This 
report describes the findings of recent studies which show that, worldwide, increasing 
computer crime is costing companies large amounts of money. It then examines the 
reasons behind this growth, emphasising that organisations are not doing enough 
to protect themselves.  The 
Statistics Computer 
Crime Increasing at an Alarming RateRecent 
studies in Australia, the United States of America and the United Kingdom indicate 
that corporations and Government departments are losing thousands to millions 
of dollars due to increasing computer crime. A 
study of 300 Australian companies by accounting firm Deloitte Touch Tohmatsu found 
that two in five (or 37%) of companies had experienced some form of computer security 
compromise in 1997.   In the U.S.A. the 1997 Computer Security Institute 
study of 563 companies revealed that 75% had lost money due to computer crimes 
in the previous year. This is a massive 78% increase over the number of incidents 
reported in 1996 - from 42% of firms in 1996 to 75% in 1997. A November 1997 report 
released by the Permanent Investigations Sub-Committee of 
the U.S. Senate estimated that businesses lost around US$800 million in 1995 through 
break-ins to computer systems at banks, hospitals, and other large businesses. 
 The Sub-Committee said that few businesses reported security 
breaches for fear of negative publicity that could scare off customers. Security 
problems were allegedly worse in the private sector than in government - to which 
more than $400 million of the calculated losses were attributed.  A 
1996 survey of 1,000 companies by the American Bar Association showed that 48 
percent had experienced computer fraud in the last five years.  In 
1996 the U.K. Association of British Insurers estimated that the cost of computer 
crime amounted to 250 million pounds (US$417.7 million). However, they claimed 
that this was only 20 percent of actual losses.  At 
a conference in Ottawa, Canada early in 1997, well known American security specialist 
Winn Schwartau estimated that the U.S. economy loses more than US$100 billion 
per annum through industrial espionage and that this has been growing at a rate 
of 500% per annum since 1992.  Similarly, in the 
U.K., the 1996 NCC Information Security Breaches Survey identified a 200% increase 
in computer crime from 1995 to 1996.   Costs 
ranging from thousands to millions of dollarsThe 
Deloitte study found that the cost per incident was generally around $10,000 (77% 
of firms) with 6% paying over $100,000 in total to deal with computer crime. Twenty 
percent (20%) of firms suffered 6 or more incidents that year. The 
1996 NCC Information Security Breaches Survey in the U.K. estimated the average 
loss at around US$30,000 per incident with a number of organisations losing up 
to US$1.5 million per incident.  The American estimates 
are even higher with the American Bar Association reporting that company losses 
ranged from $2 million to $10 million in 1996.    Insiders 
and outsiders to blameThe U.S. Senate 
Sub-Committee study revealed that internal users were responsible for nearly half 
of all break-ins. In Australia the Deloitte researchers 
found that 90% of the companies surveyed had traced the source of a security breach 
to a person within the organisation - a person with authorised access to corporate 
computer systems such as an employee, consultant or contractor. However, 60% of 
the companies also experienced attacks from external sources. In fact, the Co-Sourcing 
Director of Deloitte Touche Tohmatsu, Mr John Kane, predicted that outsider computer 
attacks were on the increase.  The study found 
variation in the types of attacks, confirming fears that information security 
breaches are no longer the domain of relatively harmless, curious hackers, but 
are increasingly being conducted by disgruntled employees, professional criminals 
and industrial spies.  Twenty-six (26) companies 
lost a total of $24.8 million due to telecommunications fraud, 22 lost $21 million 
due to theft of proprietary information, 26 lost $4.3 million from sabotage of 
data or networks, 22 lost nearly $4 million from invalid insider access and 22 
lost $2.9 million from outsider system penetration. Computer viruses caused nearly 
$12.5 million in losses for 165 companies; laptop computer theft caused $6.1 million 
in losses for 160 firms; and employee abuse of Internet privileges caused more 
than $1 million in losses to 55 firms.   High-tech 
industries the most vulnerableThe 
Deloitte Touche Tohmatsu research found that the Banking and Finance industry 
suffered the highest incidence of computer security penetrations (57%), closely 
followed by the Technology sector (55%), Communications (50%) and Computing (45%). 
The lowest level of computer crime was reported in the Primary Producers/Mining 
sectors (28%). These findings indicate a direct correlation between the level 
of security penetrations and the level of workplace dependence on computer technology. 
Therefore, computer crime is expected to escalate in industries increasing their 
reliance on high technology.  Reasons 
for rising computer crimeAccording 
to The Yankee Group, a Boston-based consulting firm in the U.S., fear of security 
breaches has prompted corporate security budgets to increase by 25 percent since 
1995. However, other studies show that many organisations are still not doing 
enough to adequately secure their information resources. According 
to Mr Kane, computer crime will continue to threaten Australian businesses. He 
cited three main reasons: companies' increasing move to networking (from centralised 
mainframes to decentralised file servers; and from single-vendor to multi-vendor 
environments); the growth in numbers and technical sophistication of computer 
users; and the difficulties encountered by companies and law enforcement agencies 
in maintaining security in such rapidly changing environments. It appears that 
in many organisations rising technological sophistication is not being accompanied 
by rising security sophistication. This makes companies and Government 
departments very attractive targets to hackers, criminals, industrial spies and 
malicious employees.   Inadequate 
Security SystemsVarious studies indicate 
that many organisations are failing to implement adequate security policies and 
systems. Additionally, whilst a high level of security is maintained in one area 
of the network or organisation (for instance, a firewall), it is common for other 
"weak links" to exist. One of these "weak links" 
is the inadequate screening, monitoring and controlling of the activities of insiders 
(employees, contractors and consultants). A 1996 study in the U.K. by accounting 
firm KPMG found that only 19% of the organisations they surveyed actually obtained 
a formal undertaking from contractors to abide by the organisation's security 
rules. Sixty-five percent (65%) of those organisations with Internet connections 
did not even know, let alone control, their employees' use of the Internet. This 
is of extreme concern since many serious penetrations of a corporate network are 
facilitated by unrestricted Internet connections.  Password 
access to network resources is mandatory in most organisations today. Yet the 
password policies or systems in use are often weak and easy to avoid or break. 
One of the keystones of effective password protection is to enforce password changes 
at least once every 3 months. The KPMG study found that 27% of mainframes, 41% 
of mini computers and 43% of networks did not enforce quarterly password changes.  
 A 1997 study by computer manufacturer Compaq of workers 
in the financial district of London revealed chronically insecure password policies. 
Eighty-two percent (82%) of respondents said that they chose passwords based on 
"a sexual position or abusive name for the boss"(30%), their partner's name or 
nickname (16%), the name of their favourite holiday destination (15%), sports 
team or player (13%) and whatever they saw first on their desk (8%).  System 
back-ups are also an imperative security measure, especially to assist an organisation 
to recover from accidental or intentional destruction, damage or compromise of 
a system or network. However, according to the U.K. KPMG study, only 36% of companies 
back-up their PC data and only 65% test their back-up data.   Senior 
Management ReluctancePerhaps the 
biggest underlying cause of inadequate organisational security is senior management's 
lack of understanding of their information systems and the need for associated 
security controls. In 1997 the publication Information 
Week surveyed 1,271 U.S. system/network managers. Only 22% believed that their 
own senior managers regarded information security as "extremely important." Much 
higher on their list of concerns were "reducing costs" and "improving competitiveness." 
Unfortunately, there appears to be little recognition of the crucial role information 
security plays in keeping costs down and preventing the erosion of competitiveness. 
On the contrary, as Richard Parris, Chief Executive Officer of Intercede (a specialist 
security vendor in the U.S.) points out, companies will generally spend far larger 
sums of money on the "cure" - in dealing with security breaches once they occur. 
 Even many law enforcement agencies have failed to institute 
proper security mechanisms. Kasten Chase, a U.S. security networking company, 
surveyed police departments across the U.S. in 1996. The research revealed that 
only 25% of police forces had or were formulating an information technology security 
policy. Although 75% were "aware or concerned" about I.T. security, none had budgeted 
to protect their systems from being illegally accessed. This attitude prevailed 
in an environment where 58% of police departments used a non-secure Wide Area 
Network (WAN) to share information between sites. Forty-two (42%) of those interviewed 
believed that outsourcing their WAN from a third party, value-added network meant 
that their network was inherently secure.  Even 
at the highest Government levels, the security mechanisms have been found wanting. 
After testing 15,000 Pentagon systems whose vulnerabilities had been identified 
in a previous audit, the Information Warfare Division of the Defence Information 
Systems Agency of the U.S. Department of Defence found that 90% of the systems 
were still vulnerable to common intrusion techniques.  In 
a 1996 U.S. study, networking company Novell found an overwhelming degree of ignorance 
at company board level with regard to information technology. As a result, I.T. 
managers were struggling to implement new technology. For example, 51% of I.T. 
managers reported problems convincing their board or managers about the benefits 
of installing an intranet. This is hardly surprising since the study found that 
over 37% of board-level directors were unfamiliar with the term "intranet". 
 Given that information technology managers are battling 
to introduce new technology into their organisations, it follows that they find 
it even more difficult to convince their senior managers of the need for additional 
security mechanisms. In addition, calls for the appointment of a security officer 
(someone to administer network security) also commonly fall on deaf ears. The 
KPMG researchers found that only 25% of U.K. organisations had a security officer. 
In the organisations without a security officer, the responsibilities and roles 
associated with security were generally assumed by the I.T. department. However, 
17% of large organisations (with a turnover above £10 million) had nobody 
responsible for security.  Furthermore, KPMG U.K. 
found that of those organisations which had experienced a security breach, a large 
number had not even developed a security plan. Of those companies that had drawn 
up plans, a significant proportion had not tested their plans!  Supporting 
this finding was an observation made by Dan Farmer, the creator of the well-known 
security scanning tool SATAN. Farmer studied 660 banks in the U.S. and found that 
68% had inadequate network security. His explanation was that system administrators 
were under-funded and under pressure "just to keep things running - not necessarily 
secure."  To some extent, senior managers and boards 
can be forgiven for objecting to extra investments in "security" when hardware 
and software vendors preach that their products are already sufficiently secure. 
However, that view is as naïve as believing that a house is secure because 
it was built by a reputable builder. Deadlocks and alarms are still necessary 
to protect one's house; security controls are as necessary to protect an organisation's 
network.  Unfortunately, several myths seem to 
be perpetuated at senior management level which are holding security enhancements 
back:  the "it won't happen to us" myth - "no one 
(inside or outside our organistion) would be interested in stealing from us, or 
penetrating, damaging, destroying or otherwise tampering with our network"; 
 the "we run the best systems so they must be secure" 
myth - "our hardware, operating systems and software are made by (insert vendor's 
name) or "we have the most recent version of (insert name of product)"; 
 the "our vendor will look after us" myth - "our vendor 
will tell us if a vulnerability is found in our system" (perhaps the most common 
myth);  the "we don't need to test our systems" 
myth - "we've taken all the precautions that need to be taken so penetration tests 
are not needed";  the "it's the I.T. department's 
job" myth - "they look after the systems so they look after security as well" 
(without giving them the resources, time and money to do so…);  the 
"our sub-contracted I.T. company will take care of security" myth (traditionally, 
their emphasis and skill set has not been on security);  the 
"we can't afford it" myth - "security is a luxury that for which we don't have 
the budget".  There are other mistaken beliefs. 
As indicated earlier, one of these is the assumption that the implementation of 
one or several specific security controls is adequate to protect a network. Firewalls, 
password management systems, the encryption of data, and other authentication 
procedures, are all necessary, but they are not sufficient in themselves. Firstly, 
a given security control may not be the most cost-effective in its class (not 
all firewalls, or password systems, or encryption methods, etc are equal). Secondly, 
a system - the combination of a number of integrated tools - is generally required 
to protect an entire network. A "holistic" approach to security is therefore necessary. 
  ConclusionIn 
order for computer crime to decrease, more organisations will need to take implement 
measures to avoid, prevent and deter attacks. For the costs of such crimes to 
decline, organisations will also need to implement tools to monitor and deal more 
effectively with incidents. The bottom line is that organisations must become 
pro-active in dealing with security. In some cases, 
the monetary costs of increasing the organisation's level of security will be 
low. However, in most instances, some commitment of manpower, time and money will 
be required. This means that information technology professionals may need to 
undergo the arduous task of educating and persuading their senior managers of 
the need for greater security. The best way to argue the case is to give them 
the facts: computer crime is increasing, computer crime costs organisations large 
sums of money, and computer crime can be cost-effectively prevented.  |