0% found this document useful (0 votes)
116 views

Lock Up The Server Room: Computer Crime, or Cybercrime, Refers To Any Crime That Involves A

The document discusses various types of computer crimes and ways to prevent them. It notes that computer crime, also called cybercrime, can include illegal access of computer systems, copyright infringement, child pornography, hacking, and other crimes facilitated by computers or online networks. The document also discusses how governments and non-state actors are increasingly utilizing cyber capabilities for espionage, financial theft, and other cross-border crimes. It emphasizes the importance of physical security measures like locking server rooms, using surveillance cameras, securing laptops and backups, and disabling unauthorized access to devices and data to prevent computer crimes and hacking.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views

Lock Up The Server Room: Computer Crime, or Cybercrime, Refers To Any Crime That Involves A

The document discusses various types of computer crimes and ways to prevent them. It notes that computer crime, also called cybercrime, can include illegal access of computer systems, copyright infringement, child pornography, hacking, and other crimes facilitated by computers or online networks. The document also discusses how governments and non-state actors are increasingly utilizing cyber capabilities for espionage, financial theft, and other cross-border crimes. It emphasizes the importance of physical security measures like locking server rooms, using surveillance cameras, securing laptops and backups, and disabling unauthorized access to devices and data to prevent computer crimes and hacking.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Computer crime, or 

cybercrime, refers to any crime that involves a computer and a network, where the
computers may or may not have played an instrumental part in the commission of a crime.
[1]
Netcrime refers, more precisely, to criminal exploitation of the Internet.[2] Issues surrounding this type of
crime have become high-profile, particularly those surrounding hacking, copyright infringement,child
pornography, and child grooming. There are also problems of privacy when confidential information is lost
or intercepted, lawfully or otherwise.

On the global level, both governments and non-state actors continue to grow in importance, with the
ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes
referred to as cyber warfare. The international legal system is attempting to hold actors accountable for
their actions, with the International Criminal Court among the few addressing this threat

A computer crime is any illegal action where the data on a computer is accessed without permission. This access
doesn't have to result in loss of data or even data modifications. Arguably the worst computer crime occurs when
there are no indications that data was accessed.

Computer crime is often attributed to rogue hackers and crackers, but increasingly organized crime groups have
realized the relative ease of stealing data with relative low-level of risk. Government organizations are also rumored
to be involved with hacking in to computer systems, but the legality of such actions is far too grey an area to be
discussed here.

Lock up the server room


Even before you lock down the servers, in fact, before you even turn them on for the first time, you
should ensure that there are good locks on the server room door. Of course, the best lock in the
world does no good if it isn’t used, so you also need policies requiring that those doors be locked
any time the room is unoccupied, and the policies should set out who has the key or keycode to get
in.
The server room is the heart of your physical network, and someone with physical access to the servers,
switches, routers, cables and other devices in that room can do enormous damage.

Vendor HotSpot
Get the Most Out of Server Virtualization

Maximize the efficiency of your virtualization solution. Visit the Dell Virtualization Center today.
Learn More »

#2: Set up surveillance


Locking the door to the server room is a good first step, but someone could break in, or someone
who has authorized access could misuse that authority. You need a way to know who goes in and
out and when. A log book for signing in and out is the most elemental way to accomplish this, but it
has a lot of drawbacks. A person with malicious intent is likely to just bypass it.
A better solution than the log book is an authentication system incorporated into the locking devices, so that a
smart card, token, or biometric scan is required to unlock the doors, and a record is made of the identity of
each person who enters.

A video surveillance camera, placed in a location that makes it difficult to tamper with or disable (or even to
find) but gives a good view of persons entering and leaving should supplement the log book or electronic
access system. Surveillance cams can monitor continuously, or they can use motion detection technology to
record only when someone is moving about. They can even be set up to send e-mail or cell phone notification
if motion is detected when it shouldn’t be (such as after hours).

#3: Make sure the most vulnerable devices are in that locked room
Remember, it’s not just the servers you have to worry about. A hacker can plug a laptop into a hub
and use sniffer software to capture data traveling across the network. Make sure that as many of
your network devices as possible are in that locked room, or if they need to be in a different area, in
a locked closet elsewhere in the building.
#4: Use rack mount servers
Rack mount servers not only take up less server room real estate; they are also easier to secure.
Although smaller and arguably lighter than (some) tower systems, they can easily be locked into
closed racks that, once loaded with several servers, can then be bolted to the floor, making the
entire package almost impossible to move, much less to steal.
#5: Don’t forget the workstations
Hackers can use any unsecured computer that’s connected to the network to access or delete
information that’s important to your business. Workstations at unoccupied desks or in empty offices
(such as those used by employees who are on vacation or have left the company and not yet been
replaced) or at locations easily accessible to outsiders, such as the front receptionist’s desk, are
particularly vulnerable.
Disconnect and/or remove computers that aren’t being used and/or lock the doors of empty offices, including
those that are temporarily empty while an employee is at lunch or out sick. Equip computers that must remain
in open areas, sometimes out of view of employees, with smart card or biometric readers so that it’s more
difficult for unauthorized persons to log on.

#6: Keep intruders from opening the case


Both servers and workstations should be protected from thieves who can open the case and grab
the hard drive. It’s much easier to make off with a hard disk in your pocket than to carry a full tower
off the premises. Many computers come with case locks to prevent opening the case without a key.
You can get locking kits from a variety of sources for very low cost, such as the one at Innovative Security
Products.
#7: Protect the portables
Laptops and handheld computers pose special physical security risks. A thief can easily steal the
entire computer, including any data stored on its disk as well as network logon passwords that may
be saved. If employees use laptops at their desks, they should take them with them when they leave
or secure them to a permanent fixture with a cable lock, such as the one at PC Guardian.
Handhelds can be locked in a drawer or safe or just slipped into a pocket and carried on your person when you
leave the area. Motion sensing alarms such as the one at SecurityKit.com are also available to alert you if your
portable is moved.
For portables that contain sensitive information, full disk encryption, biometric readers, and software that
“phones home” if the stolen laptop connects to the Internet can supplement physical precautions.

#8: Pack up the backups


Backing up important data is an essential element in disaster recovery, but don’t forget that the
information on those backup tapes, disks, or discs can be stolen and used by someone outside the
company. Many IT administrators keep the backups next to the server in the server room. They
should be locked in a drawer or safe at the very least. Ideally, a set of backups should be kept off
site, and you must take care to ensure that they are secured in that offsite location.
Don’t overlook the fact that some workers may back up their work on floppy disks, USB keys, or external hard
disks. If this practice is allowed or encouraged, be sure to have policies requiring that the backups be locked up
at all times.

#9: Disable the drives


If you don’t want employees copying company information to removable media, you can disable or
remove floppy drives, USB ports, and other means of connecting external drives. Simply
disconnecting the cables may not deter technically savvy workers. Some organizations go so far as
to fill ports with glue or other substances to permanently prevent their use, although there are
software mechanisms that disallow it. Disk locks, such as the one at SecurityKit.com, can be inserted
into floppy drives on those computers that still have them to lock out other diskettes.
#10: Protect your printers
You might not think about printers posing a security risk, but many of today’s printers store
document contents in their own on-board memories. If a hacker steals the printer and accesses that
memory, he or she may be able to make copies of recently printed documents. Printers, like servers
and workstations that store important information, should be located in secure locations and bolted
down so nobody can walk off with them.
Also think about the physical security of documents that workers print out, especially extra copies or copies
that don’t print perfectly and may be just abandoned at the printer or thrown intact into the trash can where
they can be retrieved. It’s best to implement a policy of immediately shredding any unwanted printed
documents, even those that don’t contain confidential information. This establishes a habit and frees the end
user of the responsibility for determining whether a document should be shredded.

Summary
Remember that network security starts at the physical level. All the firewalls in the world won’t stop
an intruder who is able to gain physical access to your network and computers, so lock up as well as
lock down.
What Are Different Types Of Computer Crimes
Sponsored
Computer crime, also known as cyber crime, e-crimes, hi-tech crime or electronic Links :
crime, is referred to any criminal activity that is done by means or through a
computer or internet network.

Some of these include illegal access to protected websites, illegal interception of computer data,
unauthorized data interference, and unauthorized interference with the functioning of a computer
system, misuse of information technology devices, electronic fraud and internet-related forgery. As
per statistics available with the US Uniform Crime Reporting Agency, more than 300 million people
around the globe have access to World Wide Web, out of which, more than 1 million are engaged in
one or the other types of cyber crime activities.

Although, there are several different forms of cyber crimes in vogue, all these can be broadly classified
into four major types of computer crimes. Mentioned below are two important types of cyber crimes.

1. Computer as a target: Objective of this crime is to damage or steal data from a computer at a
distant location. Some important types include intellectual property theft, theft of marketing
information, and stealing personal information. Creating malicious spyware and viruses with
the intention of sabotaging the operating systems also comes under this category. Unlawful
access to confidential government records, techno-vandalism and techno-trespassing also
come under crimes where computer is a target.
2. Computer used as an instrument of crime: These categories of crimes involve using the
computer as a means for committing a crime. Some important examples include fraudulent
use of ATMs, credit card frauds, theft of money from transfer accounts through manipulation
of computer processes, and frauds committed through internet transactions.
Telecommunications frauds also come under this category where the calls are made by one
person and the charges are billed to another customer. 

Other two categories of cyber crime include those where a computer is incidental for other crimes and
crimes associated with the prevalence of computers.

You might also like