IMAGINE a platoon of expert computer
criminals using the Internet to operate networks of hijacked computers. This
army of computers, known as botnets (robot networks), unleashes a barrage of
malicious computer code targeting a specific nation. Within minutes, that
nation’s military, financial, and commercial Web sites crash. ATMs and phone
networks fail. Airplanes are grounded, and computer and safety systems at a
nuclear power plant are disrupted. How would people react? What would they do?
What would you do?
Perhaps the above scenario seems far-fetched.
But according to Richard A. Clarke, the former U.S. National Coordinator
for Security, Infrastructure Protection, and Counterterrorism, something
similar could happen in real life. In fact, there have already been
cyberattacks. Perhaps you have even been a victim.
Why would anyone want to launch a
cyberattack? How are cyberattacks carried out? And since cybercrime against
individuals is common, how can you protect yourself online?
The Digital
Battlefield
People launch cyberattacks for various
reasons. Terrorists or governments, for instance, may try to infiltrate the
computer networks of their enemies to steal secrets or to sabotage the
equipment that those computer networks control. In 2010, U.S. Deputy Secretary
of Defense William J. Lynn III admitted that foreign “adversaries”
had repeatedly attacked and penetrated classified U.S. computer networks and
stolen “thousands of files . . . including weapons blueprints,
operational plans, and surveillance data.”—See the box “Some Recent
Cyberattacks.”
Computer criminals use similar methods to
steal intellectual property or financial information from corporate networks
and personal computers. Criminals reportedly rake in billions of dollars each
year by means of fraudulent network transactions.
Criminal hackers have assembled vast armies
of hijacked computers to carry out their online attacks. In 2009, an Internet
security firm uncovered a criminal gang that remotely controlled a global
network of nearly two million computers, many of them owned by private
citizens. The Organization for Economic Cooperation and Development (OECD)
recently estimated that 1 in 3 online computers is remotely controlled by an
intruder. What about your computer? Could someone commandeer it without your
knowledge?
Silent Stalkers
Picture the following scenario. A criminal
transmits a malicious program over the Internet. When the program finds your
computer, it silently probes its online defenses. When it finds an unguarded
door, it burrows deep into your computer and rummages around for useful
information. The malicious program may then change or delete your computer
files, e-mail itself to other computers, or send passwords, financial details,
or other confidential information back to the intruder.
Computer criminals could even trick you into
infecting your computer yourself! How? You may infect your own computer by
opening an innocent-looking e-mail attachment, clicking on a Web page link,
downloading and installing a free computer program, plugging an infected memory
device into your computer, or simply visiting a questionable Web site. Each of
these actions can install malicious software on your computer and bring it
under the control of a remote intruder.
How can you know if your computer has been
infected? It can be very difficult to detect. Your computer or Internet
connection may seem very slow, your applications may not run, pop-up boxes may
prompt you to install certain programs, or your computer may operate in an
unusual way. If you note any of these symptoms, have a reputable technician
check your computer.
‘Consider Your Steps’
As nations and individuals become more
reliant on computer technology, cyberattacks will likely become more common.
Accordingly, many nations are scrambling to beef up their digital defenses, and
some are conducting large-scale exercises to test the resilience of their
computer networks to attack. Still, “given enough time, motivation and funding,”
admits Steven Chabinsky, a senior U.S. Federal Bureau of Investigation computer
security expert, “a determined adversary will always—always—be able to
penetrate a targeted system.”
What can you do to protect yourself online?
While complete online security may not be possible, you can take practical
steps to make your computer more secure. The
Bible states: “The shrewd one considers his steps.” (Proverbs 14:15)
Surely wise advice when you go online!
PROTECT
YOURSELF!
1.
Install antivirus, spyware-detection, and firewall software on your computer.
Keep that software and your operating system updated with all security updates.
2.
Think before you click on links or open attachments in e-mails or instant
messages—even from friends. Be especially cautious if the mail is unsolicited
and asks for personal information or passwords.
3.
Never copy or run software from unknown sources.
4.
Use passwords that have at least eight characters and include numbers and
symbols, and change them regularly. Use different passwords for different
accounts.
5.
Do business online only with reputable companies that use secure connections.
6.
Do not give out confidential information about yourself or your accounts when
using unsecured Wi-Fi connections, such as in public places.
7.
Switch your computer off when it is not in use.
8.
Regularly back up your files, and store copies securely.
May 2012 AWAKE MAGAZINE
No comments:
Post a Comment