| OCR Text |
Show F6 The Salt Lake Tribune BUSINESS Sunday, January22, 1995 Hackers Seek Prey By Computer | Utah Companies Question If They Should Censor ‘Cybersmut’ | | @ Continued from F-1 | decideif the communitystandard makes any says Stephen Bates, a sesense anymore. r fellow at the Anne: berg Washington nications, those who are allowed onto the | @ Continued from F-1 At Salt Lake City-based Wasatch Commu- gram, a communications think tank ed in W; hington. D.C Barring future government attempts to regulate offensive materials it may ulti- mately fall to local access providers to set standards, says Bates, a frequent surfer onthe Internet That means the question of what is appropriate for companies to providetheir cu: tomers will become increasingly addressed as the size and influence of the Internet grows. urity servi ni: A me a¢ ment agency ternet, it s Internet in the hopes they will become subscribers are not given ace to “adult” con- ferences, says TomCole. one of the company’s owners. We don’t want to give anyone under 18 that kind of access. Cole says. But he acknowledges once someone subscribes. the companytakes it on faith those who are logging on are of age. Salt Lake City- ased InTelCom International, one ofthestate’s largest Internet access providers, plans to developsystems that allow its customers limited access on their own. That would besimilar to the way cable television lock-boxes prevent access to pro- ly would not want a 15-year-old to see.” And as the Internet grows and more people gain access, the chances of running into material that some users find objectionable multiples. I got onto the Internet through myprovider the other day and noticed a conference, alt.fans.gingrich, for fans of Newt Gingrinch who is a big Internet supporter,” Batessays. “Right belowit was another con- ference alt.sex.incest.” There is no governing body to enforce good citizenship on the Net. In the absence of law, Net culture has evolved its own set of social conventions called “netiquette.” @ Before posting a question or a comment. be sure you've chosen the appropriate venue. @ Avoid posting “me too’ messages that just parrot the original posting but offer little or no new insight. Don’t post pyramid schemes, inappropriate commercial notices or off-color jokes These areall regarded as a waste of other people's space and time Wlt’s easy to forget just how manymillions of people maysee the words you post. Remember not to say anything online that you wouldn't want to be heard 73 percent in 1994 the There was no apparent damage A lot of senior managers are not awareof how dependent their to the information, but GE closed its door to the Internet for 72 formation technology occurred through the “home org nizations have become on inwhich can be ac computers around t also on company or of information is a’ er-larger number users issue of security is going to growing as computer works take on more information including health records. credit card transactions and banking data. much of it highly confiden- tial andvaluable According to a survey of 1.271 corporate executives conducted last year by Ernst & Young, U.S companies are experiencing an alarming increase in losses of secure information as they deploy new compu networking t nologies without adequatesecur ty precautions. st & Yo.ng foundthet security risks might be growing be- causeofalack of awarenessofthe problems. More than half of the respondents reported financial losses — some exceeding $1 million — due to security breaches. One-third said they could not quantify their losses said White of Ernst & Young. “The idea of connecting machines all over the place seems good, but how do I know who | amtalking to? I am connectedto yourInternet connection, and you think I am coming from MIT. but I am really coming from Denmark. Usually, breaches occur he- hoursas a precaution. The breach whentwo employees sold themto a competitor. Technologies are available to protect data on the Internet and within lecal computer networks. page,” a graphic entry point where the companycan showoff but network administrators some- commercial and marketing information ofits choosing The hackers figured out how to “Basically, information is at the heart ofthe post-industrial soci- get beyond the page. said ety. We are more concerned with more disreputable areas on the Unisys Corp. of Blue Bell, Pa said none ofits systems has been breached because the company Net —such as the alt.binaries.pictures.erotica newsgroup — don’t do it with your employer's account. It is considered unseemly to wear your business suit in a has built in several layers of security. Manyof its customers are banks and insurance companies. andinto the company’s suppos Anotherbreach took place the S01 @ Multimedia, Panasonic 2x CD ROM © 16 Bit Acer Stereo Sound Card 14 CD Titles, 2 Labtech Speakers @ 4 MB RAM an Internet access provider w York. Hackers posted a message from a group calling it- @ 420 MB Hard Drive $ @31/2.144MB .. rity. which specializes in encryption, or coding. of information for self the Internet Liberation @ 14”Color Monitor, *45/MONTH -28 dp, Low Radiation © Intel CPU, Local Bus Motherboard aR Front And in October, sensitive soft- — whose name has not beenre- leased because of his age — has ware-code information belonging to Microsoft Corp. was taken from a computer at Florida State Uni- been waiting to find out if he will versity be charged underBritain's Computer Misuse Act, several breaches have occurred on commercial systems Unidentified hackers breached an electronic “firewall” that is supposed to keep General Electrie Co.’s proprietary computer files separate from its hookup to the Internet. During the week of Noy. 21. the hackers got access to proprietary information very unbusinesslike place © @ @ © @ © 520 MB Hard Drive Intel PCl Motherboard & PC! Controller ATI Super VGA PCI Video Card 8 MB RAM @3 1/2 1.44 Floppy 15" Color Monitor .28 N-I Mid-Tower Case $2099 ss6jMonth Floppy Drive ME. Kabay, director of educa- pero pacxaro Printers Pentium 1 same week at Pipeline Network While the 16-year-old in Britain @ If contributing to some of the tion the threat seriously and don’t take precautions. “It is usuallylaziness. stupidity or denial.” said Stammberger of RSA Data Secusecurity. saying on the evening news. the collection than its protec- which was supposed to be electronically screened off from other G cause people who are running their private networks don't take times are careless, Kabay @ HP Laserjet 4 Plus. © HPLaserjet 4P.... @ HP Laserjet 4L. © HP Deskjet 1200 C @ HP Deskjet 560C © HP Deskjet 540 . i CTATestes) @ HP Laser 4S! ©-420 MB Hard Drive #8 MB RAM,3% 1.44 MB Floppy #14” SVGA (28 dp, NI Color Monitor ® Local Bus Motherboard, 1 MB Graphic a $1,449 sa/month All computers come with 101 enhanced keyboard, Mouse, Windows 3.11 @ HP Laser 4V « = tion for the National Computer Security Association in Carlisle. PC & Macintosh Repair & Upgrade GREERRES aA Sac TTC Pa., recalled other recent thefts that could have comefromwithin an organization. American Airlines lost some computer diskettes containing sensitive traffic information, allegedly to a competitor. Encyclo- ThePalt Lake Tribrme i) Deseret News pedia Britannica lost three million names ofpotential customers CAREERS'95 The survey also showedthat in an increasing number ofindus: tries. more employees have acce: to computers. In the health-care Discover Your Alternatives industry, for example. the share grew from 55 percent in 1993 to Annual Quick 99° Tinches $ gramming considered by some to be objectionable “We are going to have to be pro-active Thereis a lot of pornographyavailable and lot of concern about it,” s John Adamson, InTelCom’s chief executive officer. “There is informationon the Internet that I certain- Mi Netiquette Tips Employment Steak 21.99 prime Rib Dinners Outlook Recruiters Direct Link to Top Talent! GET A BIGGER PIECE OF THEPIE AT AMERICAN INVESTMENT FINANCIAL. Bikini & Exotic Dancer Contest Think earning big returns on Certificates of Deposit is just so much pie-in-the-sky Not at American Investment Financial, where we offer among the highest interest rates available on CDs, Money Market Accounts, and IRAs | Come in to our office at 820 Fast and 9400 South Private Clubs for Members Every Tues.-Ogden bi andgrab a bigger piece of the financial pie with our current 7.05% APY* CD (6.87% interest rate 12 months Term Call us and get a slice of our other rates and terms, too 1847 Wall Ave. Ogden Every Wed.-Murray "flfar Fvent 288-1488 5142 So. State Murray Suma Fee 1737 N. Beck (300 W) § a AMERICAN INVESTMENTFINANCIAL | Member FDIC 820 Last 9400 South, Sandy, Utah 84094 801-572-1633 a Past, present movie reviews e Weather map and forecasts ® Internet mail address @ | Classified ads ® Updated AP news @ and stocks ‘Downloading ® capabilities Personal e@ ads » Tribune library " access WHATEVER YOUR DESTINATION, THE TRIBUNE WILL FLY YOU TOIT. Utah OnLineis your ticket to a world of information Without reservation, you can zip electronically to features beyond what's available in TheSalt Lake Tribune's printed newspaper. At the hub ofour nonstop online service youwill find personal ads; updated AP newsand stocks; Tribune library access; downloading capabilities; Internet mail address; weather maps and forecasts; past, present movie reviews; and classified ads. With Utah OnLine you get 45 free minutes every day if you're a daily Tribune subscriber, and 25 free minutesif you're a Sunday- only subscriber-- for peanuts. To get things off the ground you w: ill needa personal computer and a 2400 orbetter modern. To make your Utah connection, OnLine see the bottom of page A2. x _ |