Computers today are an integral part of day to day campus life. E-mail and instant messages are heavily used for communications. University administrative business processes depend upon computer automation, record keeping, and dependable, confidential, and quick access to reliable information. The university's academic processes make use of computers for classroom presentations, lab demonstrations and simulations, and online research. For many of us, computers are also used frequently in our private lives.
We all have a vested interest in ensuring that our computing infrastructure continues to operate reliably and that it preserves the confidentiality and integrity of the information it handles - both our own and that of those we serve. Our JMU network is made up of over 15,000 computing devices. Each and every device contributes to our network's security. Each and every operator of those devices has a necessary and important part in preserving the integrity of our network, just as every citizen has a necessary and important part in preserving a society.
Each and every day, some of the 600 million people on the Internet are reaching out and touching our computers in attempts to violate our privacy, use our resources, dupe us into helping them perform a crime, or steal information. Every one of the 15,000 or so computers on the JMU network is an attractive target for criminals. Serious crimes have been committed on, by, and through five year old laptops.
"The people of the world have granted control of their existence to computers, networks, and databases. You own property if a computer says you do. You can buy a house if a computer says you may. You have money in the bank if a computer says so. Your blood type is what the computer says it is. You are who the computer says you are." How to Own an Identity
Do you think your computer isn't an attractive target for criminals? Think again:
- Invasion of the Computer Snatchers ( Washington Post 02/20/06 )
- Panel paints grim picture of cybercrime battle ( ZDNet 06/01/2005 )
- Attack of the BOTS ( Wired 11/02/06 )
- Phishing is Big Business ( eWeek 03/07/2005 )
- Feds square off with organized cyber crime ( SecurityFocus 02/17/2005 )
- Is your computer part of a criminal network? ( GlobeandMail.com 01/20/2005 )
- 1.5 Million Node IRCBOT Network ( USA Today/AP 10/21/05 )
- Experts fret over online extortion attempts - 'Bot' armies capable of toppling big sites, some say ( MSN 11/10/2004 )
- Are hackers using your PC to spew spam and steal? ( USAToday 09/08/2004 )
- Malicious Bots Threaten Network Security ( IEEE Computer Society PDF File )
- When BOTS Attack ( Technology Review 09/24/2004 )
- Alarm growing over bot software ( News.com 04/30/2004 )
- Could your computer be a criminal? - PCs hijacked to send spam, serve porn, steal credit cards ( MSN 07/15/2003 )
And while setting up a computer and operating it in a more secure manner may sometimes be confusing, frustrating, and inconvenient, some simple steps can help prevent not only crimes against the network at large, but also personal losses:
The resources found here will hopefully help provide an understanding of the threats we face and the steps we can take to protect both ourselves and the rest of the JMU computing infrastructure.

No comments:
Post a Comment