Page 332 -
P. 332

Chapter 8 Securing Information Systems 331


               of the MySpace “group” sites, which are dedicated to  interests such as home
               beer brewing or animal welfare, into cyber-graffiti walls, filled with offensive
                 comments and photographs.

               Spoofing and Sniffing
               Hackers attempting to hide their true identities often spoof, or misrepresent,
               themselves by using fake e-mail addresses or masquerading as someone else.
               Spoofing also may involve redirecting a Web link to an address different from
               the intended one, with the site  masquerading as the intended destination. For
               example, if hackers redirect customers to a fake Web site that looks almost exactly
               like the true site, they can then collect and process orders,  effectively stealing
                 business as well as sensitive customer information from the true site. We provide
               more detail on other forms of spoofing in our discussion of  computer crime.
                  A  sniffer is a type of eavesdropping program that monitors informa-
               tion  traveling over a network. When used legitimately, sniffers help identify
                 potential network trouble spots or criminal activity on networks, but when
               used for criminal purposes, they can be  damaging and very difficult to detect.
               Sniffers enable hackers to steal proprietary information from  anywhere on a
               network, including e-mail messages, company files, and  confidential reports.
               Denial-of-Service Attacks
               In a denial-of-service (DoS) attack, hackers flood a network server or Web
               server with many thousands of false communications or requests for services
               to crash the network. The network receives so many queries that it cannot
               keep up with them and is thus unavailable to service legitimate requests. A
                 distributed denial-of-service (DDoS) attack uses numerous computers to
               inundate and overwhelm the network from numerous launch points.
                  For example, hours after the U.S. Department of Justice shut down  file-sharing
               site Megaupload on January 19 2012, the Anonymous hacker  collective
               launched extensive retaliatory DDoS attacks against federal and entertainment
               industry Web sites. Web sites belonging to the FBI, U.S. Department of Justice,
               U.S. Copyright Office, Universal Music, the Recording Industry Association of
               America, and the Motion Picture Association of America, were knocked offline
               for a large part of the day.
                  Although DoS attacks do not destroy information or access restricted areas
               of a  company’s information systems, they often cause a Web site to shut down,
               making it  impossible for legitimate users to access the site. For busy  e-commerce
               sites, these attacks are costly; while the site is shut down,  customers cannot
               make purchases. Especially vulnerable are small and midsize businesses whose
               networks tend to be less protected than those of large corporations.
                  Perpetrators of DDoS attacks often use thousands of “zombie” PCs infected
               with  malicious software without their owners’ knowledge and organized into
               a botnet. Hackers create these botnets by infecting other people’s computers
               with bot malware that opens a back door through which an attacker can give
               instructions. The infected computer then becomes a slave, or zombie, serving
               a master computer belonging to someone else. Once hackers infect enough
               computers, they can use the amassed resources of the botnet to launch DDos
               attacks, phishing campaigns, or unsolicited “spam” e-mail.
                  Ninety percent of the world's spam and 80 percent of the world's malware are
                 delivered via botnets. For example, the Grum botnet, once the world's third-largest
               botnet, was reportedly responsible for 18% of worldwide spam traffic (amounting
               to 18 billion spam messages per day) when it was shut down on July 19, 2012. At
               one point Grum had infected and controlled 560,000–840,000 computers.







   MIS_13_Ch_08 Global.indd   331                                                                             1/17/2013   3:10:20 PM
   327   328   329   330   331   332   333   334   335   336   337