U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computer Security: Hack Attack

NCJ Number
197721
Journal
ABA Journal Volume: 88 Dated: November 2002 Pages: 50-55-67
Author(s)
Jason Krause
Editor(s)
Danial J. Kim
Date Published
November 2002
Length
7 pages
Annotation
This article discusses the challenges faced by attorneys in breaches to a law firm's security system software and recommends solutions for law firms to implement to protect client confidentiality.
Abstract
This article describes various types of hackers, including "script kiddies," the most common type who is an inexperienced but computer-literate person able to exploit security holes in a law firm's software by downloading security-probing software from the Internet. This article is based on the old computer industry adage that there are two types of computer users, people who have been attacked and those who are going to be attacked by hackers. It is recommended that a firewall be installed in every law firm to block unauthorized and unnecessary Internet traffic and communications. It is also recommended that large firms employ a full-time computer security expert, and smaller firms hire outside auditors at least annually, to check network and voice mail systems for security lapses. Software vulnerability can be corrected by keeping up with available fixes provided by the software manufacturer. The difficulty in identifying hacker break-ins is discussed and the changing sources of hacking are described including those from other countries. Saving the trail of evidence and learning basic computer forensics are discussed. However, it is noted that catching and prosecuting a hacker is extremely rare and every lawyer should have a security policy and a contingency plan ready for the time when a hack attack occurs.