You are on page 1of 1

UPDATE on Computer Audit, Control and Security

(HACKING: THE THREATS )


ably, the time will come when computer systems will be as realistic as any other, and will become much more of a
widely viewed by extremist groups as useful and worth- threat with the increasing reliance on computer systems
while targets for their attention. As far as a computer sys- and their interconnection. Hacking is part of the arsenal
tem is concerned there will be no real difference between available to any person who wishes to carry out irrespon-
the actions of a terrorist and those of any other hacker sible acts. As the population in general becomes more
who has accessed a system in 'harmless fun'. Even if the computer literate, hacking will be viewed as an easier op-
intentions of the two groups are different, the possible re- tion to be considered. It can be carried out in the relative
sults of such actions could easily be very similar. Con- comfort of the home or office. There is little, if any, per-
sequently the perceived threat is effectively the same. sonal physical risk involved and the chance of detection
Once the door is open then both groups can enter at will. whilst testing the security is minimial.

T h e motives for, and so the type of threat from, hacking This testing of the security can even be automated and
fall into three broad groups left for a PC to carry out overnight unassisted, with the
hacker socialising or even asleep. Any planned penetra-
O " Damage tion can be aborted as late as required with little risk of
exposure.
O Financial gain - Fraud, Blackmail, Industrial
Espionage etc. For armchair dishonesty, professional or amateur, hack-
O 'Harmless' Browsing ing has much to commend itself. Its relative safety and
elusiveness of source combined with the unfortunate
Damage to a system includes deletion and alteration of high interest level are enough to ensure that it gains pre-
data or software. T h e most usual source of these actions valence in the future.
xvill be the disgruntled employee or ex-employee. How-
ever mindless, electronic violence cannot be overlooked. (~ Copyright R J Ports PLC Consuhancy Services 1989
R.J. Ports, Director, PLC Consuhancy Services; he
T h e area of financial gain is far more likely and extensive specialises in computer and corporate security issues.
in possibilities. Financial gain includes electronic funds
transfer and alteration of data, such as accounts, for per-
sonal gain. Computer held information is currently of far
greater value than was considered even a few years ago.
Although not in the public view, this information is be-
(NEWS 1
coming a currency itself and certainly attracts the atten-
tion of industrial spies and information brokers.
ICAEW Information
Looking to the future, just as the 'phone freaks' (tele-
Technology prize for l g 8 g
phone hackers?) of the '70s have turned into computer goes to anti-viral product
hackers of the '80s, so hacking will become more sophis-
ticated and esoteric. It may be that computer eavesdrop-
ping becomes an integral part of a hacker's skills. The 1989 Institute of Chartered Accountants Informa-
Another possibility is the tapping into satellite links as a tion Technology Prize has been awarded to Dr. Fred
gateway into computer systems (as opposed to hacking Cohen for his anti-viral product ASP ('Advanced Sys-
into computer systems to access satellites). T h e scope for tem Protection'). It was collected on his behalf at
the future is immense and so security controls must be Chartered Accountants' Hall by J.J. Dearden of PC
flexible enough to cope with any such changes in the Security Ltd.
threat.
ASP is based on Fred Cohen's many years of experi-
Similarly the law, which still has not effectively caught ence in PC and PC LANS security, but is designed to
up with current technology must be flexible enough in protect minis and mainframes as well. As well as pro-
content or ability to adapt, to cope with the quickly tecting against viruses, the device helps maintain the
changing environments of computers. Surely it is not ac- integrity of data within a PC system in the event of
ceptable to have insufficient legislation in place which media failure or unauthorised modification. It protects
does not effectively relate to computers which are becom- the boot block, interrupt vector table, system files and
ing an essential and irreplaceable part of everyday busi- any user-defined and data files. Protection is by
ness and social life. Indeed this view may also be ex- means of the application of a crytographic checksum.
tended to insurance and any other computer orientated This identifies any modifications to protected areas of
service. Users are adapting to computers and the threats the system, enabling them to be dealt with.
they pose, so must security, the law and insurance.
As a next step, the product will be hardware embed-
As with many methods of committing fraud, sabotage ded.
and any other unauthorised acts, hacking may not be the
best, easiest or most effective way of achieving the re- (Dr. Fred Cohen, PC Security Ltd., The Old Court
quired goals. It is however an option that is in many cases House, Marlow, Bucks SL7 3AN.)
Volume 2 Number 1, 1989 15

You might also like