Information-technology
Promotion Agency,
Japan
$BK\J8$X(B
IPA

TOP|Aplication|Contact us|Sitemap


Information-technology Promotion Agency, Japan
-japanese charactor-






IT Security Center

The Information-technology SEcurity Center (ISEC) is the center for promoting information security in Japan.









Japanese




Activities




Information Service Activities






Security Software Development Activities






CRYPTREC






IT SecurityAssurance







Organization







PGP key







RFCs







Mission Statement







Links







About IPA/ISEC







IPA TOP>IT Security Center Japanese TOP>IT Security Center English TOP>information




Unauthorized Computer Access Report Status for 2007


backnumber



January 28, 2008
  IT Security Center
Information-technology Promotion Agency , Japan (IPA)





This is a summary of unauthorized computer access report status from January to December, 2007 aggregated by IPA.


1. Reported Numbers

 

Yearly reported number of unauthorized computer access in 2007 was 218 : decreased about 34% compared with the one in 2006. For your further reference, following graph shows the shift in reported number accepted by IPA in the last 10 years.

2. Reports Classified

Though the reported number in 2007 was significantly decreased than that of 2006, reported number actually damaged was almost the same . It seemed that reporters refrain reporting for those that did not cause actual damage.

*1)  “Access Probe (Attempt) refers that there realized certain trails of unauthorized access on either server and/or firewall logs or both.

Type of Reports

2007

2006

Intrusion

54

94

Unauthorized Mail Relay

2

1

Infection w/Worm

0

16

DoS (Denial of Service)

5

12

Source Address Spoofing

15

7

Others (Damaged)

86

32

Access Probe (Attempt)

51

159

Worm Probe

0

5

Others (Not Damaged)

5

5

Total

218 (162)

331 (162)

* The type of reports shaded and the numbers in parenthesis indicate the type of reports actually damaged.

 

3. Damage Contents

Following graph shows damage contents of the reports actually damaged. The number of actually damaged was subtly increased about 3% than that of the previous year. The major damage reports were alteration of files (incl. embedding malicious codes) and alteration of homepages. The contents of “Others (damaged)” included “Spoofed to be a legitimate user for on-line services”, “exploited as a steppingstone server to attack to the outside servers”, etc.

Damage Contents

2007

2006

Unauthorized Mail Relay

2

2

Server Down

2

0

Creation of Unauthorized Accounts

1

1

Alteration of Homepages

18

34

Theft of Password Files

0

0

Service Lowering

6

0

Open Proxy

0

16

Alteration of Files

93

92

Others

115

84

Total

237 (*)

229 (*)

* Since multiple damage cause may be existed in an actual damage report, the total reported number for actual damage is not conformed.

 

4. Type of Reporter

As for the breakdown of reporters, the ratio of individual reports is continually decreased following to the previous year and the reported number for the major type of reporters is evenly dispersed in ratio.

5. Damage Cause  

Reports for actually damaged include insufficient ID/password management with 27 (17%), use of older version/patches have not yet applied with 23 (14%) and insufficient configuration with 6 (4%). Of unknown cause with 80 (49%) is significantly increased: it can be easily assumed that the method of unauthorized computer access is further sophisticated and it is getting harder to identify their causes as well.

Damage Contents

2007

2006

Insufficient ID/Password Management

27

46

Use of Older Version/Patches are not yet Applied

23

31

Insufficient Configuration

6

6

Unknown

80

57

Others (DoS, etc)

26

22

Total

162

162

6. Information of Countermeasures

The remarkable damage causes in 2007 were: the damages intruded by attacks to the ports used by SSH (the major cause is insufficient ID/password configuration) , the damages exploited the vulnerability in OSs and/or Web applications, etc . However, these damages are easily preventable if respective users would implement fundamental security measures. Accordingly, system administrators should primarily check following items upon conducting comprehensive measures.

-   Strict management and/or configuration on ID/password

-   Resolve security holes (incl. operational preventive measures if patch

    application is not available)

-   Router/firewall configuration/access control establishment

-   Frequent log check

As for individual users , following actions/approaches are effective/helpful for your security.

-   OS and application software update such as Windows Update or Office

    Update, etc.

-   Password configuration/management (use of complex password, change

    your password regularly, do not tell your password to third person, etc.)

-   Get aware of security configuration on radio LAN and/or PC sharing

-   Activate router/personal firewall

Be sure to refer to the following information for further security as well.

For System Administrators:

“Enlightenment materials relevant to information security” (in Japanese)

http://www.ipa.go.jp/security/fy18/reports/contents/

“Checking points on vulnerability measures” (in Japanese)

http://www.ipa.go.jp/security/vuln/20050623_websecurity.html

“How to establish secured website rev. ver. 2” (in Japanese)

http://www.ipa.go.jp/security/vuln/websecurity.html

“Benchmark for information security measures”

http://www.ipa.go.jp/security/english/benchmark_system.html

“JVN (Japan Vulnerability Notes)” (in Japanese) *the portal site for vulnerability measures information

http://www.ipa.go.jp/security/news/news.html

For End Users

“ IPA Security Center - Pages for individual users” (in Japanese)

http://www.ipa.go.jp/security/personal/

“The minimum security measures to protect your computer” (Microsoft)

http://www.microsoft.com/japan/athome/security/protect/default.aspx

 



Contact
IT Security Center, Information-technology Promotion Agency, Japan (IPA/ISEC)
Tel:+81-3-5978-7527

Fax:+81-3-5978-7518

E-mail:





Term of Use


Copyright(c) Information-technology Promotion Agency, Japan. All rights reserved 2005