[ISN] The High Costs of Hacking
InfoSec News
isn at c4i.org
Tue Jun 14 12:48:18 EDT 2005
http://www.cio.com/archive/061505/tl_security.html
BY MICHAEL JACKMAN
June. 15, 2005
CIO Magazine
One fixture of computer break-in stories is the estimated cost of
these crimes. The price often runs as high as seven figurestotals
hard to ken for merely pilfering the digits out of a few boxes of
metal, plastic and silicon.
One source of these high figures is the Department of Justice. Last
year, the agency reported that a one-night hacking spree by a
disgruntled ex-employee set back Cyber City, a computer network
consultancy, more than $100,000 - and that Acxiom, a data broker,
spent more than $7 million to repair 139 remote attacks against its
database by a hacker in Boca Raton, Fla.
Warehouses have burned to cinders, and the damage has been valued at
less. So are these figures hype?
While it's true that not all network mischief comes at such a high
price, John Sgromolo, lead investigator for digital forensics at
Verizon Communications and a former special agent with the United
States Naval Criminal Investigative Service, says that such large sums
are the real deal. More or less.
Consider cases in which a hacker brings down a server that's used for
selling products. "If you're averaging $3,000 an hour on this server,
that's not hard to figure out based on how many hours it was down,"
Sgromolo says. Then there's the cost of replacing damaged equipment
and the hours spent on repairs, installation and recovery.
Nevertheless, he admits, these estimates "are fueled by another
concern: criminal prosecution, including amounts for fines and
restitution." Prosecutors tend to aim high, he says, while defendants
argue for dismissing some of the costs.
Even crimes that don't result in lost revenue can rack up significant
bills. According to The Associated Press, the University of Texas
spent $167,000 to mop up the mess presumably left by one of its former
students, Christopher Andrew Phillips, who was indicted last November
for breaking into UT's student records early in 2003. Phillips
allegedly hauled off the identities of more than 37,000 students,
faculty and staff.
Student records may not have a lot of financial value, Sgromolo
explains, but those records may need to be recreated. In addition, the
university may have had to hustle to inform the victims, possibly
requiring extra staff and overtime charges. UT officials weren't
available for comment.
In sum, there can be more value floating around inside those
Internet-wired boxes than in a Brink's safe. Therefore, it's more
important than ever for businesses to make sure their digital property
is locked up tight.
More information about the ISN
mailing list