Types of Computer Data Theft
…. By Prashant Mali (cyberlawconsulting@gmail.com)
What is Data Theft?
Data theft is the illegal access (reading, editing, or coping) of data without the data owners authorization. In other words, if a company’s server has been accessed by a hacker it is a case of data theft and reading the mails of your colleague would also amount to the same in the eyes of the law. It is irrelevant whether you used this data for misdeeds later or not – what counts is that the data that is not yours has been accessed – without prior permission of its authorized user who may also be its creator.
Types of Data Theft
Data can be stolen in many ways. Below are a few examples of the way data theft happens.
Data theft is the illegal access (reading, editing, or coping) of data without the data owners authorization. In other words, if a company’s server has been accessed by a hacker it is a case of data theft and reading the mails of your colleague would also amount to the same in the eyes of the law. It is irrelevant whether you used this data for misdeeds later or not – what counts is that the data that is not yours has been accessed – without prior permission of its authorized user who may also be its creator.
Types of Data Theft
Data can be stolen in many ways. Below are a few examples of the way data theft happens.
Hacking: This is by far the most common way of stealing data with least chances of getting caught. A hacker gets into a system where he or she is not supposed to be, and steals whatever data was aimed at. Hackers find their ‘gate way’ through gaps in the security system or by hoodwinking gullible employees / surfers in order to gain access to a system.
Posing: Appearances can be deceiving. The attractive website that has popped up offering you a great holiday treat may actually be a data thief trying to get into your system under the ‘mask’ of a piece of harmless spam. In a case of corporate data theft last year, the thief posed as a potential customer and got entry to a company’s data bank through the computer of an employee who did not suspect anything in his eagerness to catch a potential client.
Posing: Appearances can be deceiving. The attractive website that has popped up offering you a great holiday treat may actually be a data thief trying to get into your system under the ‘mask’ of a piece of harmless spam. In a case of corporate data theft last year, the thief posed as a potential customer and got entry to a company’s data bank through the computer of an employee who did not suspect anything in his eagerness to catch a potential client.
Remote Access: Is the cursor moving about on its own even when you have not touched the mouse? Does the indicator show that a programme is running even when you are not working on anything and have no windows open? Do not ignore the symptoms – a data thief is already sitting in your computer. Remote access allows the thief to gain control of your machine from wherever he or she is and operate it, steal data from it, and even distribute virus from it!
Spyware: Spyware is often brought in by adware. The thief may not sit in your system, but your key strokes or mouse clicks would be spied upon, revealing what you are doing and ‘reading’ the data as you put it in. And you have opened the gate by clicking on an innocent looking ad.
Podslurpling: Music is now stored in iPods for almost all domestic users. You would usually not suspect an employee rocking to music while working as usual. The thief knows this and is using the iPod to obtain data outputs from the computer where it is plugged in.
Blue Snarfing: Bluetooth devices have become popular in a very short while. Using his or her Bluetooth-enabled cell phone or laptop, the data thief lifts data from a restricted computer in silence and mostly unnoticed.
Podslurpling: Music is now stored in iPods for almost all domestic users. You would usually not suspect an employee rocking to music while working as usual. The thief knows this and is using the iPod to obtain data outputs from the computer where it is plugged in.
Blue Snarfing: Bluetooth devices have become popular in a very short while. Using his or her Bluetooth-enabled cell phone or laptop, the data thief lifts data from a restricted computer in silence and mostly unnoticed.
Thumsucking :Another tiny and dangerous device is the USB storage drive. All an employee needs to do is plug in a pen drive, and 2 GB of data would flow in quietly into the pocket from the computer.
Who Steals Data:
Possible data thieves are:
95% of the time they are disgruntled employees, employees with technological ego, or employees faced with some kind of disciplinary action.
Professional hackers are doing the dirty jobs for increasingly high prices.
Corporate espionage is now a specialized ‘blue collar’ occupation.
How to Protect Data :
Installing and maintaining IDS, Antivirus software, firewall, encryption and tracking systems for internal network access.
Granting limited and monitored use of the internet, with policies being reviewed periodically.
Banning USB ports and not allowing Bluetooth-enabled devices within the work area.
Maintaining updated backup.
Corporate espionage is now a specialized ‘blue collar’ occupation.
How to Protect Data :
Installing and maintaining IDS, Antivirus software, firewall, encryption and tracking systems for internal network access.
Granting limited and monitored use of the internet, with policies being reviewed periodically.
Banning USB ports and not allowing Bluetooth-enabled devices within the work area.
Maintaining updated backup.
Dangers Posed by Data Theft to Companies
What kind of damages can be done to corporate houses?
Loss of business data and accounts is the first step.
The customer database may be stolen and sold. .
Personal information of employees and customers can be compromised.
Research data is another favorite with thieves.
Loss of reputation in the market, police enquiries and negative publicity would follow.
Loss of business data and accounts is the first step.
The customer database may be stolen and sold. .
Personal information of employees and customers can be compromised.
Research data is another favorite with thieves.
Loss of reputation in the market, police enquiries and negative publicity would follow.
"Loved reading this piece by Adv. Prashant Mali [MSc(CS),LL?
Join LAWyersClubIndia's network for daily News Updates, Judgment Summaries, Articles, Forum Threads, Online Law Courses, and MUCH MORE!!"
Join LAWyersClubIndia's network for daily News Updates, Judgment Summaries, Articles, Forum Threads, Online Law Courses, and MUCH MORE!!"
Tags :Criminal Law