Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Download
29547 views
1
2
3
4
5
6
Hack Attacks
7
8
Hardly a week goes by
9
without a report of some new virus or other security risk on the Internet.
10
Microsoft's Internet Explorer was a particularly fertile ground for
11
bug-hunters, as is explained . Depending on whom you talk to, browsing the
12
Internet is as safe as a walk in the park, or as dangerous as a walk alone at
13
night in Central Park.
14
15
Is your
16
data being read by prying eyes? Intercepted by third parties? Altered or
17
obliterated by crooks or pranksters? How concerned should you be, and what
18
exactly is at risk?
19
20
Data can be compromised while it resides on your computer
21
or during transmission from one place to another. (To see why transmission is
22
so risky, see this explanation of .)
23
24
The best way to secure your
25
data from outsiders is via encryption . The goal here is to prevent
26
others from accessing it or, as a last resort, preventing them from reading it
27
or tampering with it if they do succeed in accessing it. Encryption
28
works on the principle of a lock and key. The lock is the encrypted data; the
29
key is a number. The number can't be derived from the encrypted data, so the
30
lock can't be opened without the key.
31
32
The
33
simplest and most effective kind of encryption is single-key encryption :
34
The author puts his data in a box, locks it, and sends it to an audience that
35
already has a copy of the key. Single-key encryption works fine for broadcast
36
situations such as a military command sending orders to its units, but not so
37
well for two-way interactions. Public/private-key encryption provides an
38
elegant solution to the problem. Under public/private-key encryption, everyone
39
gets an individual lock with two keys. One key locks it, the other key unlocks
40
it, and you can't derive one from the other. If Bill wants to send Joe mail, he
41
locks it with Joe's public key, which is available for all the world to see.
42
Now it is locked, and only Joe can unlock it with his private key, so only he
43
and Bill can know the contents. Unfortunately, there is currently no standard
44
way for someone to get or publish a key, which is one reason encrypted e-mail
45
is not common today. PGP (Pretty Good Privacy) is a free utility that lets you do
46
public/private-key encryption.
47
48
49
Encryption comes in different strengths,
50
denoted by the size of the numeric key. The bigger the key, the harder it is to
51
break the encryption (pick the lock). Since encryption inhibits the ability of
52
the government to spy on private dialogues, there are public-policy issues
53
surrounding encryption. This is another reason encrypted e-mail is uncommon
54
today, a topic which David Plotz covered in an earlier "The Gist" in Slate. SSL
55
(Secure Sockets Layer), an Internet standard for encrypting data, is built into
56
recent versions of Microsoft's Internet Explorer and Netscape's Navigator. But
57
because encrypting and decrypting data is fairly slow, SSL tends to be used
58
only where privacy really matters--typically, electronic commerce.
59
60
Sometimes
61
it's desirable to have data that are publicly available, but untamperable. For
62
instance, the government publishes a crop report that a commodity broker then
63
passes on to a client. How can the client know that the broker hasn't altered
64
the report? Digital signatures solve this problem. Mathematics can
65
reduce any document to a few unique numbers--the signature. Changing the
66
original data in any way results in a different signature. This signature is
67
then encrypted with a private key. Using a public key, anyone can confirm that
68
the signature matches the document. The document can't have changed because the
69
signature is the same, and the signature can't be forged because only the
70
creator has access to the private key that encrypted it.
71
72
What about protecting the data on your hard drive?
73
Typically this is done at the operating-system level by restricting access to
74
certain users. Ideally, users would carry around giant numeric keys to identify
75
themselves, but computer marketers could never sell that solution. In the end,
76
most systems identify users by passwords. Users enter their names and
77
passwords. The name is public, but the password is private. The simplicity of
78
the system is its power. While an encrypted document gives a code breaker
79
something to analyze, an empty password prompt is simply empty.
80
81
82
Unfortunately, computer users betray themselves. Anecdotal evidence shows that
83
most passwords are birth dates of family members, maiden names, favorite sports
84
teams--things that are easy to guess. That's why the best passwords aren't real
85
words, but combinations of letters, numbers, and punctuation. The best password
86
contains enough nonsense so that no one can guess it, but not so much nonsense
87
that you can't remember it. And therein lies the other problem with passwords:
88
People forget them. This is so common that, for every network, there is someone
89
(the system administrator) who has the power to retrieve or change your
90
password. The world's best password is useless if the system administrator's
91
password is easy to guess, or if someone can get her drunk or blackmail her.
92
But the alternative is frightening, which is why we don't encrypt our hard
93
drives with the password as our key. If we lost the key, that would be
94
that.
95
96
97
The greatest perils to your precious data are
98
the programs you've installed on your computer. Who hasn't accidentally told a
99
computer to delete the wrong file or stood by helplessly while the operating
100
system crashed and took all the files with it?
101
102
Then there are programs
103
designed to do damage. The worst are Trojan horses , programs that
104
claim to be one thing but are really another, such as a program that is
105
supposed to be a calendar but secretly erases your hard drive or copies its
106
contents somewhere else. Then there are the legitimate programs that have been
107
infected with subprograms called viruses . Viruses are crafty things that
108
are cleverly (if perversely) designed to replicate themselves whenever their
109
host program is run. Once replicated, they might then do harm to your data,
110
just like biological viruses can do harm to their hosts.
111
112
Further
113
perils to your data are programs like operating systems and browsers, which are
114
supposed to protect you from harm. Like a brick wall, they resist any frontal
115
attack. But like a brick wall, some of these programs have holes. The most
116
insidious kind of hole is a back door , put there with a benign purpose
117
(like letting in the dog) that can be exploited for nefarious ends (like
118
letting in a trained monkey to steal your wallet). The recent Internet Explorer
119
was just that. Some people feel that , found in most browsers, are a security
120
hole, but I strongly disagree.
121
122
How can you be sure your programs are safe? Either obtain
123
your programs from trustworthy sources, or ensure that the programs behave.
124
Both have their trade-offs. If you were a photographer and had to hire child
125
models for an important shoot, you could hire from a reputable modeling agency
126
that guaranteed its clients, or you could hire children off the street and also
127
hire an authoritarian nanny to watch them every second. The agency can't really
128
ensure their client's behavior, but you would know that it had done its very
129
best to choose only well-behaved children. The nanny, by comparison, can be
130
trusted to control the children, but her constant presence irritates the
131
children and slows down the shoot. Either way, you're paying someone (the
132
agency or the nanny). The best case of the agency is best (everyone behaves and
133
is happy), but the worst case of the agency is worst overall (all the children
134
go into hysterics at once). With the nanny, you know what to expect. Your shoot
135
will never go as well as the best case of the agency, but then neither will it
136
ever descend into chaos.
137
138
With
139
software, the "agency" is an independent, trusted body verifying that software
140
comes from where it claims. A digital signature ensures it came straight from
141
the manufacturer, picking up no stray viruses along the way. Microsoft's
142
Internet Explorer uses this method for its ActiveX controls, which it calls
143
"Authenticode TM ." These controls are small programs with no
144
artificial constraints on their behavior. They allow for the highest possible
145
performance and functionality, but also the highest potential for damage. If
146
you download a control that has not been signed by a trusted agency, you're
147
putting your data in danger.
148
149
150
The "nanny" approach is the one taken by Java,
151
a special programming language available in both Internet Explorer and
152
Navigator that restricts the behavior of its programs. Because the abilities of
153
these programs are restricted, they can't harm your data. But because they are
154
restricted, they are slower and can do less. For example, Java programs cannot
155
read the files created by your personal-finance program. That's good for
156
safety, but rotten for functionality if you're trying to write a program to
157
help people analyze their personal finances. Another Java advantage is that
158
because its programs do less, they can run on almost any computer, no matter
159
what the operating system (Windows 95, Mac OS, OS/2, Unix, etc.).
160
161
Both approaches have merit
162
for different applications. A high-performance video game can't afford the
163
performance penalty of Java, but if you trust the manufacturer, digital
164
signatures that guarantee ActiveX give you the confidence to run it. On the
165
other hand, a fill-in-the-blanks tax application doesn't require breakneck
166
performance, so a Java version that can run on almost any computer might be
167
desirable. In fact, a hybrid approach may yield the best results: for example,
168
Java presentation software that uses machine-specific ActiveX controls for
169
high-performance animation and sound.
170
171
The
172
concern over Internet security is somewhat overblown. There isn't a mob of data
173
villains waiting on the other side of the wire to steal your money, read your
174
e-mail, and kidnap your dog. There is no documented case of a credit-card
175
number being stolen over the Internet. Sure, viruses do spread and data are
176
occasionally lost, but the main reason you hear so much about security is that
177
it's a great marketing tactic. "Don't buy their browser; ours is safer." Or,
178
"Viruses can kill! Buy our anti-virus software." Microsoft, Netscape, and
179
others compete to make sure their products are as secure as possible. So maybe
180
paranoia is sometimes a good thing.
181
182
183
184
185
186