Skip to Content
Department of Information Technology

Beware of Hacking

Why are hackers interested in my computer?

One may assume a Seton Hall computer doesn't have anything a hacker would be interested in like credit card numbers, national defense or trade secrets, but that doesn't mean the computer is not a target. Even if there is nothing that a hacker might find directly useful, a Seton Hall computer can still be a target for several reasons:

  1. Seton Hall has a high speed network that allows a hacker with access to a computer on our network to launch denial of service (DoS) attacks from our network. Sophisticated bot-net attacks are typically started like this and are growing at a rapid pace.
  2. Hackers will make use of our systems to hack into other systems. By establishing a long chain of computers which the hacker has access to, the hacker can attack a commercial, government or military site without being caught. For example, if the hacker attacks a military computer, the military will see the attack from computer A, the owners of computer A might look and see that they were hacked by computer B, the owners of computer B were hacked from computer C, and so on. If any computer along the way cannot establish where they were broken in from, the authorities will be unable to track the hacker back to their home computer.
  3. Another common motivation for hacking into a computer system is to set up services on the system (such as IRC, P2P servers) for the individual's own use. By stealing resources in this way, the hacker does not affect any one particular user, but degrades service in a way that affects the system as a whole and by extension all users.

How do hackers get into a computer system?

Hackers can get into a computer system by exploiting a vulnerability or weakness or hole in the computer's operating system. Very often this activity begins by either logging into the target system using the stolen user account and password of a legitimate user, or by using software vulnerabilities to take control of the computer.

What exactly happens when someone hacks into a computer system?

The most common thing hackers do is collect user accounts and passwords, either those stored on disk, or as they travel across the network. These are valuable to them not only as a means of entering a system, but also to trade with other hackers.

The most common method of operation for a hacker is the following:

  1. Scan the network for vulnerable systems.
  2. Start "sniffing" the network to find user accounts and passwords.
  3. Gain access to the system as a normal user. 
  4. Use the user access to gain privileged access as the administrator of the computer.
  5. Grab the password file and scan the network to find passwords.
  6. Clean up by deleting, changing logs or change system programs that would trace their steps.
  7. Proceed with their other objectives: hacking new systems or starting a denial of service attack or starting up a new server (like IRC/P2P) on the computer, etc.

How do I know whether I as an individual have been affected by a hacking incident?

The only way to know for certain that the hacker actually did anything to your computer is by detecting changes to your files and computer system you know you did not make yourself.

How often should I change my password?

The University has a Password Policy which sets the standards for creating a password as well as the expiration rules for all members of the University community.  Read the policy »

What's a good password? Here are some basic guidelines for the most secure passwords:

  • Avoid names or words found in the dictionary.
  • Use a combination of special characters, numbers and letters.
  • Include a non-alphanumeric character (such as #, @, or $) in the middle of the password.
  • Use ten characters or more.

Don't forget that Passwords are case sensitive (for example, "ABC" is different from "abc").

What harm can a hacker do to me (and others)?

There are three primary ways a hacker with access to your account can cause trouble:

  • by tampering with the data in your directory;
  • by impersonating you (sending e-mail that appears to have been sent by you, logging into systems to which you have access, etc.);
  • by attacking other computer systems from your account or computer.

These activities can range from the nuisance level to something much more serious. You definitely want to do all you can to avoid letting anyone access your account.

Could I be held responsible for anything?

Potentially, yes. Don't panic, but do be cautious.

What are my points of exposure?

  1. Local system weakness
    if the Laptop, PC, Departmental Server or local area network you're using to connect is improperly installed secured or administered, you could be exposed.
  2. Exposed password
    When you log into your account insecurely, for example an Application or web site does not use SSL then the user id and password you type may be transmitted over the wires in "clear text," that is, text that is not encrypted. Someone could use sniffing tools to see and collect this information.
  3. Downloading and executing software from the Internet
    one of the ways hackers collect user ids and passwords is by distributing software that collects this information for them. Similar to a computer virus, you could unknowingly install one of these insidious programs if you're not careful.

As a general rule, you should never execute software about which you are uncertain. This includes software that you have received as an e-mail attachment from someone you don't know or that you've downloaded from an Internet site you don't know and trust.

How do I report a security incident?

Please contact the Service Desk at (973) 275-2222 to report suspected incidents immediately.