About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

NIA #3 - Computer Crime, Fraud, Waste


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
From @UICVM.uic.edu:[email protected] Wed Dec 5 23:13:22 1990
Return-Path: <@UICVM.uic.edu:[email protected]>
Received: from UICVM.uic.edu by cs.widener.edu (4.1/Widener-2.3)
id AA19553; Wed, 5 Dec 90 23:13:15 EST
Message-Id: <[email protected]>
Received: from NIU.BITNET by UICVM.uic.edu (IBM VM SMTP R1.2.2MX) with BSMTP id 3082; Wed, 05 Dec 907 CST
Date: Wed, 05 Dec 90 22:10 CST
To: [email protected]
From: TK0JUT2%[email protected]
Subject: nia #3
Status: O

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% N.I.A. %%
%% Network Information Access %%
%% 02MAR90 %%
%% Lord Kalkin %%
%% File #3 %%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

:_Computer Crimes/Fraud/Waste part 1
:_Written/Typed/Edited By: Lord Kalkin

1. COMPUTERS: CRIMES, CLUES, AND CONTROLS

Introduction

The Information Age has brought aboout dramatic improvements in
way the Federal goverment does its job. For making descisions,
more and better information is available more quickly to more
people than ever before. Statistics computations that once took
weeks, now takes minutes. And analyses that once required numerous
programmers, a computer operator, and a large computer facility may
now need only a nontechnical staff using software packages on
desktop computers in their office.

The General Service Administration estimates that Federal
agencies will acquire half a million small computers by 1990. In
FY 1984, federal expenditures for micro and desktop computers
totaled $137 million. The comparable figure for FY 1983 was $34
million. And these statistics do not include computer terminals
that are part of large computer systems or word processors--many of
which can be used to store and manipulate data, as well as create
graphics. The Office of Management and Budget(OMB) estimates that
#13.9 billion was spent in FY 1985 to acquire, operate, and
maintain Federal information technology systems.

New management problems have accompanied the increase use
of computers and automated technology. Terminals, often connected
to computers that are networked together, can access vast
quantities and different types of data. There are publicy voiced
concerns about privacy of information and the risks associated with
automating and making more accessable personal, proprietary, or
other sensitive data. These are serious concerns about increased
computer crimes, waste, and abuse which result in such costly
problems as improper payments from govermant benifit programs and
unnecessary equipment purchases. And there is the clear
recongition that information is a resource to be protected.

The responsibility for protecting information resides with
the end user manager. This responsibility is acknowledged in OMB
circular A-130, MANAGEMENT OF FEDERAL INFORMATION RESOURCES:

"Agencies shall make the official whose program an
information system supports responisble and accountable for the
products of that system..."

"Because end user computing places management of
information in the hands of the individual agency personnel rather
than in a central automatic data processing organization, the
Circular requires that the agencies train end users in their
responsibilities for the safeguarding information"

This document is designed to provide information security
awareness training for the end user manager. Security awareness
training acquaints systems, controls, and techniques that enhance
information security and with resources available for additional
information.

"YOU'VE GOT TO CONSIDER YIELD. IT'S $19,000 PER BANK
ROBBERY AND $560,000 PER COMPUTER CRIME!"

Computer crime is a growth industry -- and so are computer
waste and abuse. Some estimates peg the increase of computer crime
at 35 percent annually and the cost $3.5 billion. One obvious
reason is the potential payoff: the average computer crime yields
an estimated $560,000; the average bank robbery, $19,000.

The computer criminal is less likely to get caught than the
bank robber -- and less likely to get convicted if caught.
Estimates of detected computer crimes are as low as 1 percent. And
the liklihood of a criminal conviction for computer fraud is less
than 1 in 10.

Deliberate computer crime is a significant part of the
picture. But wasteful and abusive practices, accidents and errors
are an even larger part. In the succint words of one noted
expert, " We bumble away far more computer $s than we could ever
steal." Those bumble dollars -- combined with the estimate of $3.5
billion annual cost of computer crime -- underscore the scopes and
seriousness of computer related losses.

A major contributor to computer related loss is the lack of
security awareness. Security awareness can stop accidents and
errors, promote adequate information security controls, prevent and
detect the wouldbe computer criminal. End User awareness of
securtiy controls provides four levels of protection for computers
and information resources:

SECURITY CONTROLS: FOUR LEVELS OF PROTECTION

Prevention -- Restricts access to information and
technology to authorized personal only;

Detection -- Provides for early discovery of crimes and
abuses if prevention mechanisms are
circumvented;

Limitation -- Resticts lossess if crime occurs despite
prevention abd detection controls; and

Recovery -- Provides for efficient information recovery
through fully documented and test contigency
plans.

Yesterday, managing technology was the technical manager's
concer. Today, managing information is every nontechnical end user
manager's concern. Managing information requires new knowledge and
new awareness by a new group of nontechnical employees. Good
information management requires recongizing opportunities for
computer crime and waste so that steps can be taken to prevent
their occurrence.

When Computers were first introduced, few were available
and only a small number of persons were trained to use them.
Computers were usually housed in seperate, large areas far removed
from programm managers, analysts, economists, and statisticians.
Today that is changed. Word processors, computer terminals, and
desktop computers are as common equipment. This electronic
equipment is rapidly becoming increasingly user-friendly so that
many people can quickly and easily learn how-to use it.

Employees with access to computer equipment and automated
information are greatly increasing throughput the organizational
hierachy. The GS-4 secretary, the GS-9 budget analyst, the GS-12
program analyst, the GS-13 statician, the GM-14 economist, and the
Senior Executive Service Manager may have all the access to a
computer terminal or word processor and the information it contains.

No longer is information restricted to select few at the
highest levels of an organization. This phenomenon has led
computer crime to be called the "democratization of crime." As
more people gain access to automated information and equipment, the
opportunities for crime, waste, and abuse likewise increase.

It's Difficult to Generalize, But...
- Functional end user, not the tecnical type and
not a hacker
- holds a non-supervisory position
- no prevoius criminal record.
- bright, motivated, desirable employee
- works long hours; may take few vacations
- Not sophisticated in computer use
- The last person YOU would suspect
- Just the person YOU would want to hire

THE COMPUTER CROOK CAN BE ANYONE

The typical computer crook is not the precocious hacker who
uses a telephone and home computer to gain access to major computer
systems. The typical computer crook is an employee who is a
legitimate and nontechnical end user of the system. Nationally,
employee-committed crime, waste, and abuse account for an estimated
70 to 80 percent of the annual loss related to computers.
Dishonest and disgruntled employees cause an estimated 20 percent
of the total computer system related loss. And they do so for a
variety of reasons.

WHY PEOPLE COMMIT COMPUTER CRIME

- Personal or Financial gain
- Entertainment
- Revenge
- Personal Favor
- Beat the system, Challenge
- Accident
- Vandalism

But a significantly lager dollar amount, about 60 percent
of the total computer-related loss, is caused by employees through
human errors and accidents. Preventing computer losses, whether
the result of debliberately committed crimes or unknowingly caused
waste, requires security knowledge and security awareness. A
recent survey reported that observant employees were the primary
means of detecting computer crime.

CLUES TO COMPUTER CRIME ABUSE

Be on the look out for...
- Unauthorized use of computer time
- Unauthorized use of or attempts to access data files
- Theft of computer supplies
- Theft of computer software
- Theft of computer hardware
- Physical damage to hardware
- Data or software destruction
- Unauthorized possession of computer disks, tapes
or printouts.

This is a beginning list of the kinds of clues to look for
in detecting computer crime, waste, and abuse. Sometimes clues
suggest that a crime has been committed or an abusive practice has
occured. Clues can also highlight systemn vunerabilities --
identify where loopholes exist -- and help identify changes that
should be made. Whereas clues can help detect crime and abuse,
conrols can help prevent them.

Controls are management-initiated safeguards -- policies or
administrative procedures, hardware devices or software additions
-- the primary mission of which is to prevent crime and abuse by
not allowing them to occur. Controls can also serve a limitation
function by restricting the losses should a crime or abuse occur.

This document addresses information security into three
areas: Information Secrurity, Physical Security, and personnel
security. In each area, crimes, clues, and controls are
discussed. In these areas not only frauds, but abuses and waste
are addressed. The final chapters provide a plan of action and
cite availably security resources.

N.I.A. - Ignorance, There's No Excuse.
Founded By: Guardian Of Time/Judge Dredd.

[OTHER WORLD BBS]


 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS