BUSINESS AT NET SPEED Click for June 22, 1998 issue

Six Signs That You Have Been Hacked

UNKNOWN ACCOUNTS added to your system. Hackers may have created a back door onto your network.

EXCESSIVE LOG-ON FAILURES: With enough knocking, hackers can force some doors on your intranet to open--and some accounts don't automatically close after a certain number of attempts.

UNEXPECTED CRASHES or reboots of the computer. Some hacks require the addition of new code, followed by a reboot to load it. If you didn't just reboot your system, who did?

MISSING LOGS or gaps in records. Sometimes, hackers can only cover their tracks by deleting portions of files. Gaps, then, become the telltale tracks.

HEAVY TRAFFIC after midnight. Do you do a lot of communing with your Asian office? If not, think about why your midnight-to-sunrise traffic suddenly exceeds your daylight loads.

SYSTEM LOGS that quickly fill up. Each company is different, but these critical logs are usually spare because only a few people have access. If a hacker is impersonating a ''sys-op,'' you'll see it here.

DATA: PRICE WATERHOUSE SURVEY



RELATED ITEMS

The 'Click Here' Economy
COVER IMAGE: Doing Business in the Internet Age

GRAPHIC: Online Sales Are Soaring

TABLE: How the Internet Changes (Almost) Everything

Commentary
Extranets
TABLE: Understanding Net-Speak

GRAPHIC: How a Mythical Merchant Uses Three Avenues of the Net for E-Commerce

Supply Chain
GRAPHIC: How Mythical Sportz Gets Products to Market

CHART: Explosion in Enterprise Software: These Tools Are Being Honed for E-Commerce

Customer Service
TABLE: At Your (Cyber) Service

Middlemen
Security
TABLE: Six Signs That You Have Been Hacked

BW/Harris Poll
FedEx: An Internet Stock?
Online Merchants
Cyber Prices
Commentary
E-Cash?
Next: Smart Cards
Net Tax Commentary
Knowledge Management


Return to main story


SIGNUPABOUTBW_CONTENTSBW_+!DAILY_BRIEFINGSEARCHCONTACT_US


Updated June 11, 1998 by bwwebmaster
Copyright 1998, Bloomberg L.P.
Terms of Use