Page images
PDF
EPUB
[blocks in formation]
[merged small][merged small][merged small][merged small][merged small][merged small][merged small][merged small][merged small][merged small][graphic]

Active attacks on the integrity of a computer facility resemble conventional cloak-and-dagger activities. Unauthorized persons can gain access through falsified identification badges and bribery. Once inside, a knowledgeable person can do a lot of damage with magnets and the more common tools of sabotage. Passwords can be read from printouts and the defenses cased. If unwatched, the intruder can use the computer itself to erase memories and call up defensive information. Another weak point is the tape vault where files are kept-often under less stringent guard.

[graphic]
[ocr errors]
[ocr errors]
[ocr errors]

Figure 4.

[ocr errors]

So far, the emphasis has been on gaining access to the facilities. The computer itself has hardware and software defenses which can be tampered with, circumvented, or which even fail through natural causes. Software defenses include user identification schemes, various access control programs, bounds controls, etc. Software defenses are usually bypassed with software attacks. These attacks can be made more devastating if inside information can be gained first. Once again, the opportunities are limited only by the imagination of the attacker, Some Typical Assaults on Computer Systems

Computerworld for April 4, 1973, detailed how the Chief Teller of the Union Dime Savings Bank, in New York City, manipulated both manual and computer records to "shuffle" $1.5 million to his own purposes. No one is yet sure just how he accomplished this feat or exactly how much he stole. The checks and balances built into the computer hardware and software and a manual auditing system were all foiled. With access to a terminal-not the computer room proper-the thief switched funds between accounts in such a way that the correct amounts always showed at audit time.

A now classic and very imaginative example of external penetration was carried out by a young electrical engineer on the West Coast. Posing as a customer, he discovered a way to "sign on" the computerized central supply division at the Pacific Telephone and Telegraph Co. Before some betrayed him, he had illegally ordered and had delivered over $1 million worth of equipment without paying for it.

A weak spot in bank computing systems was found by a clerk in a Washington, D.C. bank. Noting that the bank's computer checked only the magnetically coded deposit numbers on the bottoms of incoming deposit slips, he replaced the usual supply of deposit slips on lobby desks with slips coded with his own account number. Depositors using forms from the lobby desks unknowingly added their money to his account. A few days later he made a large withdrawal and disappeared for good.

Other examples of fraud abound. One public employee sold raises to fellow workers. He altered payroll records during nighttime runs, draining thousands out of the treasury. Unhappy employees have been known to commit magnetic sabotage, ruining mailing lists and company records on magnetic tapes.

Two important generalizations can be made about computeraided crimes: (1) most are inside jobs by employees who could not resist the easy opportunities spread out before them; and (2) most were discovered too late and usually by accident. The inferences are that computer defenses are woefully weak and that we very likely see only the tip of an iceberg. The really smart thieves have not been caught yet. At this moment, tens, perhaps hundreds, of people around the country are using computers to criminal ends. Many times this number, including many scrupulously honest employees, are mentally attacking computer systems-vicarious thrills, but situations that could turn into reality if personal circumstances made it worth the risk.

[merged small][merged small][merged small][ocr errors][ocr errors][ocr errors][ocr errors][ocr errors][merged small][merged small][merged small][merged small][merged small][merged small][merged small][merged small][merged small][merged small][merged small][ocr errors][merged small][merged small][merged small][merged small][merged small][merged small][ocr errors][merged small][merged small][merged small][merged small][merged small][merged small][merged small][merged small][merged small][merged small][merged small]

Hardware and Software Defenses

Donn B. Parker, a specialist in computer security at Stanford Research Institute, has said, "The best detective for catching somebody using a computer as a partner in crime is a computer." This statement is equivalent to "Fight fire with fire." This is only part of the answer, however, because additional weapons are needed to defend the computer against its most serious threat: the trusted employee on the inside.

The breadth of the threat spectrum is apparent in Table 1. The countermeasure spectrum is just as extensive; partly hardware, partly software, and partly human judgment and intuition. Computer defenses can be viewed as a series of fortified walls-physical walls outermost, hardware and software on the inside. It is impossible to review all countermeasures here but some generalizations are in order.

First, consider the external threat: an outsider wishing to penetrate the system in order to steal, modify, or destroy data and/or software. The timehonored approach to a good defense is to make the first step toward penetration the biggest; that is, make it exceedingly difficult to become a legitimate user of the computer system. Bricks, mortar, and guards make up the first barrier. (Fig. 5) An interloper who penetrates these barriers confronts next the computer system itself. Will it recognize him for what he is? The computer can check physical attributes: fingerprints, and voice prints, among others. (Fig. 6) It can then ask for a password or other identifying information. Even if the computer allows someone to sign on, he may be stymied by bounds controls, encrypted files, and the sheer complexity of the system. The computer defenses are not completely penetrated until the invader acquires the executive control mode, permitting him to execute any program and read any portion of the memory.

Protective barriers can be made higher and higher against external threats but at a price measured in money and convenience. Furthermore, the most elaborate defenses are largely useless against the insider. It is impossible to place too much emphasis on the careful screening and motivation of employees permitted access to computer facilities.

The most sophisticated defenses can and will be breached by insiders and to a lesser extent by outsiders. Physical evidence of penetration is usually nonexistent, and computer misuse will continue until some lucky accident or biman betrayal uncovers the crime. Computer systems should be self-monitoring; that is, they should figuratively ring alarms when suspicious sequences of instructions appear. When a computer is asked to "rewind a printer" or something equally unorthodox, its self-monitoring system should take preventive action. Computers are unsuspicious by nature but software can make them wary. Checks and balances can be built into data processing software to detect bank account shuffling and similar larcenous schemes. Automatic auditing procedures should be used that will provide "audit trails" leading to those probing or subverting the system.

« PreviousContinue »