![]() |
CSRC Homepage Publications Homepage Special Publications page Table of Contents for Special Publication 800-12: Part I: Introduction & Overview Table of Contents Chapter 1 Introduction Chapter 2 Elements of Computer Security Chapter 3 Roles & Responsibilities Chapter 4 Common Threats: A Brief Overview Part II: Management Controls Chapter 5 Computer Security Policy Chapter 6 Computer Security Program Management Chapter 7 Computer Security Risk Management Chapter 8 Security & Planning in the Computer Security Life Cycle Chapter 9 Assurance Part III: Operational Controls Chapter 10 Personnel / User Issues Chapter 11 Preparing for Contingencies and Disasters Chapter 12 Computer Security Incident Handling Chapter 13 Awareness, Training and Education Chapter 14 Security Considerations in Computer Support and Operations Chapter 15 Physical and Environmental Security Part IV: Technical Controls Chapter 16 Identification and Authentication Chapter 17 Logical Access Control Chapter 18 Audit Trails Chapter 19 Cryptography Part V: Example Chapter 20 Assessing and Mitigating the Risks to a Hypothetical Computer System Interdependencies Cross Reference |
For
a printable copy of Chapter 4.
Employees are most familiar with their employer's computers and applications, including knowing what actions might cause the most damage, mischief, or sabotage. The downsizing of organizations in both the public and private sectors has created a group of individuals with organizational knowledge, who may retain potential system access (e.g., if system accounts are not deleted in a timely manner).28 The number of incidents of employee sabotage is believed to be much smaller than the instances of theft, but the cost of such incidents can be quite high. Martin Sprouse, author of Sabotage in the American Workplace, reported that the motivation for sabotage can range from altruism to revenge:
4.4 Loss of Physical and Infrastructure SupportThe loss of supporting infrastructure includes power failures (outages, spikes, and brownouts), loss of communications, water outages and leaks, sewer problems, lack of transportation services, fire, flood, civil unrest, and strikes. These losses include such dramatic events as the explosion at the World Trade Center and the Chicago tunnel flood, as well as more common events, such as broken water pipes. Many of these issues are covered in Chapter 15. A loss of infrastructure often results in system downtime, sometimes in unexpected ways. For example, employees may not be able to get to work during a winter storm, although the computer system may be functional. 4.5 Malicious HackersThe term malicious hackers, sometimes called crackers, refers to those who break into computers without authorization. They can include both outsiders and insiders. Much of the rise of hacker activity is often attributed to increases in connectivity in both government and industry. One 1992 study of a particular Internet site (i.e., one computer system) found that hackers attempted to break in once at least every other day.30 The hacker threat should be considered in terms of past and potential future damage. Although current losses due to hacker attacks are significantly smaller than losses due to insider theft and sabotage, the hacker problem is widespread and serious. One example of malicious hacker activity is that directed against the public telephone system. Studies by the National Research Council and the National Security Telecommunications Advisory Committee show that hacker activity is not limited to toll fraud. It also includes the ability to break into telecommunications systems (such as switches), resulting in the degradation or disruption of system availability. While unable to reach a conclusion about the degree of threat or risk, these studies underscore the ability of hackers to cause serious damage.31, 32 The hacker threat often receives more attention than more common and dangerous threats. The U.S. Department of Justice's Computer Crime Unit suggests three reasons for this.
4.6 Industrial EspionageIndustrial espionage is the act of gathering proprietary data from private companies or the government34 for the purpose of aiding another company(ies). Industrial espionage can be perpetrated either by companies seeking to improve their competitive advantage or by governments seeking to aid their domestic industries. Foreign industrial espionage carried out by a government is often referred to as economic espionage. Since information is processed and stored on computer systems, computer security can help protect against such threats; it can do little, however, to reduce the threat of authorized employees selling that information. Industrial espionage is on the rise. A 1992 study sponsored by the American Society for Industrial Security (ASIS) found that proprietary business information theft had increased 260 percent since 1985. The data indicated 30 percent of the reported losses in 1991 and 1992 had foreign involvement. The study also found that 58 percent of thefts were perpetrated by current or former employees.35 The three most damaging types of stolen information were pricing information, manufacturing process information, and product development and specification information. Other types of information stolen included customer lists, basic research, sales data, personnel data, compensation data, cost data, proposals, and strategic plans.36 Within the area of economic espionage, the Central Intelligence Agency has stated that the main objective is obtaining information related to technology, but that information on U.S. government policy deliberations concerning foreign affairs and information on commodities, interest rates, and other economic factors is also a target.37 The Federal Bureau of Investigation concurs that technology-related information is the main target, but also lists corporate proprietary information, such as negotiating positions and other contracting data, as a target.38 4.7 Malicious CodeMalicious code refers to viruses, worms, Trojan horses, logic bombs, and other "uninvited" software. Sometimes mistakenly associated only with personal computers, malicious code can attack other platforms.
A 1993 study of viruses found that while the number of known viruses is increasing exponentially, the number of virus incidents is not.39 The study concluded that viruses are becoming more prevalent, but only "gradually."
Actual costs attributed to the presence of malicious code have resulted primarily from system outages and staff time involved in repairing the systems. Nonetheless, these costs can be significant. 4.8 Foreign Government EspionageIn some instances, threats posed by foreign government intelligence services may be present. In addition to possible economic espionage, foreign intelligence services may target unclassified systems to further their intelligence missions. Some unclassified information that may be of interest includes travel plans of senior officials, civil defense and emergency preparedness, manufacturing technologies, satellite data, personnel and payroll data, and law enforcement, investigative, and security files. Guidance should be sought from the cognizant security office regarding such threats. 4.9 Threats to Personal PrivacyThe accumulation of vast amounts of electronic information about individuals by governments, credit bureaus, and private companies, combined with the ability of computers to monitor, process, and aggregate large amounts of information about individuals have created a threat to individual privacy. The possibility that all of this information and technology may be able to be linked together has arisen as a specter of the modern information age. This is often referred to as "Big Brother." To guard against such intrusion, Congress has enacted legislation, over the years, such as the Privacy Act of 1974 and the Computer Matching and Privacy Protection Act of 1988, which defines the boundaries of the legitimate uses of personal information collected by the government. The threat to personal privacy arises from many sources. In several cases federal and state employees have sold personal information to private investigators or other "information brokers." One such case was uncovered in 1992 when the Justice Department announced the arrest of over two dozen individuals engaged in buying and selling information from Social Security Administration (SSA) computer files.42 During the investigation, auditors learned that SSA employees had unrestricted access to over 130 million employment records. Another investigation found that 5 percent of the employees in one region of the IRS had browsed through tax records of friends, relatives, and celebrities.43 Some of the employees used the information to create fraudulent tax refunds, but many were acting simply out of curiosity. As more of these cases come to light, many individuals are becoming increasingly concerned about threats to their personal privacy. A July 1993 special report in MacWorld cited polling data taken by Louis Harris and Associates showing that in 1970 only 33 percent of respondents were concerned about personal privacy. By 1990, that number had jumped to 79 percent.44 While the magnitude and cost to society of the personal privacy threat are difficult to gauge, it is apparent that information technology is becoming powerful enough to warrant fears of both government and corporate "Big Brothers." Increased awareness of the problem is needed. ReferencesHouse Committee on Science, Space and Technology, Subcommittee on Investigations and Oversight. Bugs in the Program: Problems in Federal Government Computer Software Development and Regulation. 101st Congress, 1st session, August 3, 1989. National Research Council. Computers at Risk: Safe Computing in the Information Age. Washington, DC: National Academy Press, 1991. National Research Council. Growing Vulnerability of the Public Switched Networks: Implication for National Security Emergency Preparedness. Washington, DC: National Academy Press, 1989. Neumann, Peter G. Computer-Related Risks. Reading, MA: Addison-Wesley, 1994. Schwartau, W. Information Warfare. New York, NY: Thunders Mouth Press, 1994 (Rev. 1995). Sprouse, Martin, ed. Sabotage in the American Workplace: Anecdotes of Dissatisfaction, Mischief, and Revenge. San Francisco, CA: Pressure Drop Press, 1992.
Footnotes: 19.
As is true for this publication as a whole, this chapter does not
address threats to national security systems, which fall outside
of NIST's purview. The term "national security systems"
is defined in National Security Directive 42 (7/5/90) as being "those
telecommunications and information systems operated by the U.S.
Government, its contractors, or agents, that contain classified
information or, as set forth in 10 U.S.C. 2315, that involves intelligence
activities, involves cryptologic activities related to national
security, involves command and control of military forces, involves
equipment that is an integral part of a weapon or weapon system,
or involves equipment that is critical to the direct fulfillment
of military or intelligence missions." |
|
Last
updated:
July 16, 2004
Disclaimer Notice & Privacy Policy Send comments or suggestions to CSRC Webmaster NIST is an Agency of the U.S. Commerce Department's Technology Administration |