated by sending excessive demands to the victim’s computers,
exceeding the limit that the victim’s servers can support and making the servers crash.
This causes the resource (e.g. a web server) to crash and cannot provide normal services
for authorized users. Another example can be electronic sabotage involving the actual
destruction or disabling of equipment or data.
If you want examine and validate a physical security program, you can use some types of
tests, such as regular physical security inspections, random checks and penetration tests.
There are two forms of masquerading: physical and electronic. In person, a criminal may
use an authorized user’s identity or access card to get into restricted areas where he can
access to computers and data. Electronically, an unauthorized person will use an
authorized user’s logon ID, password personal identification number, or telephone access
code to gain access to a computer or to a particular set of sensitive data files.
Social Engineering
Social engineering is to gain privileged information about a computer system by skillful
lying, usually over a telephone line.
Some crackers are very good at social engineering, and use it to discover telephone
number, account names, passwords, and other access information of the legitimate users.
This is usually done by acting as an authorized user or administrator, and asking for
assistance.
Harassment
Harassment is using computer methods (e.g., email) to slander or bother someone.
Sending threatening email message and slandering people on bulletin board systems and
newsgroups are common types.
Software Piracy
Software piracy is copying of software without authorization.
Traffic Analysis
Traffic analysis means collection and analysis of information. An eavesdropper can get
desired information by analysis of message characteristics (e.g., length, frequency,
destination).
Sometimes, the attacks on data might not be so obvious. Even data that appears quite
ordinary may be valuable to a foreign or industrial spy. For example, travel itineraries for
generals and other dignitaries help terrorists plan attacks against their victims.
Covert Channels
Covert channels mean a communications channel that allows two cooperating processes
to transfer information in a manner that violates the system’s security policy.
A smart insider can hide stolen data in other innocent output. For example, a filename or
contents of a report could be changed slightly to include secret information that is
obvious only to someone who is looking for it.
Trap door is activated in some innocent-appearing manner (e.g., a special “random” key
sequence or transaction in an application at a terminal). Software developers often
include trap doors in their code to enable them to reenter the system and perform certain
functions.
Session hijacking
Session hijacking is taking over an authorized user’s terminal session, either physically
when the user leaves his terminal unattended or electronically when the intruder carefully
connects to a just-disconnected communications line.
Tunneling
Tunneling uses one data transfer method to carry data for another method. Tunneling is
an often-legitimate way to transfer data over incompatible networks, but it is illegitimate
when it is used to carry unauthorized data in legitimate data packets.
Timing Attacks
Timing attacks mean attacks that take advantage of the timing of computer processes and
operations to get access.
These include the abuse of race conditions and asynchronous attacks. In race conditions,
there is a race between two processes operating on a system; the outcome depends on
who wins the race. Asynchronous attacks are another way of taking advantage of
dynamic system activity to get access.
Trojan Horses
Trojan horses are a computer program with an apparently or actually useful function that
contains additional (hidden) functions that surreptitiously exploit the legitimate
authorizations of the invoking process to the detriment of security or integrity.
Trojan horses are a common technique for planting other problems in computers,
including viruses, worms, logic bombs and salami attacks.
A worm is a standalone program that can propagate to other computers via networks. It
exists independently of any other programs. A worm simply replicates itself on one
computer and tries to infect other computers that may be attached to the same network.
There is an important distinction between worms and viruses: a worm operates over a
network, but in order to infect a machine, a virus must be physically copied. They have
many similarities, and both can be introduced into systems via Trojan horses.
Cyber Crimes 9
The best way to prevent viruses and worms from invading a system are:
1. Be vigilant about introducing new and untrusted software into a system.
2. Use virus-scanning software to check for viruses.
3. Do frequent and careful backups.
Salamis
Salami technique is the process of secretly and repetitively slicing away tiny amounts of
money (like the slices of a salami) in a way that is unlikely to be noticed.
It works on financial data, e.g., taking advantage of the rounding of decimals in bank
interest calculations.
Logic Bombs
Logic bombs are a resident computer program that triggers an unauthorized act when a
certain event (e.g., a date) occurs.
A typical logic bomb tells the computer to execute a set of instructions at a certain date
and time or under certain specified conditions.
IP Spoofing
IP spoofing is a method of masquerading in which an attacker forges the addresses on
data packets sent over the Internet so they appear to be coming from insider a network in
which systems trust each.
How can an operations security program prevent IP spoofing attacks? Two good ways are
to require passwords in all cases and to prevent trust relationships.
Password Sniffing
Password sniffers mean sniffers are programs that monitor all traffic on a network,
collecting a certain number of bytes from the beginning of each session, usually the part
where the password is typed unencrypted on certain common Internet service such as
FTP and Telnet.
One-time passwords and encrypted passwords are good ways to keep password sniffing
attacks from compromising systems.
Scanning
Scanning is running a program, often called a war dialer or a demon dialer, that ties a set
of sequentially changing numbers (e.g., telephone numbers or passwords) to determine
which ones respond positively; for example, with telephone number, the program would
report those that successfully connect to modems.
Excess Privileges
Users in a system have excess privileges—more privileges than they ought to have.
In UNIX environments, intruders who manage to get “root” or “superuser” privileges can
play havoc with the system. In mainframe systems, abuse of privileges is sometimes
called superzapping.
2. Ways you can keep computer criminals from actually committing a computer
crime.
Operations security cannot exist in a vacuum. The only way it can be effective is if it is
integrated into an organization’s physical, personnel, and communications security
programs. In fact, operations security is used to help make those programs more
productive.
The second step is to repair damage and prevent recurrence. The organization may have
to seek help from outside expertise. In the past, following a serious breach, the
government is one choice for an organization when investigating computer crime. With
the number of computer crimes growing each year, the resources of most governmental
agencies have been overburdened. They have insufficient personnel resources to handle
the load and inadequate technical expertise to thoroughly research the cases. Private
companies specializing in the field of network security now offer computer crime and
forensic evidence services. Such specialists must have the specific knowledge base to
efficiently and quickly complete investigations, with a background in recovery and
analysis of computer forensics, formal investigations, and the relevant laws.
Cyber crimes may be subject to the investigation of the NCCS (The FBI’s National
Computer Crimes Squad):
1. Intrusions of the Public Switched Network (the telephone company).
2. Major computer network intrusions.
3. Network integrity violations.
4. Privacy violations
5. Industrial espionage.
6. Pirated computer software.
7. Other crimes where the computer is a major factor in committing the criminal
offense.
of profiling and ultimately identifying and apprehending the attacker. On the other hand,
if investigator decides to lock the user out and disconnect the system from network they
can often limit the damage to what the malicious user has already accomplished.
As a general rule, an investigator should not let the attacker know that they are being
disconnected or tracked due to unauthorized access.
At present, the state of global legal protection against cyber crime is weak. There are
following suggestions:
1. Firms should secure their networked information. Laws to enforce property rights
work only when property owners take reasonable steps to protect their property in
the first place.
2. Government should assure that their laws apply to cyber crimes. National
governments remain the dominant authority for regulating criminal behavior in
most places in the world.
3. Firms, governments, and civil society should work cooperatively to strengthen
legal frameworks for cyber security. To be prosecuted across a border, an act must
be a crime in each jurisdiction.
5 References
David Icove, Karl Seger, & William Vonstorch. “Computer Crime: A Crimefighter’s
Handbook”. O’Reilly & Associates. 1995.
Computer Crime and Intellectual Property Section (CCIPS) of the Criminal Division of
the U.S. Department of Justice Web Page,
http://www.cybercrime.gov/