Georgetown University

MGMT 550 Information Technology and Business Strategy

Ewan Sutherland

Security and Hacking


Issues

Public perceptions


Potential problems arise from:


Computer crimes


Hacking

Motivations

Made possible by:

Passwords and PINs


Computer Misuse Act (United Kingdom)


Tapping

Dept IIO [of the Stasi] was eavesdropping on the entire West Germany radio and telecommunications traffic around the clock.

Der Spiegel #34/92.

Electromagnetic emissions

Faraday cages

Common protocols

Traceroute

Tracing route to target: 147.188.192.5

Hop:	IP Address:	Domain Name:	Round-Trip Time (ms)

   1	 193.62.25.33	 gw1.lamp.ac.uk	 	 	 55
   2	 193.62.25.66	 gw2.lamp.ac.uk	 		110
   3	 137.44.8.254	 ??? Swansea 			110
   4	 193.63.203.66	 smds-gw.bham.ja.net	 	165
   5	 147.188.128.87  acs-gw.bham.ac.uk	 	109
   6	 147.188.172.9	 ??? Birmingham			110
   7	 147.188.200.2	 cs-gw.cs.bham.ac.uk		110
   8	 147.188.192.5	 skippy.cs.bham.ac.uk		165
 Target www.cs.bham.ac.uk reached.

Hop:	IP Address:	Domain Name:			Round-Trip Time (ms)

   1	 193.62.25.33	gw1.lamp.ac.uk	 		  	 55
   2	 193.62.25.66	gw2.lamp.ac.uk	 			110
   3	 137.44.8.254	??? Swansea 				110
   4	 193.63.203.65	smds-gw.rl.ja.net	 		109
   5	 193.63.203.33	smds-gw.ulcc.ja.net	 	 	110
   6	 193.63.94.8	icm-lon-1.icp.net	 		220
   7	 192.157.65.113	icm-dc-1-S3/2-1984k.icp.net	 	1154
   8	 144.228.20.8	sl-dc-8-F0/0.sprintlink.net	 	220
   9	 144.228.10.42	sl-mae-e-H2/0-T3.sprintlink.net	 	220
  10	 192.41.177.181	cpe2.Washington.mci.net	 		220
  11	 204.70.57.9	??? Washington.mci.net			219
  12	 204.70.3.1	core-fddi-1.Washington.mci.net	 	220
  13	 204.70.1.14	core-hssi-3.Denver.mci.net	 	330
  14	 204.70.1.38	core-hssi-3.SanFrancisco.mci.net	329
  15	 204.70.2.162	border1-fddi0/0.SanFrancisco.mci.net 	439
  16	 204.70.32.6	cpe1-hssi-1.SanFrancisco.mci.net	329
  17	 192.31.48.200	SU-CM.BARRNET.NET			275
  18	 131.119.2.2	UCBO.BARRNET.NET			329
  19	 192.31.161.21	inr-666-dmz.Berkeley.EDU		384
  20	 128.32.1.2	inr-108-styx.Berkeley.EDU		330
  21	 128.32.155.104	inr-104.Berkeley.EDU			274
  22	 128.32.136.66	** ack.Berkeley.EDU **			275
 Target www.berkeley.edu reached.

Mobile telephony


Encryption

Effort to de-code

Encryption of telephone calls


The Clipper chip

Professional concern


Viruses

Transmitted by disc or network

Prevention

Protection of data

Human error

a critical fax sent by a UK government department to the Press Association instead of another government office

Worms

Wider issues

The Internet


Conclusions


Readings

Hafner, Katie and Markoff, John (1991) "Cyberpunk; outlaws and hackers on the computer frontier" Fourth Estate, London. Lauinger: QA76.9.A25 H34 1991

Foucault, Michel (1975) "Surveillir et Punir; naissance de la prison" Gallimard, Paris. Lauinger: HV 8666.F68

Denning, dorothy (1982) "Cryptography and Data Security" Addison-Wesley, Reading, MA. Lauinger: DA76.9.A25 D46 1982.


Internet Resources


Copyright © Ewan Sutherland, 1995.

Ewan Sutherland's home page

http://www.georgetown.edu/sutherland/mgmt550/security.html