© 2000 ZDNet UK 
  
   
   
	
	   
 
	
  
   
	
	  Hacker attacks on Web sites have 
	  cost e-businesses millions of pounds. Ignoring the threats could result 
	  in big losses, so companies should take steps to minimise their risks, reports 
	  Paola di Maio 
	
  
  Recent denial of service attacks on some of the most popular sites on the 
	Web have raised security up the e-trade agenda. Last February, hackers temporarily 
	disabled sites at Yahoo, CNN, E*Trade and ZDNet. These types of attack are 
	costing firms millions in capitalisation costs, lost revenues and security 
	upgrades, according to analyst firm Yankee Group.
  London-based security firm mi2g has been studying such attacks for 
	years. It has found plenty of examples. Last spring, hackers disabled systems 
	of the Ministry of Defence and Nato for 48 hours. US hacker MagicFX broke 
	into eBay, the largest online auction site. Guessing passwords, MagicFX managed 
	to access and modify system software, intercept log-in identities and passwords, 
	read users' keystrokes and amend eBay's Web pages.
  On 30 August 1999 the Hackers Unite group accessed Hotmail's systems, causing 
	a big drop in Microsoft's share value. Last September, the United Loan Gunmen 
	(ULG) accessed the Nasdaq stock exchange network. Nasdaq also reported some 
	'hiccups' last month, but has not disclosed details. In January, a group known 
	as East European Syndicate accessed online music vendor CD Universe and tried 
	to blackmail the parent company, eUniverse. The group stole 300,000 credit 
	card numbers and attempted to sell them over the Internet.
  Risk assessment 
  According to mi2g, most security breaches are caused by disgruntled 
	staff who want to damage their current or former employers.
  Some hackers seek financial gain, but most see hacking as an intellectual 
	challenge and are presumably responsible for those attacks that seem pointless 
	to the rest of us. Others can be politically motivated, and express their 
	dissent by disrupting their target's online activities.
  'Our research concludes that 60 percent of attacks 
	take place because of a security breach caused by bribed or angry staff, who 
	disclose details of internal systems to third parties,' said DK Matai, 
	mi2g's founder.
  'Our recommendation is that the first level of precaution 
	is taken within human resources management monitoring dissatisfaction among 
	employees. Solid legal contracts should be in place that emphasise the consequences 
	of security breaches and make clear that the company will pursue the moles 
	with penal action,' he said.
  Cyber attacks can fall into several different categories. These include: 
	
	· Denial of service Users cannot access sites. 
	· Surrogacy The site address is usurped. 
	· Piracy Data is extracted or manipulated. 
	· Hazards Vital operational information is manipulated to disrupt an 
	activity.
  While firms have long been able to insure against the loss of business information, 
	such policies have failed to keep pace with the increasing risk. The proliferation 
	of Internet applications is making business systems increasingly open and 
	vulnerable.
  New categories of risk are appearing that could make businesses lose revenue, 
	and make host organisations liable to third parties for the loss or theft 
	of personal information in their possession. This could include credit card 
	information, medical histories and intellectual property.
  The first step in securing a network is to understand exactly what data is 
	available online, who has access to it, and whether adequate protection is 
	in place.
  The most widely used method of assessing the likelihood and impact of risk 
	exposure addresses three main areas:
	· Prediction What is the current state of the systems? Where 
	are security failures likely, or actually occurring? How effective is the 
	security policy? 
	· Quantification of impact and prioritisation What failures 
	will cause the most harm? What security risks should be tackled first? 
	· Management What changes are occurring in an organisation's 
	risk profile? How is security policy addressing those changes?
  A survey of City of London financial institutions by mi2g found that 
	four in 10 banks are dissatisfied with their current security provisions and 
	that 5.5 percent had been attacked online at least once.
  Some trouble can be avoided by having suitable security policies, and there 
	are a number of IT measures companies can take. 'Firms 
	should regularly review recovery procedures, and maybe keep a unique spare 
	system with a different underlying operating system, so that if the main system 
	is attacked, the spare one kicks in,' said Matai.
  Matai acknowledged this is a very expensive solution. 'This 
	option involves the cost of keeping over 50 percent of your computing resources 
	idle, and not every organisation can afford that,' he said.
  Another step is securing reference clocks. Ensuring that the date and time 
	of systems cannot be changed is an important precaution to avoid interference 
	with accounts.
  High-risk companies should create unique security architectures so that no 
	one knows the whole system design, thus making it difficult to break in.
  There are a number of architectural tricks that can be designed into a system, 
	said Matai. These include adding extra layers and what are called 'honey pots' 
	relatively visible and easily accessible areas that lure hackers, leading 
	them to believe that they are inside a network. However, they trigger alarms 
	so administrators know the system is being hacked into.
  A security policy should also prioritise remedial action and foster strong 
	encryption, interception and pursuit techniques.
  Network and Internet risk management is the combination of legal, technical, 
	personnel and insurance provisions. However, even with proper precautions, 
	eternal vigilance is still required.
  www.mi2g.com
	www.l0pht.com
  SUMMARY 
	· Recent denial of service attacks on leading Web sites have highlighted 
	the vulnerability of e-businesses. 
	· Most security threats emanate from disgruntled staff. 
	· Companies should include stringent security rules in staff handbooks. 
	
	· Safeguards can be designed into systems. These may include hacker 
	traps, spare systems, and restricting knowledge of the network.