• shuTechSidebar
Information Technology

Beware of Hacking



Why are hackers interested in my computer?
So you think that your computer doesn't have anything a hacker would be interested in like credit card numbers, SSN’s national defense or Trade secrets, nothing that a hacker could find useful. Does this mean that your computer won't be a target? Unfortunately NO. Even if there is nothing that a hacker might find directly useful, your computer can still be a target for several reasons:

  1. SHU University has a very high speed network. A hacker who gets access to a computer on our network can use that computer to launch denial of service (DoS) attacks from our network. Sophisticated Bot-net attacks are typically started like this and are growing at a rapid pace.

  2. Hackers will make use of our systems to hack into other systems. By establishing a long chain of computers which the hacker has access to, the hacker can attack a commercial, government or military site without being caught. For example, if the hacker attacks a military computer, the military will see the attack from computer A, the owners of computer A might look and see that they were hacked by computer B, the owners of computer B were hacked from computer C, and so on. If any computer along the way cannot establish where they were broken in from, the authorities will be unable to track the hacker back to his home computer.

  3. Another common motivation for hacking into a computer system is to set up services on the system (such as IRC, P2P servers) for the individual's own use. By stealing resources in this way, the hacker does not affect any one particular user, but degrades service in a way that affects the system as a whole and by extension all users.

How do hackers get into a computer system?
Hackers can get into a computer system by exploiting a Vulnerability or weakness or hole in the computer's operating system. Very often this activity begins by either logging into the target system using the stolen user id and password of a legitimate user, or by using software vulnerabilities to take control of the computer.

What exactly happens when someone hacks into a computer system?
The most common thing hackers do is collect user ids and passwords, either those stored on disk, or as they travel across the network. These are valuable to them not only as a means of entering a system, but also to trade with other hackers.
The most common method of operation for a hacker is the following:

  1. Scan the Network for Vulnerable systems.
  2. Start "sniffing" the network to find user id’s/password
  3. Gain access to the system as a normal user. (sometimes the hackers will jump straight to step 3) 
  4. Use the user access to gain privileged access as the administrator of the computer. 
  5. Grab the password file 
  6. Start "sniffing" the network to find passwords 
  7. Clean up by deleting or changing logs that would show how they got in 
  8. Change system programs to help hide the fact that they are using your computer 
  9. Proceed with their other objectives: hacking new systems or starting a denial of service attack or starting up a new server (like IRC/P2P) on the computer, etc.

How do I know whether I as an individual have been affected by a hacking incident?
There is only one way to know for certain that the hacker actually did anything to you; by detecting changes to your files and computer system you know you did not make yourself.

How often should I change my password?
It is a good practice to change a password regularly at least every 90 Days as you minimize the risk of a hacker getting the same password. If you feel that your password has been compromised, change it immediately!


What's a good password?
Here are some basic guidelines for the most secure passwords:

  • Avoid names or words found in the dictionary.
  • Use a combination of special characters, numbers and letters. 
  • Include a non-alphanumeric character (such as #, @, or $) in the middle of the password. 
  • Use eight characters or more.

Don't forget that Passwords are case sensitive (for example, "ABC" is different from "abc").

If you're interested in a more thorough discussion of passwords, including strategies for selecting yours, go to the IT Security Website's Password Security page.

What harm can a hacker do to me (and others)?
There are three primary ways a hacker with access to your account can cause trouble:

  • By tampering with the data in your directory and
  • By impersonating you (sending e-mail that appears to have been sent by you, logging into systems to which you have access, etc.) 
  • by attacking other computer systems from your account or computer

These activities can range from the nuisance level to something much more serious. You definitely want to do all you can to avoid letting anyone access your account.

Could I be held responsible for anything?
Potentially, yes. Don't panic, but do be cautious.

What are my points of exposure?

  1. Local system weakness
    if the Laptop, PC, Departmental Server or local area network you're using to connect is improperly installed secured or administered, you could be exposed.

  2. Exposed password
    When you log into your account insecurely, for example an Application or web site does not use SSL then the user id and password you type may be transmitted over the wires in "clear text," that is, text that is not encrypted. Someone could use sniffing tools to see and collect this information.

  3. Downloading and executing software from the Internet
    one of the ways hackers collect user ids and passwords is by distributing software that collects this information for them. Similar to a computer virus, you could unknowingly install one of these insidious programs if you're not careful.

As a general rule, you should never execute software about which you are uncertain. This includes software that you have received as an e-mail attachment from someone you don't know or that you've downloaded from an Internet site you don't know and trust.

How do I report a security incident?
Please contact the Service Desk at (973) 275-2222 to report suspected incidents immediately.

Contact Us

Department of Information Technology
(973) 275-2222
servicedesk@shu.edu
Corrigan Hall

Sign In to PirateNet